Received: by 10.213.65.68 with SMTP id h4csp284684imn; Fri, 23 Mar 2018 04:43:56 -0700 (PDT) X-Google-Smtp-Source: AG47ELtPz8Rfh123g+wc5RSsn05iiALr55U3qYskzIeqPrUbCJLQuYMgOT2KPHZatmyCm0abISYy X-Received: by 2002:a17:902:b20b:: with SMTP id t11-v6mr8948959plr.371.1521805436151; Fri, 23 Mar 2018 04:43:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521805436; cv=none; d=google.com; s=arc-20160816; b=WzDJWHY+EfXimqDXo5dQFMiGspxCMVbRBOhfs5+u+CSlKWjsRqrDZmll1V6dqIykkK vv8Vi/8aopqXSOr6XZGQicB6g21mSRpLyTdADdVTSkRUqjrRahbDq9+C4et1MrJ98B5u YpuRCj4AhTCsm1CKoMccPTNnuUYwSOVe12i9xdyBijDszy00nQ0fn3aKb1CVFq3fwyac QN620PxSLwrUWBlnNAct3LaH6IbIdAvL9M+LaOrZ+rgeleVsRq6XPrLNA3EJYkh8iYIf ECLqOmkDhpOAqqyH4wpz8wiXe9TN24ne+rWhm0VAuMTjI55KIKcd21Rc0JvrDPAYXecU +KbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=D/WrzbQXczNZIYcIKzPwGkPYoMVwYhOf8hC7b3biifQ=; b=vntbGPvwx6OWRMiuq94naNVgeBaaxi7llocPWRNOLNFVzxR4A3haQDpM5JChQomTzQ pWqyhRFfv6gmlsAZystoVZAQkt8E4viz+Qve2gYYPvlVKj8hQwPKFtjDaG4XhROljG0M bkiIeOQuxQVWPiNDEdzbCmPQEHJj22vLEkuYbld9zJNN0vDWnSUTQYiLigzvOd5km+xa sdY5xswMiPlMxTEHMpICyFbLhF9ZKYsw/i9MCnK9N9rSIn1I1nc8mfoyZPVVdu5h5gzV hTtQlC/N7Fj8UpwU1JR6xt9SI0MBBv0EqElv7C5Ulyv/gsuV0hNsVc0kRMsAXa6XFpS/ k5Fg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n20si5946467pgv.214.2018.03.23.04.43.41; Fri, 23 Mar 2018 04:43:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754580AbeCWLmw (ORCPT + 99 others); Fri, 23 Mar 2018 07:42:52 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38876 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754510AbeCWKDm (ORCPT ); Fri, 23 Mar 2018 06:03:42 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 71951134A; Fri, 23 Mar 2018 10:03:41 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lars Persson , Herbert Xu , Sasha Levin Subject: [PATCH 4.14 65/77] crypto: artpec6 - set correct iv size for gcm(aes) Date: Fri, 23 Mar 2018 10:54:39 +0100 Message-Id: <20180323094146.626804582@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180323094142.260022880@linuxfoundation.org> References: <20180323094142.260022880@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Lars Persson [ Upstream commit 6d6e71feb183aa588c849e20e7baa47cb162928a ] The IV size should not include the 32 bit counter. Because we had the IV size set as 16 the transform only worked when the IV input was zero padded. Fixes: a21eb94fc4d3 ("crypto: axis - add ARTPEC-6/7 crypto accelerator driver") Signed-off-by: Lars Persson Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/axis/artpec6_crypto.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/drivers/crypto/axis/artpec6_crypto.c +++ b/drivers/crypto/axis/artpec6_crypto.c @@ -22,6 +22,7 @@ #include #include +#include #include #include #include @@ -1934,7 +1935,7 @@ static int artpec6_crypto_prepare_aead(s memcpy(req_ctx->hw_ctx.J0, areq->iv, crypto_aead_ivsize(cipher)); // The HW omits the initial increment of the counter field. - crypto_inc(req_ctx->hw_ctx.J0+12, 4); + memcpy(req_ctx->hw_ctx.J0 + GCM_AES_IV_SIZE, "\x00\x00\x00\x01", 4); ret = artpec6_crypto_setup_out_descr(common, &req_ctx->hw_ctx, sizeof(struct artpec6_crypto_aead_hw_ctx), false, false); @@ -2956,7 +2957,7 @@ static struct aead_alg aead_algos[] = { .setkey = artpec6_crypto_aead_set_key, .encrypt = artpec6_crypto_aead_encrypt, .decrypt = artpec6_crypto_aead_decrypt, - .ivsize = AES_BLOCK_SIZE, + .ivsize = GCM_AES_IV_SIZE, .maxauthsize = AES_BLOCK_SIZE, .base = {