crypto/dpaa2_sec: fix memory allocation check
When key length is 0, zmalloc will return NULL pointer and in that case it should not return NOMEM. So in this patch, adding a check on key length. Fixes: 8d1f3a5d751b ("crypto/dpaa2_sec: support crypto operation") Cc: stable@dpdk.org Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
This commit is contained in:
parent
8dda080a09
commit
9a494a3b90
@ -1842,7 +1842,7 @@ dpaa2_sec_cipher_init(struct rte_cryptodev *dev,
|
||||
session->ctxt_type = DPAA2_SEC_CIPHER;
|
||||
session->cipher_key.data = rte_zmalloc(NULL, xform->cipher.key.length,
|
||||
RTE_CACHE_LINE_SIZE);
|
||||
if (session->cipher_key.data == NULL) {
|
||||
if (session->cipher_key.data == NULL && xform->cipher.key.length > 0) {
|
||||
DPAA2_SEC_ERR("No Memory for cipher key");
|
||||
rte_free(priv);
|
||||
return -ENOMEM;
|
||||
|
Loading…
x
Reference in New Issue
Block a user