Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp315402pxt; Fri, 6 Aug 2021 02:46:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzlG5YAak2pNY5jYS3CUvHoikjgKDR1rC14n2LiA2Wj5yJyrHNguXDgr8gmha3P03HpvYqp X-Received: by 2002:a05:6e02:611:: with SMTP id t17mr39538ils.216.1628243163026; Fri, 06 Aug 2021 02:46:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628243163; cv=none; d=google.com; s=arc-20160816; b=WsmEjrylk0Re6xl7LQ8eqk9SLA5nurVyHaJKHQll2+8Z94p4EUv5m9b5TtRnz6xT5j FjjQAzyRxOBXgxILJ/CnYgaH/HqMkKIUZ55ih6TE3iLIZfoe0lWWGe6wqIgxqcogsO7c isq8rCp3BPxwwMnycQ1hNW59c9VOYvPjKLsEokQ9YLuihciT5T+Z/ZrDHJL2zMpp1Vpp IOxtSIT7g928TBpR5XVRdGKcb8987B7VDTVH/8YSdW1sqOoU162nWBYCtZYqVlb4q39p J2LPb54uR5ojGgIk0E299jwV7aL8KwM8nNaREI9unsFSoHED5gLBlqJbZjPlzJYIsWOz 5GbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=LsYm+chBT4cyFb1aTKcfpj5s7r73/NT2TsYdH72UjZM=; b=JW9hxl0dtr2OGtkzVxx+3HK+rSKP/ORVdLpQV+fTA/XkQHshF6UV0zeZh7zHoDYiJ4 uVwZE6kHXGSjoIet0MyHjm7NYphFNOGmvSfyvVqJfkkXkLv3tYo3QKFFKe6htR5jypRq eazn1RwrV8CxcP3nJre2L6RQFFbWFj5XZUWhDzmE5But1rW/qroW3buaN6nUaiiasIHn pSDCllkhYpcC2SlKy4JBTU1tid4T3LiTooVMRwEdWheT093a39/t7hB6cVL5MCtPRaEV 8RoPprbvsQpWO3HvMx5u3+PyoJO3gxoYDSPrTmrod49vSTrKRN6O58vRUSukfu6FX2ah dpzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x1si7615496ilp.101.2021.08.06.02.45.51; Fri, 06 Aug 2021 02:46:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244684AbhHFJps (ORCPT + 99 others); Fri, 6 Aug 2021 05:45:48 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:13394 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242840AbhHFJpo (ORCPT ); Fri, 6 Aug 2021 05:45:44 -0400 Received: from dggemv711-chm.china.huawei.com (unknown [172.30.72.54]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4Gh0qh0Pb2zclVs; Fri, 6 Aug 2021 17:41:52 +0800 (CST) Received: from dggpeml500012.china.huawei.com (7.185.36.15) by dggemv711-chm.china.huawei.com (10.1.198.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Fri, 6 Aug 2021 17:45:23 +0800 Received: from huawei.com (10.69.192.56) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Fri, 6 Aug 2021 17:45:23 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure Date: Fri, 6 Aug 2021 17:44:23 +0800 Message-ID: <1628243066-32648-3-git-send-email-yekai13@huawei.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1628243066-32648-1-git-send-email-yekai13@huawei.com> References: <1628243066-32648-1-git-send-email-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Modify the print of information that might lead to user misunderstanding. Currently only XTS mode need the fallback tfm when using 192bit key. Others algs not need soft fallback tfm. So others algs can return directly. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index bf93c98..890faf8 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -641,15 +641,15 @@ static int sec_skcipher_fbtfm_init(struct crypto_skcipher *tfm) struct sec_cipher_ctx *c_ctx = &ctx->c_ctx; c_ctx->fallback = false; + + /* Currently, only XTS mode need fallback tfm when using 192bit key */ if (likely(strncmp(alg, "xts", SEC_XTS_NAME_SZ))) return 0; c_ctx->fbtfm = crypto_alloc_sync_skcipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); - if (IS_ERR(c_ctx->fbtfm)) { - pr_err("failed to alloc fallback tfm!\n"); - return PTR_ERR(c_ctx->fbtfm); - } + if (IS_ERR(c_ctx->fbtfm)) + c_ctx->fbtfm = NULL; return 0; } @@ -808,7 +808,7 @@ static int sec_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key, } memcpy(c_ctx->c_key, key, keylen); - if (c_ctx->fallback) { + if (c_ctx->fallback && c_ctx->fbtfm) { ret = crypto_sync_skcipher_setkey(c_ctx->fbtfm, key, keylen); if (ret) { dev_err(dev, "failed to set fallback skcipher key!\n"); @@ -2032,13 +2032,12 @@ static int sec_skcipher_soft_crypto(struct sec_ctx *ctx, struct skcipher_request *sreq, bool encrypt) { struct sec_cipher_ctx *c_ctx = &ctx->c_ctx; + SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, c_ctx->fbtfm); struct device *dev = ctx->dev; int ret; - SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, c_ctx->fbtfm); - if (!c_ctx->fbtfm) { - dev_err(dev, "failed to check fallback tfm\n"); + dev_err_ratelimited(dev, "the soft tfm isn't supported in the current system.\n"); return -EINVAL; } -- 2.7.4