Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp962484ybm; Tue, 21 May 2019 06:37:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqwxP+wvjy/SI47Yg88TINrj9pqft6y96Xq785zEdhGCUwDx4qWKUWHPvOfC1Z6+PmpYa8ru X-Received: by 2002:a05:6a00:43:: with SMTP id i3mr8988858pfk.113.1558445831364; Tue, 21 May 2019 06:37:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558445831; cv=none; d=google.com; s=arc-20160816; b=mFroaISSa9vwuCdaKEEXA++3elkCIC+STet1f5NvxC4LzMLiueMj3TLNvplOgofCNW 6ApfT41ZvwabBMkVa5caRZfC6+5KMdYQ57VD8Mjd6k7ztI72/k44wOAW4o9lXtFhAhkL EKcyIDrAbD4XLKU9L/Bw6ojjB9J5dnt1ecjJCJbvKx3d63VKF+V1YtBBlLUdzYJQPcjX My3ZYV1/zSdHAidlROz2eykFo78vYtD5Ch9Ysnf8o+P7hn6yAwxSO674jlbQenL+Qxsx 22E6E5ehOT14jpx17hTh54x/UOWpDsYJROdhFo6Aqs99LZGqC9XY2eSyFyPeyofQDv4l g3Zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:references :in-reply-to:message-id:dkim-signature; bh=cLZS8AdXalh4PzV0bR7pQ1Sxvy0G/j9ji4WXIDqtpwI=; b=MiV338sK1qoBc+eMehrI7VCsigmB2BSbdRmbea1zeVPWCfFjdHEuURHNO8kp8bBpHK YszMQetJ/jp8oxUN3iNr7Z3kdwTASj9ZK0yXb2+H0lgXoqMjMNCGlpcf5eXR1zR5PyL5 w7tocybCi6DAZgmWkNt4oH7IJqxcrZoY7qAp0KJBHMLW61FUjeJca9CQq48NzLF5yyqI DUF55GIqAWE2x4mpR9t1C0tTgtpBHUfPkT8fsTUeWXBPavPvV+mjs+J9oZKVu2cZnVur JXO20DPybdsbf2xLg+J/dshzvLjgRWcdS2sB8QPENamVY9Cw901J6CVLSIjQWmLwve7k BHkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=Kt4XQouE; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 4si20806634plb.158.2019.05.21.06.36.57; Tue, 21 May 2019 06:37:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=Kt4XQouE; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728271AbfEUNev (ORCPT + 99 others); Tue, 21 May 2019 09:34:51 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:58231 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728483AbfEUNeT (ORCPT ); Tue, 21 May 2019 09:34:19 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 457cDl1yBFz9v2XZ; Tue, 21 May 2019 15:34:15 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=Kt4XQouE; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id iwtYlESuu9Kd; Tue, 21 May 2019 15:34:15 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 457cDl0tlvz9v2XY; Tue, 21 May 2019 15:34:15 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1558445655; bh=cLZS8AdXalh4PzV0bR7pQ1Sxvy0G/j9ji4WXIDqtpwI=; h=In-Reply-To:References:From:Subject:To:Cc:Date:From; b=Kt4XQouEVoV3bK3qT7gYJ1mH9Q75z7SCEHD0wJ6s6FFnxrETevOavUQSVATniakNS u1ya1D5vjE11GTBieauBXEgSkxPvrcz1A+7H2r/2rkHyCM4+FHx0qbl7S1hNA5A8OD OIunSixYf3pQIzjgpC111YUavjG4t3PUQJUFLfvw= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 5289C8B80C; Tue, 21 May 2019 15:34:16 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id DqbakKfmM1fP; Tue, 21 May 2019 15:34:16 +0200 (CEST) Received: from po16846vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 256F68B803; Tue, 21 May 2019 15:34:16 +0200 (CEST) Received: by po16846vm.idsi0.si.c-s.fr (Postfix, from userid 0) id F3C7E68479; Tue, 21 May 2019 13:34:15 +0000 (UTC) Message-Id: <38dd4f4ddf05091a43965aebea89543ca4bdbcb8.1558445259.git.christophe.leroy@c-s.fr> In-Reply-To: References: From: Christophe Leroy Subject: [PATCH v1 09/15] crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking. To: Herbert Xu , "David S. Miller" , horia.geanta@nxp.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Tue, 21 May 2019 13:34:15 +0000 (UTC) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org In that mode, hardware ICV verification is not supported. Signed-off-by: Christophe Leroy Fixes: 7405c8d7ff97 ("crypto: talitos - templates for AEAD using HMAC_SNOOP_NO_AFEU") --- drivers/crypto/talitos.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c index a15aa6d6ec33..e35581d67315 100644 --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -1545,7 +1545,8 @@ static int aead_decrypt(struct aead_request *req) if (IS_ERR(edesc)) return PTR_ERR(edesc); - if ((priv->features & TALITOS_FTR_HW_AUTH_CHECK) && + if ((edesc->desc.hdr & DESC_HDR_TYPE_IPSEC_ESP) && + (priv->features & TALITOS_FTR_HW_AUTH_CHECK) && ((!edesc->src_nents && !edesc->dst_nents) || priv->features & TALITOS_FTR_SRC_LINK_TBL_LEN_INCLUDES_EXTENT)) { -- 2.13.3