summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorCyrille Pitchen <cyrille.pitchen@atmel.com>2015-11-17 13:37:10 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2015-11-23 20:55:52 +0800
commitf18611da8683da19267e30187a191af7fa670206 (patch)
tree81c0cdc28514bbd9273c648dd388006ae61032a3
parent20ecae79e7aa7908810094e365e4c72a877fb87d (diff)
downloadop-kernel-dev-f18611da8683da19267e30187a191af7fa670206.zip
op-kernel-dev-f18611da8683da19267e30187a191af7fa670206.tar.gz
crypto: tcrypt - fix keysize argument of test_aead_speed for gcm(aes)
The key sizes used by AES in GCM mode should be 128, 192 or 256 bits (16, 24 or 32 bytes). There is no additional 4byte nonce as for RFC 4106. Signed-off-by: Cyrille Pitchen <cyrille.pitchen@atmel.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--crypto/tcrypt.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c
index 46a4a75..270bc4b 100644
--- a/crypto/tcrypt.c
+++ b/crypto/tcrypt.c
@@ -1789,7 +1789,7 @@ static int do_test(const char *alg, u32 type, u32 mask, int m)
test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec,
NULL, 0, 16, 16, aead_speed_template_20);
test_aead_speed("gcm(aes)", ENCRYPT, sec,
- NULL, 0, 16, 8, aead_speed_template_20);
+ NULL, 0, 16, 8, speed_template_16_24_32);
break;
case 212:
OpenPOWER on IntegriCloud