MLK-9710-15 Correct size of padded key buffers

Correct size of padded key buffers for the Secure Memory test module.

Signed-off-by: Steve Cornelius <steve.cornelius@freescale.com>
(cherry picked from commit da77cf5583c064deefd09a5e91851ab4398701a0)
Signed-off-by: Dan Douglass <dan.douglass@freescale.com>
Signed-off-by: Vipul Kumar <vipul_kumar@mentor.com>
This commit is contained in:
Steve Cornelius 2013-08-02 14:19:27 -07:00 committed by Leonard Crestez
parent 022fc2b33f
commit 8d3e8c3c4d

View File

@ -91,8 +91,10 @@ int caam_sm_example_init(struct platform_device *pdev)
u32 unit, units;
int rtnval = 0;
u8 clrkey8[8], clrkey16[16], clrkey24[24], clrkey32[32];
u8 blkkey8[16], blkkey16[16], blkkey24[24], blkkey32[32];
u8 rstkey8[16], rstkey16[16], rstkey24[24], rstkey32[32];
u8 blkkey8[AES_BLOCK_PAD(8)], blkkey16[AES_BLOCK_PAD(16)];
u8 blkkey24[AES_BLOCK_PAD(24)], blkkey32[AES_BLOCK_PAD(32)];
u8 rstkey8[AES_BLOCK_PAD(8)], rstkey16[AES_BLOCK_PAD(16)];
u8 rstkey24[AES_BLOCK_PAD(24)], rstkey32[AES_BLOCK_PAD(32)];
u8 __iomem *blob8, *blob16, *blob24, *blob32;
u32 keyslot8, keyslot16, keyslot24, keyslot32 = 0;