Allow sizes smaller than the AES block size to fix this failure with CRYPTO_MANAGER_EXTRA_TESTS: alg: aead: artpec-gcm-aes decryption failed on test vector "random: alen=0 plen=1 authsize=4 klen=32 novrfy=0"; expected_error=0, actual_error=-22, cfg="random: inplace_one_sglist may_sleep use_final src_divs=[<reimport>9.71%@+778, <flush>23.43%@+2818, 52.69%@+6, <flush>11.98%@+1030, 2.19%@+3986] iv_offset=40 key_offset=32" Signed-off-by: Vincent Whitchurch <vincent.whitchurch@xxxxxxxx> --- drivers/crypto/axis/artpec6_crypto.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/crypto/axis/artpec6_crypto.c b/drivers/crypto/axis/artpec6_crypto.c index 938faf3afa69..b6fa2af42cd0 100644 --- a/drivers/crypto/axis/artpec6_crypto.c +++ b/drivers/crypto/axis/artpec6_crypto.c @@ -1452,8 +1452,6 @@ static int artpec6_crypto_aead_decrypt(struct aead_request *req) struct artpec6_crypto_aead_req_ctx *req_ctx = aead_request_ctx(req); req_ctx->decrypt = true; - if (req->cryptlen < AES_BLOCK_SIZE) - return -EINVAL; ret = artpec6_crypto_common_init(&req_ctx->common, &req->base, -- 2.34.1