diff options
author | Roel Kluin <roel.kluin@gmail.com> | 2010-01-08 14:18:34 +1100 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2010-01-08 14:18:34 +1100 |
commit | d7ac769068df87ca8c7f72d99cf67ead16739f18 (patch) | |
tree | c58f8f442f75d896a47e265c21553685b5c43820 /arch/s390/crypto/aes_s390.c | |
parent | 5068c7a883d1694f0fb3631b664827644153cd08 (diff) | |
download | kernel_goldelico_gta04-d7ac769068df87ca8c7f72d99cf67ead16739f18.zip kernel_goldelico_gta04-d7ac769068df87ca8c7f72d99cf67ead16739f18.tar.gz kernel_goldelico_gta04-d7ac769068df87ca8c7f72d99cf67ead16739f18.tar.bz2 |
crypto: aes_s390 - access .cip instead of .blk in cipher mode
The fallback code in cipher mode touch the union fallback.blk instead
of fallback.cip. This is wrong because we use the cipher and not the
blockcipher. This did not show any side effects yet because both types /
structs contain the same element right now.
Signed-off-by: Roel Kluin <roel.kluin@gmail.com>
Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'arch/s390/crypto/aes_s390.c')
-rw-r--r-- | arch/s390/crypto/aes_s390.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/arch/s390/crypto/aes_s390.c b/arch/s390/crypto/aes_s390.c index 6118890..9ed05bc 100644 --- a/arch/s390/crypto/aes_s390.c +++ b/arch/s390/crypto/aes_s390.c @@ -78,14 +78,14 @@ static int setkey_fallback_cip(struct crypto_tfm *tfm, const u8 *in_key, struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); int ret; - sctx->fallback.blk->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; - sctx->fallback.blk->base.crt_flags |= (tfm->crt_flags & + sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; + sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); if (ret) { tfm->crt_flags &= ~CRYPTO_TFM_RES_MASK; - tfm->crt_flags |= (sctx->fallback.blk->base.crt_flags & + tfm->crt_flags |= (sctx->fallback.cip->base.crt_flags & CRYPTO_TFM_RES_MASK); } return ret; |