crypto: caam - fix IV loading for authenc (giv)decryption
authorHoria Geantă <horia.geanta@nxp.com>
Mon, 29 Aug 2016 11:52:14 +0000 (14:52 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 15 Sep 2016 06:27:53 +0000 (08:27 +0200)
commitf973851a595969f2a57f81e3c915cc116ae5a74f
tree950b8548f78fbb093b58db54bf7181e0c4c927ff
parentf964b3b368b59cc03e26d3f5b5226432b22d9a0d
crypto: caam - fix IV loading for authenc (giv)decryption

commit 8b18e2359aff2ab810aba84cebffc9da07fef78f upstream.

For algorithms that implement IV generators before the crypto ops,
the IV needed for decryption is initially located in req->src
scatterlist, not in req->iv.

Avoid copying the IV into req->iv by modifying the (givdecrypt)
descriptors to load it directly from req->src.
aead_givdecrypt() is no longer needed and goes away.

Fixes: 479bcc7c5b9e ("crypto: caam - Convert authenc to new AEAD interface")
Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/crypto/caam/caamalg.c