diff options
author | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2015-02-11 07:33:34 -0500 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2015-05-21 13:58:59 -0400 |
commit | f2b3dee484f9cee967a54ef05a66866282337519 (patch) | |
tree | 98af0f7b105fe0971aec9583180c4047ba621c90 /security | |
parent | 7c51bb00c40e5608fb2cdac5230f51aeb56a28df (diff) | |
download | linux-f2b3dee484f9cee967a54ef05a66866282337519.tar.gz linux-f2b3dee484f9cee967a54ef05a66866282337519.tar.bz2 linux-f2b3dee484f9cee967a54ef05a66866282337519.zip |
KEYS: fix "ca_keys=" partial key matching
The call to asymmetric_key_hex_to_key_id() from ca_keys_setup()
silently fails with -ENOMEM. Instead of dynamically allocating
memory from a __setup function, this patch defines a variable
and calls __asymmetric_key_hex_to_key_id(), a new helper function,
directly.
This bug was introduced by 'commit 46963b774d44 ("KEYS: Overhaul
key identification when searching for asymmetric keys")'.
Changelog:
- for clarification, rename hexlen to asciihexlen in
asymmetric_key_hex_to_key_id()
- add size argument to __asymmetric_key_hex_to_key_id() - David Howells
- inline __asymmetric_key_hex_to_key_id() - David Howells
- remove duplicate strlen() calls
Acked-by: David Howells <dhowells@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Cc: stable@vger.kernel.org # 3.18
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions