commit | 7f1118c5900897f713005b7ad849945e7a764097 | [log] [tgz] |
---|---|---|
author | Zhen Kong <zkong@codeaurora.org> | Wed Oct 09 12:06:06 2013 -0700 |
committer | Zhen Kong <zkong@codeaurora.org> | Mon Nov 18 12:06:25 2013 -0800 |
tree | 0c01a64992ed14543f8b729c2a93726bc8bc35f9 | |
parent | bd953b4f60035911d1077322fd218e9e8692df35 [diff] |
crypto: msm: check potential integer overflow on AEAD req length According to the specification of AEAD, AEAD request cryptlen is not a Fixed maximum and assoclen is also same. This could lead to potential integer overflow, thus allocating less memory. So we need to check potential integer overflow on AEAD request length. Change-Id: I58a0c5e1a6e890bad30f7865e96b7db46337158c Signed-off-by: Zhen Kong <zkong@codeaurora.org>