Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp106931pxv; Fri, 30 Jul 2021 20:28:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz+zBSbkwGS5OIDaDIok6KMpti6DeXesGDxb+rbfA9DYvcYpMKvh6TWEDMuNCbVTfibovvR X-Received: by 2002:a17:906:8463:: with SMTP id hx3mr5784506ejc.422.1627702092901; Fri, 30 Jul 2021 20:28:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627702092; cv=none; d=google.com; s=arc-20160816; b=Umnqp6IqHmt2gzN7GSR/NANTtanHbtSoOM84d5XzEge7MFZxwf2wad38m8EGucynr8 J2os65XkMV8Zk1n210HubGfLW5QUmI7GZvu0ryfSMjdWBX+psep7iphBU7Mar7GyfKRE QjkOIdqavFZk9MWkvdCck8nvMjlDSIUT5PevGVta6WHXHwQh57loRxMFPsF6uc0YDBeL sqyNlDrpbACYoJzgfuvVTQ3qFzft/sK0cu/Mfcv7JFjMfh8trurtx8we5IgSDm5WUVCd 7dO/9wyhflK38goyUUINKsbLYHvYd30I4JtlqnnGV+gKlzsG9rSCdkbfcPZszy5l7zLc 9VJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=46TeXdXfAl1H8TE9FXlNLWVPutbkke89dELnvbwMbD0=; b=SkKZv2X56IQwj3zBvVNkKoJG2irueP+YrRfR2PM4n6Nek1FwRfQyGf6SAITSsfXEmK Id5zmGNXGlf+YSp5lgP2I/JMcmIdtbHSAt4qE7VgEHiGFnc3ya8fB6bHiGB7484py5lp upCUgKPH38hVpU5TJ1Q0dxqFVTA/An5M6JdZipwBa19jetRFvKudzqjzwM5DfBx2Idz4 FJdADiF5IBXO79F6fVpkbCpihNGrCdO9txl5adN2k/teACuCSXG3fD6r9a018NOT7zxF VJLtyGcqKZheDdtE3pqcCz9/D+u7RLpue/ai6QlUEg7TsEqyXux5bS1UHr7QOABNkVVL 6ujw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id og5si3264584ejc.380.2021.07.30.20.27.44; Fri, 30 Jul 2021 20:28:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231672AbhGaD1j (ORCPT + 99 others); Fri, 30 Jul 2021 23:27:39 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:7904 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231418AbhGaD1h (ORCPT ); Fri, 30 Jul 2021 23:27:37 -0400 Received: from dggemv704-chm.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4Gc8k62gwvz7wxD; Sat, 31 Jul 2021 11:23:42 +0800 (CST) Received: from dggpeml500012.china.huawei.com (7.185.36.15) by dggemv704-chm.china.huawei.com (10.3.19.47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 31 Jul 2021 11:27:29 +0800 Received: from huawei.com (10.69.192.56) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 31 Jul 2021 11:27:29 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure Date: Sat, 31 Jul 2021 11:26:33 +0800 Message-ID: <1627701996-4589-3-git-send-email-yekai13@huawei.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1627701996-4589-1-git-send-email-yekai13@huawei.com> References: <1627701996-4589-1-git-send-email-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Modify the print of information that might lead to user misunderstanding. Currently only XTS mode need the fallback tfm when using 192bit key. Others algs not need soft fallback tfm. So others algs can return directly. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index bf93c98..b3ac1bd 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -641,15 +641,15 @@ static int sec_skcipher_fbtfm_init(struct crypto_skcipher *tfm) struct sec_cipher_ctx *c_ctx = &ctx->c_ctx; c_ctx->fallback = false; + + /* Currently, only XTS mode need fallback tfm when using 192bit key */ if (likely(strncmp(alg, "xts", SEC_XTS_NAME_SZ))) return 0; c_ctx->fbtfm = crypto_alloc_sync_skcipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); - if (IS_ERR(c_ctx->fbtfm)) { - pr_err("failed to alloc fallback tfm!\n"); - return PTR_ERR(c_ctx->fbtfm); - } + if (IS_ERR(c_ctx->fbtfm)) + c_ctx->fbtfm = NULL; return 0; } @@ -808,7 +808,7 @@ static int sec_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key, } memcpy(c_ctx->c_key, key, keylen); - if (c_ctx->fallback) { + if (c_ctx->fallback && c_ctx->fbtfm) { ret = crypto_sync_skcipher_setkey(c_ctx->fbtfm, key, keylen); if (ret) { dev_err(dev, "failed to set fallback skcipher key!\n"); @@ -2032,13 +2032,12 @@ static int sec_skcipher_soft_crypto(struct sec_ctx *ctx, struct skcipher_request *sreq, bool encrypt) { struct sec_cipher_ctx *c_ctx = &ctx->c_ctx; + SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, c_ctx->fbtfm); struct device *dev = ctx->dev; int ret; - SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, c_ctx->fbtfm); - if (!c_ctx->fbtfm) { - dev_err(dev, "failed to check fallback tfm\n"); + dev_err(dev, "the soft tfm isn't supported in the current system.\n"); return -EINVAL; } -- 2.7.4