diff options
| author | Horia Geantă <[email protected]> | 2020-02-28 08:51:23 +0200 |
|---|---|---|
| committer | Herbert Xu <[email protected]> | 2020-03-06 12:28:25 +1100 |
| commit | 3a5a9e1ef37b030b836d92df8264f840988f4a38 (patch) | |
| tree | 5a252c1617e85629c0a43255761aaa93cccc0238 /tools/perf/scripts/python | |
| parent | a83880068845d4973cdb7aeb52f870c5ce5b146c (diff) | |
crypto: caam/qi2 - fix chacha20 data size error
HW generates a Data Size error for chacha20 requests that are not
a multiple of 64B, since algorithm state (AS) does not have
the FINAL bit set.
Since updating req->iv (for chaining) is not required,
modify skcipher descriptors to set the FINAL bit for chacha20.
[Note that for skcipher decryption we know that ctx1_iv_off is 0,
which allows for an optimization by not checking algorithm type,
since append_dec_op1() sets FINAL bit for all algorithms except AES.]
Also drop the descriptor operations that save the IV.
However, in order to keep code logic simple, things like
S/G tables generation etc. are not touched.
Cc: <[email protected]> # v5.3+
Fixes: 334d37c9e263 ("crypto: caam - update IV using HW support")
Signed-off-by: Horia Geantă <[email protected]>
Tested-by: Valentin Ciocoi Radulescu <[email protected]>
Signed-off-by: Herbert Xu <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions