summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArd Biesheuvel <ard.biesheuvel@linaro.org>2016-11-29 18:23:36 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2016-11-30 13:01:51 +0100
commit81126d1a8bc23c72a13c05c4308dc6951afc3b45 (patch)
treefc0e9d000d4fcad5f7aa9f32651b95e7d8a94108
parentcrypto: chcr - Add AEAD algos. (diff)
downloadlinux-81126d1a8bc23c72a13c05c4308dc6951afc3b45.tar.xz
linux-81126d1a8bc23c72a13c05c4308dc6951afc3b45.zip
crypto: arm/aesbs - fix brokenness after skcipher conversion
The CBC encryption routine should use the encryption round keys, not the decryption round keys. Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--arch/arm/crypto/aesbs-glue.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm/crypto/aesbs-glue.c b/arch/arm/crypto/aesbs-glue.c
index f5eafce10557..d8e06de72ef3 100644
--- a/arch/arm/crypto/aesbs-glue.c
+++ b/arch/arm/crypto/aesbs-glue.c
@@ -113,7 +113,7 @@ static inline void aesbs_encrypt_one(struct crypto_skcipher *tfm,
{
struct aesbs_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
- AES_encrypt(src, dst, &ctx->dec.rk);
+ AES_encrypt(src, dst, &ctx->enc);
}
static int aesbs_cbc_encrypt(struct skcipher_request *req)