Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp555521yba; Wed, 15 May 2019 06:09:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqzOllNUfF/siSpFohunMHyDUfiQzkuSDECty5d6gB3p0W7E429J7gjMO637a2ecuC/fDtab X-Received: by 2002:a62:75c6:: with SMTP id q189mr46158200pfc.98.1557925742327; Wed, 15 May 2019 06:09:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557925742; cv=none; d=google.com; s=arc-20160816; b=B/NSRiHvu2M479ZfS9UxlZPFIxUORtWxDz9PIy6ApQE5iHpEhZl82qhg1l85zgbtFo SI5nv48/0lmncKj9GumdV6+TXrf4/fzJy9PYw2I2O7izoIkgm+ynVpqPprqUSoSAfeLR JxcoY2uiRBra37tGJ/yMyz7P2JLb23z6mMyegTTo9wPV7TCDO4OC3PYDf/z7XDZMmgDN 9+prAWLowKNiZy9PG6e3UIb/ZctbOcdgc4JML630vEyK7xGgsJOSe7jc4/AFb9pC0F2O YQ2kIAcvRJUQfCrI/jNLG/U2pPOBJPicxRaHGt3WbDkYL3DkjF9jCYGZbP/m9De+jyDZ SsBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date; bh=y6Zm6rdq25uzeoS70FHeziVhmww1T5MIk3A3VOYPAY0=; b=cKuTPbmOcK07LoPyOSemcwP0p+SzSg7eSj+kKm3r03AEvWs2nmVnvUUknxD1Zk5576 Wotfl/Jrkg84pQEkXDNO5a10MRoyOfbp+7Ehv+Pbb0MKIVx9yxnDLjrWaA1TvG53ilYN u8oPP/FFHzOv9k1g2qcHNA97Qlb2LzpX1MUTfjcEkofcasgjD+aM7US9//1RNsgtJ706 NK1iL/oD3ADiYzVmVfWRNCxPd04W81ZD9LIENbQekih6cosH2mtcM3lMMZh7q9sNuX8H tONjM+bmY+F4lkF+CJFdNuB3I3dCLkvcRZC4Hhq9yz68BQoEm1/sdpozCbxu1RA3vtHV qGqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w8si1712847plz.301.2019.05.15.06.08.47; Wed, 15 May 2019 06:09:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727178AbfEONHt (ORCPT + 99 others); Wed, 15 May 2019 09:07:49 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:52733 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725977AbfEONHs (ORCPT ); Wed, 15 May 2019 09:07:48 -0400 Received: from ptx.hi.pengutronix.de ([2001:67c:670:100:1d::c0]) by metis.ext.pengutronix.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1hQtdL-0002wq-18; Wed, 15 May 2019 15:07:47 +0200 Received: from sha by ptx.hi.pengutronix.de with local (Exim 4.89) (envelope-from ) id 1hQtdK-00049I-HF; Wed, 15 May 2019 15:07:46 +0200 Date: Wed, 15 May 2019 15:07:46 +0200 From: Sascha Hauer To: linux-crypto@vger.kernel.org Cc: Horia =?utf-8?Q?Geant=C4=83?= , kernel@pengutronix.de Subject: ctr(aes) broken in CAAM driver Message-ID: <20190515130746.cvhkxxffrmmynfq3@pengutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-IRC: #ptxdist @freenode X-Accept-Language: de,en X-Accept-Content-Type: text/plain X-Uptime: 15:00:17 up 58 days, 10 min, 107 users, load average: 1.54, 1.28, 1.24 User-Agent: NeoMutt/20170113 (1.7.2) X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::c0 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, ctr(aes) is broken in current kernel (v5.1+). It may have been broken for longer, but the crypto tests now check for a correct output IV. The testmgr answers with: alg: skcipher: ctr-aes-caam encryption test failed (wrong output IV) on test vector 0, cfg="in-place" output IV is this, which is the last 16 bytes of the encrypted message: 00000000: 1e 03 1d da 2f be 03 d1 79 21 70 a0 f3 00 9c ee It should look like this instead, which is input IV + 4: 00000000: f0 f1 f2 f3 f4 f5 f6 f7 f8 f9 fa fb fc fd ff 03 I have no idea how to fix this as I don't know how to get the output IV back from the CAAM. Any ideas? Sascha -- Pengutronix e.K. | | Industrial Linux Solutions | http://www.pengutronix.de/ | Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |