Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp315246pxt; Fri, 6 Aug 2021 02:45:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxNkTHXpvTth386DlkHiabxtCgVAkVuKA13sSl872yk3JwMKMGnD4vfxaIpf2XRGzHb+D97 X-Received: by 2002:a5e:c311:: with SMTP id a17mr512786iok.22.1628243148351; Fri, 06 Aug 2021 02:45:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628243148; cv=none; d=google.com; s=arc-20160816; b=MLtAarCc813n69GvJWmsUNNY9ahVer5Sek7Z0qrYfnJXuk/86fwvwuBbRWj1XciPfM k6Ui/dfkYx9KV/pgBYMbgtVHQUwmstH10Q3dzSWNSBEbgFv0uiqksEE8lQusfIwX7wBW 5aRQg5m0ML+yEkl20koTbztQtbZO+72BjwTb6pTZkIYtohdtLx+9ZL/N58D5fokBdstr XWQFkJxxndxiv8mgg+Osa3QVpVfG9yxx8yz7BkcN9AU8heoJEw5bTX2l1bcZZYcyYzZ+ bmci0dFvB+S6nNiiOl43DetSAYyCY2nUe7C6lLp6RxuvVqe1qZ6f5KrpsG3701y6W0VZ +hzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=rivOli/YvIIjV/U6YpCl7Eayik3KvJ/OEdPxZ4wCuXo=; b=RVlGMRP9pnsNmoBR+vkf1724A5i05QPIb3y6evzSI9fzT9pfQmocNTGDNlhpQVvVin qw4umgeQTLASrn9+JqZcKBECcQVMcfouOME7Go2q/hoW5g7u3mFdTwuslm5JlYT3wdSw U9BrAeEo8PzsGkurk9679YekFAfztLcqruyOCiTv3Y3in9wTK5cf9tq9KBBk6Ga7K2ql Kjm4Fnql6fnxm0enNY394eQSVqcNaUHheHrEP1M17sSZzaooCoVJd7+2P6WVmor0ILf0 Pvigjjx0MGny58F37lSU6guspJci+RlsRH4bNUWO2IeeaHqCLW2dajBxcTfzGPCtLNHz Z2DQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w63si3083558jaw.19.2021.08.06.02.45.28; Fri, 06 Aug 2021 02:45:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244664AbhHFJpl (ORCPT + 99 others); Fri, 6 Aug 2021 05:45:41 -0400 Received: from szxga03-in.huawei.com ([45.249.212.189]:13289 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242840AbhHFJpk (ORCPT ); Fri, 6 Aug 2021 05:45:40 -0400 Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.56]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4Gh0p61Fllz83Ms; Fri, 6 Aug 2021 17:40:30 +0800 (CST) Received: from dggpeml500012.china.huawei.com (7.185.36.15) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Fri, 6 Aug 2021 17:45:23 +0800 Received: from huawei.com (10.69.192.56) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Fri, 6 Aug 2021 17:45:23 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH v2 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930 Date: Fri, 6 Aug 2021 17:44:22 +0800 Message-ID: <1628243066-32648-2-git-send-email-yekai13@huawei.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1628243066-32648-1-git-send-email-yekai13@huawei.com> References: <1628243066-32648-1-git-send-email-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Fixup icv(integrity check value) checking enabled wrong on Kunpeng 930 Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index 6a45bd23..bf93c98 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -1614,7 +1614,7 @@ static void sec_auth_bd_fill_ex_v3(struct sec_auth_ctx *ctx, int dir, sqe3->auth_mac_key |= cpu_to_le32((u32)SEC_AUTH_TYPE1); sqe3->huk_iv_seq &= SEC_CIPHER_AUTH_V3; } else { - sqe3->auth_mac_key |= cpu_to_le32((u32)SEC_AUTH_TYPE1); + sqe3->auth_mac_key |= cpu_to_le32((u32)SEC_AUTH_TYPE2); sqe3->huk_iv_seq |= SEC_AUTH_CIPHER_V3; } sqe3->a_len_key = cpu_to_le32(c_req->c_len + aq->assoclen); -- 2.7.4