failures.
Patch 4: Added support for 48 byte-key_len in aes_xts.
Patch 5: fix for hmac(sha) extra test failure.
Devulapally Shiva Krishna (5):
Crypto/chcr: fix gcm-aes and rfc4106-gcm failed tests
Crypto/chcr: fix ctr, cbc, xts and rfc3686-ctr failed tests
Crypto/chcr: fix for ccm(aes) failed
e_cipher_resp().
Here also copying initial_iv in init_iv pointer for handling the fallback
case correctly.
Signed-off-by: Ayush Sawal
Signed-off-by: Devulapally Shiva Krishna
---
drivers/crypto/chelsio/chcr_algo.c | 42 ++--
drivers/crypto/chelsio/chcr_crypto.h | 1
: Devulapally Shiva Krishna
---
drivers/crypto/chelsio/chcr_algo.c | 16
1 file changed, 12 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypto/chelsio/chcr_algo.c
index c29b80dd30d8..e300eb32a9d3 100644
--- a/drivers/crypto/chelsio/chcr_algo.c
Added support for 48 byte key length for aes-xts.
Signed-off-by: Ayush Sawal
Signed-off-by: Devulapally Shiva Krishna
---
drivers/crypto/chelsio/chcr_algo.c | 27 +--
1 file changed, 25 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b
The hmac(sha) test fails for a zero length source text data.
For hmac(sha) minimum length of the data must be of block-size.
So fix this by including the data_len for the last block.
Signed-off-by: Ayush Sawal
Signed-off-by: Devulapally Shiva Krishna
---
drivers/crypto/chelsio/chcr_algo.c | 2
The ccm(aes) test fails when req->assoclen > ~240bytes.
The problem is the value assigned to auth_offset is wrong.
As auth_offset is unsigned char, it can take max value as 255.
So fix it by making it unsigned int.
Signed-off-by: Ayush Sawal
Signed-off-by: Devulapally Shiva K