From: Fabio Estevam Subject: Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer Date: Sun, 15 Apr 2018 11:16:18 -0300 Message-ID: References: <1523790224-26083-1-git-send-email-festevam@gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Cc: Herbert Xu , =?UTF-8?Q?Horia_Geant=C4=83?= , Aymen Sghaier , Breno Lima , "Bryan O'Donoghue" , linux-crypto@vger.kernel.org, Fabio Estevam , stable To: Martin Townsend Return-path: In-Reply-To: Sender: stable-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org On Sun, Apr 15, 2018 at 10:52 AM, Martin Townsend wrote: > Sorry to be a pain but looking at the other use cases for > caam_rsa_drop_leading_zeros they check len afterwards which makes more > sense to me as temp being NULL after this operation is very unlikely > :) and I suppose we are trying to catch the case where the data is all > zeroes which wouldn't be a valid signature. You are right. I have just sent a v3 that checks len after caam_rsa_drop_leading_zeros(). Thanks