struct caam_ctx *ctx = crypto_aead_ctx(aead);
        unsigned int ivsize = crypto_aead_ivsize(aead);
        u32 *desc = edesc->hw_desc;
-       bool generic_gcm = (ivsize == 12);
+       bool generic_gcm = (ivsize == GCM_AES_IV_SIZE);
        unsigned int last;
 
        init_aead_job(req, edesc, all_contig, encrypt);
 
        /* Read GCM IV */
        append_cmd(desc, CMD_FIFO_LOAD | FIFOLD_CLASS_CLASS1 | IMMEDIATE |
-                        FIFOLD_TYPE_IV | FIFOLD_TYPE_FLUSH1 | 12 | last);
+                        FIFOLD_TYPE_IV | FIFOLD_TYPE_FLUSH1 | GCM_AES_IV_SIZE | last);
        /* Append Salt */
        if (!generic_gcm)
                append_data(desc, ctx->key + ctx->cdata.keylen, 4);
                        .setauthsize = rfc4106_setauthsize,
                        .encrypt = ipsec_gcm_encrypt,
                        .decrypt = ipsec_gcm_decrypt,
-                       .ivsize = 8,
+                       .ivsize = GCM_RFC4106_IV_SIZE,
                        .maxauthsize = AES_BLOCK_SIZE,
                },
                .caam = {
                        .setauthsize = rfc4543_setauthsize,
                        .encrypt = ipsec_gcm_encrypt,
                        .decrypt = ipsec_gcm_decrypt,
-                       .ivsize = 8,
+                       .ivsize = GCM_RFC4543_IV_SIZE,
                        .maxauthsize = AES_BLOCK_SIZE,
                },
                .caam = {
                        .setauthsize = gcm_setauthsize,
                        .encrypt = gcm_encrypt,
                        .decrypt = gcm_decrypt,
-                       .ivsize = 12,
+                       .ivsize = GCM_AES_IV_SIZE,
                        .maxauthsize = AES_BLOCK_SIZE,
                },
                .caam = {