diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2016-10-11 19:15:13 +0100 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2016-10-21 11:03:42 +0800 |
commit | 1803b9a52c4e5a5dbb8a27126f6bc06939359753 (patch) | |
tree | 6dd1173576fe6ce4c9d49087e39b3dcea4afbc22 /arch/arm/mach-oxnas | |
parent | f16743e0c71a5d2811273b77638ff3a069aed1e2 (diff) | |
download | linux-1803b9a52c4e5a5dbb8a27126f6bc06939359753.tar.gz linux-1803b9a52c4e5a5dbb8a27126f6bc06939359753.tar.bz2 linux-1803b9a52c4e5a5dbb8a27126f6bc06939359753.zip |
crypto: arm64/aes-ce - fix for big endian
The core AES cipher implementation that uses ARMv8 Crypto Extensions
instructions erroneously loads the round keys as 64-bit quantities,
which causes the algorithm to fail when built for big endian. In
addition, the key schedule generation routine fails to take endianness
into account as well, when loading the combining the input key with
the round constants. So fix both issues.
Fixes: 12ac3efe74f8 ("arm64/crypto: use crypto instructions to generate AES key schedule")
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'arch/arm/mach-oxnas')
0 files changed, 0 insertions, 0 deletions