esp: Don't require synchronous crypto fallback on offloading anymore.
We support asynchronous crypto on layer 2 ESP now. So no need to force synchronous crypto fallback on offloading anymore. Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
This commit is contained in:
parent
2271d5190e
commit
f58869c44f
|
@ -843,17 +843,13 @@ static int esp_init_aead(struct xfrm_state *x)
|
||||||
char aead_name[CRYPTO_MAX_ALG_NAME];
|
char aead_name[CRYPTO_MAX_ALG_NAME];
|
||||||
struct crypto_aead *aead;
|
struct crypto_aead *aead;
|
||||||
int err;
|
int err;
|
||||||
u32 mask = 0;
|
|
||||||
|
|
||||||
err = -ENAMETOOLONG;
|
err = -ENAMETOOLONG;
|
||||||
if (snprintf(aead_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
|
if (snprintf(aead_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
|
||||||
x->geniv, x->aead->alg_name) >= CRYPTO_MAX_ALG_NAME)
|
x->geniv, x->aead->alg_name) >= CRYPTO_MAX_ALG_NAME)
|
||||||
goto error;
|
goto error;
|
||||||
|
|
||||||
if (x->xso.offload_handle)
|
aead = crypto_alloc_aead(aead_name, 0, 0);
|
||||||
mask |= CRYPTO_ALG_ASYNC;
|
|
||||||
|
|
||||||
aead = crypto_alloc_aead(aead_name, 0, mask);
|
|
||||||
err = PTR_ERR(aead);
|
err = PTR_ERR(aead);
|
||||||
if (IS_ERR(aead))
|
if (IS_ERR(aead))
|
||||||
goto error;
|
goto error;
|
||||||
|
@ -883,7 +879,6 @@ static int esp_init_authenc(struct xfrm_state *x)
|
||||||
char authenc_name[CRYPTO_MAX_ALG_NAME];
|
char authenc_name[CRYPTO_MAX_ALG_NAME];
|
||||||
unsigned int keylen;
|
unsigned int keylen;
|
||||||
int err;
|
int err;
|
||||||
u32 mask = 0;
|
|
||||||
|
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (!x->ealg)
|
if (!x->ealg)
|
||||||
|
@ -909,10 +904,7 @@ static int esp_init_authenc(struct xfrm_state *x)
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (x->xso.offload_handle)
|
aead = crypto_alloc_aead(authenc_name, 0, 0);
|
||||||
mask |= CRYPTO_ALG_ASYNC;
|
|
||||||
|
|
||||||
aead = crypto_alloc_aead(authenc_name, 0, mask);
|
|
||||||
err = PTR_ERR(aead);
|
err = PTR_ERR(aead);
|
||||||
if (IS_ERR(aead))
|
if (IS_ERR(aead))
|
||||||
goto error;
|
goto error;
|
||||||
|
|
|
@ -752,17 +752,13 @@ static int esp_init_aead(struct xfrm_state *x)
|
||||||
char aead_name[CRYPTO_MAX_ALG_NAME];
|
char aead_name[CRYPTO_MAX_ALG_NAME];
|
||||||
struct crypto_aead *aead;
|
struct crypto_aead *aead;
|
||||||
int err;
|
int err;
|
||||||
u32 mask = 0;
|
|
||||||
|
|
||||||
err = -ENAMETOOLONG;
|
err = -ENAMETOOLONG;
|
||||||
if (snprintf(aead_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
|
if (snprintf(aead_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
|
||||||
x->geniv, x->aead->alg_name) >= CRYPTO_MAX_ALG_NAME)
|
x->geniv, x->aead->alg_name) >= CRYPTO_MAX_ALG_NAME)
|
||||||
goto error;
|
goto error;
|
||||||
|
|
||||||
if (x->xso.offload_handle)
|
aead = crypto_alloc_aead(aead_name, 0, 0);
|
||||||
mask |= CRYPTO_ALG_ASYNC;
|
|
||||||
|
|
||||||
aead = crypto_alloc_aead(aead_name, 0, mask);
|
|
||||||
err = PTR_ERR(aead);
|
err = PTR_ERR(aead);
|
||||||
if (IS_ERR(aead))
|
if (IS_ERR(aead))
|
||||||
goto error;
|
goto error;
|
||||||
|
@ -792,7 +788,6 @@ static int esp_init_authenc(struct xfrm_state *x)
|
||||||
char authenc_name[CRYPTO_MAX_ALG_NAME];
|
char authenc_name[CRYPTO_MAX_ALG_NAME];
|
||||||
unsigned int keylen;
|
unsigned int keylen;
|
||||||
int err;
|
int err;
|
||||||
u32 mask = 0;
|
|
||||||
|
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (!x->ealg)
|
if (!x->ealg)
|
||||||
|
@ -818,10 +813,7 @@ static int esp_init_authenc(struct xfrm_state *x)
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (x->xso.offload_handle)
|
aead = crypto_alloc_aead(authenc_name, 0, 0);
|
||||||
mask |= CRYPTO_ALG_ASYNC;
|
|
||||||
|
|
||||||
aead = crypto_alloc_aead(authenc_name, 0, mask);
|
|
||||||
err = PTR_ERR(aead);
|
err = PTR_ERR(aead);
|
||||||
if (IS_ERR(aead))
|
if (IS_ERR(aead))
|
||||||
goto error;
|
goto error;
|
||||||
|
|
Loading…
Reference in New Issue