diff options
author | Horia Geantă <horia.geanta@nxp.com> | 2020-02-28 09:51:23 +0300 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2020-04-17 11:50:18 +0300 |
commit | bc8413b626dde5d91fa4d6741a7da6727af38d27 (patch) | |
tree | ffef626dfa3ed61ddcd94ced38482ccf1c06336c /drivers/pwm | |
parent | 07378b099139b0ad3fc1e74f549cdca92a0c1feb (diff) | |
download | linux-bc8413b626dde5d91fa4d6741a7da6727af38d27.tar.xz |
crypto: caam/qi2 - fix chacha20 data size error
commit 3a5a9e1ef37b030b836d92df8264f840988f4a38 upstream.
HW generates a Data Size error for chacha20 requests that are not
a multiple of 64B, since algorithm state (AS) does not have
the FINAL bit set.
Since updating req->iv (for chaining) is not required,
modify skcipher descriptors to set the FINAL bit for chacha20.
[Note that for skcipher decryption we know that ctx1_iv_off is 0,
which allows for an optimization by not checking algorithm type,
since append_dec_op1() sets FINAL bit for all algorithms except AES.]
Also drop the descriptor operations that save the IV.
However, in order to keep code logic simple, things like
S/G tables generation etc. are not touched.
Cc: <stable@vger.kernel.org> # v5.3+
Fixes: 334d37c9e263 ("crypto: caam - update IV using HW support")
Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
Tested-by: Valentin Ciocoi Radulescu <valentin.ciocoi@nxp.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/pwm')
0 files changed, 0 insertions, 0 deletions