diff options
author | Horia Geanta <horia.geanta@freescale.com> | 2012-08-02 17:16:37 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2012-08-28 23:56:26 +0800 |
commit | 60542505b0bccbc5e2e518c9dd6bee9a30546061 (patch) | |
tree | 26c11e2662308780dc4719e4254111414ad9d194 /CREDITS | |
parent | b286e00304f9c1d27b93753536ac5246a287dd55 (diff) | |
download | linux-60542505b0bccbc5e2e518c9dd6bee9a30546061.tar.bz2 |
crypto: talitos - fix icv management on outbound direction
For IPsec encryption, in the case when:
-the input buffer is fragmented (edesc->src_nents > 0)
-the output buffer is not fragmented (edesc->dst_nents = 0)
the ICV is not output in the link table, but after the encrypted payload.
Copying the ICV must be avoided in this case; consequently the condition
edesc->dma_len > 0 must be more specific, i.e. must depend on the type
of the output buffer - fragmented or not.
Testing was performed by modifying testmgr to support src != dst,
since currently native kernel IPsec does in-place encryption
(src == dst).
Signed-off-by: Horia Geanta <horia.geanta@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'CREDITS')
0 files changed, 0 insertions, 0 deletions