diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2016-10-11 19:15:18 +0100 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2016-10-21 11:03:45 +0800 |
commit | a2c435cc99862fd3d165e1b66bf48ac72c839c62 (patch) | |
tree | 5f9840591041b66c2b0ad91400b1f13345d86413 /arch/arm/crypto | |
parent | 56e4e76c68fcb51547b5299e5b66a135935ff414 (diff) |
crypto: arm64/aes-neon - fix for big endian
The AES implementation using pure NEON instructions relies on the generic
AES key schedule generation routines, which store the round keys as arrays
of 32-bit quantities stored in memory using native endianness. This means
we should refer to these round keys using 4x4 loads rather than 16x1 loads.
In addition, the ShiftRows tables are loading using a single scalar load,
which is also affected by endianness, so emit these tables in the correct
order depending on whether we are building for big endian or not.
Fixes: 49788fe2a128 ("arm64/crypto: AES-ECB/CBC/CTR/XTS using ARMv8 NEON and Crypto Extensions")
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'arch/arm/crypto')
0 files changed, 0 insertions, 0 deletions