crypto: aesni - disable "by8" AVX CTR optimization
authorMathias Krause <minipli@googlemail.com>
Tue, 23 Sep 2014 20:31:07 +0000 (22:31 +0200)
committerHerbert Xu <herbert@gondor.apana.org.au>
Wed, 24 Sep 2014 13:15:31 +0000 (21:15 +0800)
commit7da4b29d496b1389d3a29b55d3668efecaa08ebd
tree75ff49eaeec4f46476ffdd833b95961858d422c4
parentc9f21cb6388898bfe69886d001316dae7ecc9a4b
crypto: aesni - disable "by8" AVX CTR optimization

The "by8" implementation introduced in commit 22cddcc7df8f ("crypto: aes
- AES CTR x86_64 "by8" AVX optimization") is failing crypto tests as it
handles counter block overflows differently. It only accounts the right
most 32 bit as a counter -- not the whole block as all other
implementations do. This makes it fail the cryptomgr test #4 that
specifically tests this corner case.

As we're quite late in the release cycle, just disable the "by8" variant
for now.

Reported-by: Romain Francoise <romain@orebokech.com>
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Chandramouli Narayanan <mouli@linux.intel.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
arch/x86/crypto/aesni-intel_glue.c