Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp106882pxv; Fri, 30 Jul 2021 20:28:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwaNlCJif8l0s+1FueQcH0IyfunLojaowX0hD8Ofo4lH/6UgrTKj7x9s/cBw4ypIPhO8q+F X-Received: by 2002:a92:7d08:: with SMTP id y8mr1502657ilc.111.1627702085563; Fri, 30 Jul 2021 20:28:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627702085; cv=none; d=google.com; s=arc-20160816; b=miGpUNqJkjoonIP0Ik83OGTPv02Y/YF508mGm+n06BgduQx08WCAt36avmYhWlHPx4 wInpxQIMDq5ktLSp+51ZzdKQ7OhM55FhkRM+IL1ZQdd5qbSlvRZENkD1YCTPhV+NXac1 kOGCb5vfDvUWPlMyd1VtmMo0aYXd9SrP/fd1caaOYe2fOPnCJMrlAf9Yszw6ruwsMUoe wD17K7AvLmYwW0Q/TLqiKvEfu1MVd/cwvsY2hpCFzteE2YTsaVsLnLnI7UTiIPqNokWw DFPV3oiKdQ95PLjgtJE6gOhW/W17M3BLKWeLlgdbfMiFVGCIdfFXu30a+F2PJ12FT1n/ xOtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=rivOli/YvIIjV/U6YpCl7Eayik3KvJ/OEdPxZ4wCuXo=; b=X9jEqPrRWeHi/uAD6ZVNVX/39RbXVMfUj8cflrydthchPwDCb0EGRBcEGFCOnkXkrl bFQMGnN07VRkbALEDa7nThpB702Z9V7b5tmO+x8vJtzrflCD9I7fOFgbXbKFlTThnVy+ Jh48N4asEcc6uNyovrsFAu0e6r8Q1kTchXQWgD7oMaoPqoWk6XBuFJawF527Qt6bqaee hVbnrr4899tFF9wXEsc4uBkGlCREFiMm6XwWtGIBTcRFMRyIL8lhVvKYjQAuWav/9Zxq fPK/Y/89o7C1DZncOUyZRBGY//Mgk7TcLTGvRK5R740EHXFfQSV6RsFBTUggqW+c3Iir /n0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v14si3951346ilj.0.2021.07.30.20.27.34; Fri, 30 Jul 2021 20:28:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231499AbhGaD1i (ORCPT + 99 others); Fri, 30 Jul 2021 23:27:38 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:7905 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231497AbhGaD1h (ORCPT ); Fri, 30 Jul 2021 23:27:37 -0400 Received: from dggemv711-chm.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4Gc8k744Clz82Nq; Sat, 31 Jul 2021 11:23:43 +0800 (CST) Received: from dggpeml500012.china.huawei.com (7.185.36.15) by dggemv711-chm.china.huawei.com (10.1.198.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 31 Jul 2021 11:27:29 +0800 Received: from huawei.com (10.69.192.56) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 31 Jul 2021 11:27:29 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930 Date: Sat, 31 Jul 2021 11:26:32 +0800 Message-ID: <1627701996-4589-2-git-send-email-yekai13@huawei.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1627701996-4589-1-git-send-email-yekai13@huawei.com> References: <1627701996-4589-1-git-send-email-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Fixup icv(integrity check value) checking enabled wrong on Kunpeng 930 Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index 6a45bd23..bf93c98 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -1614,7 +1614,7 @@ static void sec_auth_bd_fill_ex_v3(struct sec_auth_ctx *ctx, int dir, sqe3->auth_mac_key |= cpu_to_le32((u32)SEC_AUTH_TYPE1); sqe3->huk_iv_seq &= SEC_CIPHER_AUTH_V3; } else { - sqe3->auth_mac_key |= cpu_to_le32((u32)SEC_AUTH_TYPE1); + sqe3->auth_mac_key |= cpu_to_le32((u32)SEC_AUTH_TYPE2); sqe3->huk_iv_seq |= SEC_AUTH_CIPHER_V3; } sqe3->a_len_key = cpu_to_le32(c_req->c_len + aq->assoclen); -- 2.7.4