Hi Grzegorz,






IV generator "eseqiv" adds one block more with "seq of SA" to the "src" 

packet which is being encrypted with "IV salt" and send as IV.



Change your default IV generation method to "chainiv" and you'll solve the 



issue.Proposed patch is something like:







--- linux-3.14.4/crypto/cbc.c   2014-05-13 14:33:14.000000000 +0300







+++ linux-3.14.4-mod/crypto/cbc.c       2014-06-01 09:26:18.311525275 +0300







@@ -255,6 +255,7 @@







        inst->alg.cra_blkcipher.setkey = crypto_cbc_setkey;







         inst->alg.cra_blkcipher.encrypt = crypto_cbc_encrypt;







        inst->alg.cra_blkcipher.decrypt = crypto_cbc_decrypt;







+       inst->alg.cra_blkcipher.geniv = "chainiv";















 out_put_alg:







         crypto_mod_put(alg);















Regads,



Todor

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to