Received: by 10.213.65.68 with SMTP id h4csp302455imn; Fri, 23 Mar 2018 05:07:01 -0700 (PDT) X-Google-Smtp-Source: AG47ELuV9IPSgK5F6qis6dQSHGOvJTcpmD/Q34QoHExytJ7mBzgu5FNmfFwUkjYRJs1nqhtfCssa X-Received: by 10.99.127.89 with SMTP id p25mr19862351pgn.293.1521806821143; Fri, 23 Mar 2018 05:07:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521806821; cv=none; d=google.com; s=arc-20160816; b=buGG+/zlsWVGRJ53NPWSjNGkULKdJtji0pKfw+4Ie+yl/t1vSF6xctJxSkY9mqFKXy /LjrV8D4AnQv9sm6/FXj5p6hCU8mzn1mE4pMw5K/yjw8ljZCtDzU3Losg3916aOpp1uX rT+L23ht6Ith76v/Rif8N4RXgCrMutVIvJEWoGDtsWYYVoqU+bNC5q5kJc18LBn8jB6A T+2sI+topaaOUtcCihJh0+8CW55UdWSn1FID2u0tSKuo3MJwNqu19mptBLPpt2xSm63I 0smCgXlzmXP1sfc2K0vDKP+0hUHA6ZaA7ovQEs6Xgr9fLRp1Q/MxsBj5sQawCfMzMIib keNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=RbdeILOynkcn4EW7d2Hf4cbsiujwVEcsvNWh/47eMjk=; b=TDIbEBLyOrBdP/Gy1BHBzw8593KlCQ+UvGebHIG9o/+YIzIZAOzejteaOvpVx+SG4N tQ7f3kAagnLiZl1rSwEhx448aK3H0KcvmsqBSydgm5/5DjWIY+MJh1nzdbSl4yMz82/v cTKdzMYwVAdiAXpZYNaPCRupMy+oi2dA1oyjy+rxV9SbTsEArNiHXhXnndvp2t8NAFsf VRr9v7f/5sFJJDQhed1oBV+wZD42B41f2SQggKAuxzXF1896GqwexStVhvCSiMp7nzsL 1umjuKodwAuQviCM+yYdgn8YAiR16K5gxGDNc8JG7vB90D6P0sUIDgRpCDmCJQG2d6PY kTqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id az5-v6si8167449plb.617.2018.03.23.05.06.42; Fri, 23 Mar 2018 05:07:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753740AbeCWMFW (ORCPT + 99 others); Fri, 23 Mar 2018 08:05:22 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:36048 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753286AbeCWJ7N (ORCPT ); Fri, 23 Mar 2018 05:59:13 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id A403F135B; Fri, 23 Mar 2018 09:59:12 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lars Persson , Herbert Xu , Sasha Levin Subject: [PATCH 4.15 74/84] crypto: artpec6 - set correct iv size for gcm(aes) Date: Fri, 23 Mar 2018 10:54:28 +0100 Message-Id: <20180323095423.113300760@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180323095411.913234798@linuxfoundation.org> References: <20180323095411.913234798@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Lars Persson [ Upstream commit 6d6e71feb183aa588c849e20e7baa47cb162928a ] The IV size should not include the 32 bit counter. Because we had the IV size set as 16 the transform only worked when the IV input was zero padded. Fixes: a21eb94fc4d3 ("crypto: axis - add ARTPEC-6/7 crypto accelerator driver") Signed-off-by: Lars Persson Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/axis/artpec6_crypto.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/drivers/crypto/axis/artpec6_crypto.c +++ b/drivers/crypto/axis/artpec6_crypto.c @@ -22,6 +22,7 @@ #include #include +#include #include #include #include @@ -1934,7 +1935,7 @@ static int artpec6_crypto_prepare_aead(s memcpy(req_ctx->hw_ctx.J0, areq->iv, crypto_aead_ivsize(cipher)); // The HW omits the initial increment of the counter field. - crypto_inc(req_ctx->hw_ctx.J0+12, 4); + memcpy(req_ctx->hw_ctx.J0 + GCM_AES_IV_SIZE, "\x00\x00\x00\x01", 4); ret = artpec6_crypto_setup_out_descr(common, &req_ctx->hw_ctx, sizeof(struct artpec6_crypto_aead_hw_ctx), false, false); @@ -2956,7 +2957,7 @@ static struct aead_alg aead_algos[] = { .setkey = artpec6_crypto_aead_set_key, .encrypt = artpec6_crypto_aead_encrypt, .decrypt = artpec6_crypto_aead_decrypt, - .ivsize = AES_BLOCK_SIZE, + .ivsize = GCM_AES_IV_SIZE, .maxauthsize = AES_BLOCK_SIZE, .base = {