Message ID | 20191229025714.544159-3-ebiggers@kernel.org (mailing list archive) |
---|---|
State | Superseded |
Delegated to: | Herbert Xu |
Headers | show
Return-Path: <SRS0=lkKn=2T=vger.kernel.org=linux-crypto-owner@kernel.org> Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 3D396109A for <patchwork-linux-crypto@patchwork.kernel.org>; Sun, 29 Dec 2019 02:58:08 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 123B321927 for <patchwork-linux-crypto@patchwork.kernel.org>; Sun, 29 Dec 2019 02:58:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577588288; bh=Xh56S2p/u7dijE7JzTBgalq9BKRLTICE05G86pxpQcw=; h=From:To:Subject:Date:In-Reply-To:References:List-ID:From; b=DJFAY2uzNkIN5TogA0NAFNMTIEjRDKVqw8HKlg/hh4Lbtf2lqnIZlPTyV5CSHOYZw uyayipu+dqUk8uH/sW1W/vs8hjX+yIQRmlihdC1c0gGgBNWpwNFm7xootu/iLpAwUr PHzX9/8xypsZqUwVRQ/GJb/H7ePf7VhQd3Mbwm7Q= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726343AbfL2C6D (ORCPT <rfc822;patchwork-linux-crypto@patchwork.kernel.org>); Sat, 28 Dec 2019 21:58:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:44382 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726187AbfL2C6D (ORCPT <rfc822;linux-crypto@vger.kernel.org>); Sat, 28 Dec 2019 21:58:03 -0500 Received: from zzz.tds (h75-100-12-111.burkwi.broadband.dynamic.tds.net [75.100.12.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 06F542176D for <linux-crypto@vger.kernel.org>; Sun, 29 Dec 2019 02:58:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577588283; bh=Xh56S2p/u7dijE7JzTBgalq9BKRLTICE05G86pxpQcw=; h=From:To:Subject:Date:In-Reply-To:References:From; b=fHAcXXc2glJ3R4qSWb8mq3ev0Ukc7O6hpCCRHRThdyJRvVFJtDL3AzURNqhhQL5CU IsScmqmoteFOy4XaypqY3NjdmD2y3dQhx4YXvQGQyWcXH0y5iWiAhTRgQKx8S4c05S WJQA9O4KCkq+sVZ3pzs7eNK8XSMl8U9JMbACk9lY= From: Eric Biggers <ebiggers@kernel.org> To: linux-crypto@vger.kernel.org Subject: [PATCH 02/28] crypto: algapi - make crypto_grab_spawn() handle an ERR_PTR() name Date: Sat, 28 Dec 2019 20:56:48 -0600 Message-Id: <20191229025714.544159-3-ebiggers@kernel.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229025714.544159-1-ebiggers@kernel.org> References: <20191229025714.544159-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: <linux-crypto.vger.kernel.org> X-Mailing-List: linux-crypto@vger.kernel.org |
Series |
crypto: template instantiation cleanup
|
expand
|
diff --git a/crypto/algapi.c b/crypto/algapi.c index 4c761f48110d..a5223c5f2275 100644 --- a/crypto/algapi.c +++ b/crypto/algapi.c @@ -720,6 +720,10 @@ int crypto_grab_spawn(struct crypto_spawn *spawn, const char *name, struct crypto_alg *alg; int err; + /* Allow the result of crypto_attr_alg_name() to be passed directly */ + if (IS_ERR(name)) + return PTR_ERR(name); + alg = crypto_find_alg(name, spawn->frontend, type, mask); if (IS_ERR(alg)) return PTR_ERR(alg);