Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp6236371ybe; Tue, 17 Sep 2019 23:32:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqwyiDmIjsmjUssVz8BErUel0W4/ihKm+WuzvX87atd4vq91FOM2fHfrWiRWMXXwBENkicr+ X-Received: by 2002:a50:e611:: with SMTP id y17mr8581240edm.66.1568788341563; Tue, 17 Sep 2019 23:32:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568788341; cv=none; d=google.com; s=arc-20160816; b=giY45cG8GW/kIdQIlVyE6cD9czLNP5ulol4PTwhtoGf+RS45RzIAO4RpW79qdGPUSb s3IJldPtLfd93xTtLSZ7VXbQfpds+l/CswabL2ERpkLt7K2wC5FeuILy9TFqFH8IcHoZ m+q64OyVMK3GMYJqB1dmzsL9bVyddf1QodKp/r+zeEXIM5lgXpp9UbF3Z8BM94eWyytC Dt8xw6M9csY1ahrI5J4W3iFFRrabxoFIReIMvvXmDlIvw+nAp9QyVZwnNUL6owVkZi/D 2+6u+Qz3n3bel3zh6eN+uXWLxZXrqf5/X+uZf1ebAvmRe4LIjVahE02/G5cxmXubX3FX 4wEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VXTBxiOFXpFTyuyO+r5eEqVgs9NaK412xsWUeFggPMY=; b=S5wroyCSTE1s7IW77fawj1FvwtThZrtIdlhBWGojwaC1eGA74rnflpstvLxr/R9sLk sVSWrItsXkuV9V619DtUqn1v0NLpuniboFAyqtEie7eAFXIwBZqMHwgN1F/+pQKQmk+Q J2lUxBNHlWvRhNnjiSYh8Yi53qaAonH8rW6lbhUrxsUgajIRgsG+cAjDHjFzLAscKPW/ qT46XUz3cSgZT+PWtvowAnJKblCtA2eUj5P1UpYypE2sjl9SaPUvLjghKITm5Ta4jbJJ C2a0XA0BY/8exDX3d9uH9QItg9SAhUVph7DY9iLcR2xXpJVBiR48zUwri9/atkt8iuFa KgBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IALmzrmg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h28si2598153edh.278.2019.09.17.23.31.58; Tue, 17 Sep 2019 23:32:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IALmzrmg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729391AbfIRG27 (ORCPT + 99 others); Wed, 18 Sep 2019 02:28:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:48418 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729122AbfIRG0t (ORCPT ); Wed, 18 Sep 2019 02:26:49 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A6F5B21D56; Wed, 18 Sep 2019 06:26:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568788009; bh=bPu+3/4phbDt9hZkGJVn6zyvmoiw/xdIracbcaOFdgI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IALmzrmgBAYXJBHg2Ad3NLWI/IYfUfXZ+O8oWUwJe3nuIKuqNAO3X5u26QavuAS0M 8qoEWAyuMScH7JSz/V3C7/yjZdkfBkav6eAelCoCBmtHpzRn17XXgclqMJ9F4Lu1e/ sgjSlnhSUaS1r5D9VjLWbEy+1zFhhyLr5f9BdwJ8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe Leroy , Herbert Xu Subject: [PATCH 5.2 66/85] crypto: talitos - fix ECB algs ivsize Date: Wed, 18 Sep 2019 08:19:24 +0200 Message-Id: <20190918061237.504666613@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190918061234.107708857@linuxfoundation.org> References: <20190918061234.107708857@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe Leroy commit d84cc9c9524ec5973a337533e6d8ccd3e5f05f2b upstream. ECB's ivsize must be 0. Signed-off-by: Christophe Leroy Fixes: 5e75ae1b3cef ("crypto: talitos - add new crypto modes") Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/talitos.c | 3 --- 1 file changed, 3 deletions(-) --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -2814,7 +2814,6 @@ static struct talitos_alg_template drive .cra_ablkcipher = { .min_keysize = AES_MIN_KEY_SIZE, .max_keysize = AES_MAX_KEY_SIZE, - .ivsize = AES_BLOCK_SIZE, .setkey = ablkcipher_aes_setkey, } }, @@ -2849,7 +2848,6 @@ static struct talitos_alg_template drive .cra_ablkcipher = { .min_keysize = DES_KEY_SIZE, .max_keysize = DES_KEY_SIZE, - .ivsize = DES_BLOCK_SIZE, .setkey = ablkcipher_des_setkey, } }, @@ -2885,7 +2883,6 @@ static struct talitos_alg_template drive .cra_ablkcipher = { .min_keysize = DES3_EDE_KEY_SIZE, .max_keysize = DES3_EDE_KEY_SIZE, - .ivsize = DES3_EDE_BLOCK_SIZE, .setkey = ablkcipher_des3_setkey, } },