diff --git a/[refs] b/[refs] index dd76849fccec..ea6bd1b892cb 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: a1a38c4c6a0f73e8a9dc217c0e4e0ac483a89f25 +refs/heads/master: a9c57a9c6afb41951aa08317d0cd65a66aed38df diff --git a/trunk/drivers/crypto/picoxcell_crypto.c b/trunk/drivers/crypto/picoxcell_crypto.c index 9b1571c2a5a4..58480d009324 100644 --- a/trunk/drivers/crypto/picoxcell_crypto.c +++ b/trunk/drivers/crypto/picoxcell_crypto.c @@ -873,7 +873,7 @@ static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, * request for any other size (192 bits) then we need to do a software * fallback. */ - if ((len != AES_KEYSIZE_128 || len != AES_KEYSIZE_256) && + if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && ctx->sw_cipher) { /* * Set the fallback transform to use the same request flags as @@ -886,7 +886,7 @@ static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, err = crypto_ablkcipher_setkey(ctx->sw_cipher, key, len); if (err) goto sw_setkey_failed; - } else if ((len != AES_KEYSIZE_128 || len != AES_KEYSIZE_256) && + } else if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && !ctx->sw_cipher) err = -EINVAL;