sst-linux/net/tipc
Dan Carpenter 5328b25bbd tipc: re-order conditions in tipc_crypto_key_rcv()
[ Upstream commit 5fe71fda89745fc3cd95f70d06e9162b595c3702 ]

On a 32bit system the "keylen + sizeof(struct tipc_aead_key)" math could
have an integer wrapping issue.  It doesn't matter because the "keylen"
is checked on the next line, but just to make life easier for static
analysis tools, let's re-order these conditions and avoid the integer
overflow.

Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Reviewed-by: Simon Horman <horms@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-02-21 13:49:33 +01:00
..
addr.c
addr.h
bcast.c net: tipc: avoid possible garbage value 2024-10-17 15:20:44 +02:00
bcast.h
bearer.c tipc: guard against string buffer overrun 2024-10-17 15:21:38 +02:00
bearer.h
core.c
core.h
crypto.c tipc: re-order conditions in tipc_crypto_key_rcv() 2025-02-21 13:49:33 +01:00
crypto.h
diag.c sock_diag: add module pointer to "struct sock_diag_handler" 2024-12-14 19:53:32 +01:00
discover.c tipc: check skb_linearize() return value in tipc_disc_rcv() 2022-11-21 20:50:24 -08:00
discover.h
eth_media.c
group.c
group.h
ib_media.c
Kconfig
link.c tipc: Use size_add() in calls to struct_size() 2023-11-20 11:51:52 +01:00
link.h
Makefile
monitor.c
monitor.h
msg.c
msg.h
name_distr.c
name_distr.h
name_table.c
name_table.h
net.c
net.h
netlink_compat.c
netlink.c
netlink.h
node.c tipc: force a dst refcount before doing decryption 2024-06-27 13:46:19 +02:00
node.h
socket.c
socket.h
subscr.c
subscr.h
sysctl.c
topsrv.c
topsrv.h
trace.c
trace.h
udp_media.c tipc: fix NULL deref in cleanup_bearer() 2024-12-19 18:08:52 +01:00
udp_media.h