crypto: ccp - Change data length declarations to u64
When performing a hash operation if the amount of data buffered and a
request at or near the maximum data length is received then the length
calcuation could wrap causing an error in executing the hash operation.
Fix this by using a u64 type for the input and output data lengths in
all CCP operations.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
diff --git a/include/linux/ccp.h b/include/linux/ccp.h
index e8c2349..12f1cfd 100644
--- a/include/linux/ccp.h
+++ b/include/linux/ccp.h
@@ -133,7 +133,7 @@
u32 iv_len; /* In bytes */
struct scatterlist *src, *dst;
- u32 src_len; /* In bytes */
+ u64 src_len; /* In bytes */
u32 cmac_final; /* Indicates final cmac cmd */
struct scatterlist *cmac_key; /* K1/K2 cmac key required for
@@ -190,7 +190,7 @@
u32 iv_len; /* In bytes */
struct scatterlist *src, *dst;
- u32 src_len; /* In bytes */
+ u64 src_len; /* In bytes */
u32 final;
};
@@ -237,7 +237,7 @@
u32 ctx_len; /* In bytes */
struct scatterlist *src;
- u32 src_len; /* In bytes */
+ u64 src_len; /* In bytes */
u32 final; /* Indicates final sha cmd */
u64 msg_bits; /* Message length in bits required for
@@ -328,7 +328,7 @@
u32 mask_len; /* In bytes */
struct scatterlist *src, *dst;
- u32 src_len; /* In bytes */
+ u64 src_len; /* In bytes */
u32 final;
};