Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp1397961ybm; Wed, 22 May 2019 23:52:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqylPpNkSaBcBgs9YOAl7b/lbGW8Jo7oRVNYZaR0Jucy5ibpGqLKF9xujxobdAUZBAtJEwGL X-Received: by 2002:a17:902:28ab:: with SMTP id f40mr67428536plb.295.1558594375024; Wed, 22 May 2019 23:52:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558594375; cv=none; d=google.com; s=arc-20160816; b=YkDDwT/DWl6Ca1HGmSEp1KMGGNAzdAXWSzUv7B2MzZW/+DjpAgbPtlYZea5OzcECG1 TJ81EEFcgYM9hIkyzG0Qf0s/4RrS29vRFoxKoFCMJp0X/qrJL4M80K1Msj/M8GsEWPkt wxXKIQ4hu51T5yREayJSYOcYcbY724UMlNSUo/0COcnEHNK9+oJYSoSZXBFLMJYBhohQ PqfIQJeCRWB02Dr5eaUEBdOSB1XfAJvy0TKE8TToP8aLlYD+1HTdFm4GRnoq5+x3vsCw Oxx+jHDrFxzwm65lq47xuC8b3HBXEU/ZKVzvaDYdNxcgfiDCyFDmKxE2/aOt5vJXstNf 8xyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=8l0qZqnwZC9oV5GLOSRo4uRoNOciMlJbYYvHtJKBtJA=; b=Mx3GLpJ7PBrbcywGkzsexUYsEbx1atTpwA7Re/or9UQbVFUvaf5D0CpYoxzGQqqKV0 fDDapFKkbBmdSppi+UubcBVOI/qylC9QgsXn0wyOKG/Dk/1SXyKJp6WtYG8c5xSwUEln azTStCoFL0jFOn3YUeKinl1DMLZkbXKuKkJntXlXwMcRLDA/EGKp0ubwSzyxmjW9+lVi 8V2LTjvb2Ga+w8h2Q2fssFFl0S81snZNtQQ3DoRgB/s7l4N18YqvmDGFhrQhSM3HzZRd x2CILcprZOtDjwDVkdkJhgxEkhOTuAhmffLmYhe0FiKieb+Eq1Jm+jwTxY616BR74X6B a4VQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i8si11636266pgs.220.2019.05.22.23.52.41; Wed, 22 May 2019 23:52:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726230AbfEWGwg (ORCPT + 99 others); Thu, 23 May 2019 02:52:36 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:47810 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725806AbfEWGwf (ORCPT ); Thu, 23 May 2019 02:52:35 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1hThac-0001qM-Hz; Thu, 23 May 2019 14:52:34 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1hThac-0006Cj-Ed; Thu, 23 May 2019 14:52:34 +0800 Date: Thu, 23 May 2019 14:52:34 +0800 From: Herbert Xu To: Christian Lamparter Cc: linux-crypto@vger.kernel.org Subject: Re: [PATCH] crypto: crypto4xx - fix AES CTR blocksize value Message-ID: <20190523065234.4ogebqc7ds526cft@gondor.apana.org.au> References: <20190517211557.25815-1-chunkeey@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190517211557.25815-1-chunkeey@gmail.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, May 17, 2019 at 11:15:57PM +0200, Christian Lamparter wrote: > This patch fixes a issue with crypto4xx's ctr(aes) that was > discovered by libcapi's kcapi-enc-test.sh test. > > The some of the ctr(aes) encryptions test were failing on the > non-power-of-two test: > > kcapi-enc - Error: encryption failed with error 0 > kcapi-enc - Error: decryption failed with error 0 > [FAILED: 32-bit - 5.1.0-rc1+] 15 bytes: STDIN / STDOUT enc test (128 bits): > original file (1d100e..cc96184c) and generated file (e3b0c442..1b7852b855) > [FAILED: 32-bit - 5.1.0-rc1+] 15 bytes: STDIN / STDOUT enc test (128 bits) > (openssl generated CT): original file (e3b0..5) and generated file (3..8e) > [PASSED: 32-bit - 5.1.0-rc1+] 15 bytes: STDIN / STDOUT enc test (128 bits) > (openssl generated PT) > [FAILED: 32-bit - 5.1.0-rc1+] 15 bytes: STDIN / STDOUT enc test (password): > original file (1d1..84c) and generated file (e3b..852b855) > > But the 16, 32, 512, 65536 tests always worked. > > Thankfully, this isn't a hidden hardware problem like previously, > instead this turned out to be a copy and paste issue. > > With this patch, all the tests are passing with and > kcapi-enc-test.sh gives crypto4xx's a clean bill of health: > "Number of failures: 0" :). > > Cc: stable@vger.kernel.org > Fixes: 98e87e3d933b ("crypto: crypto4xx - add aes-ctr support") > Fixes: f2a13e7cba9e ("crypto: crypto4xx - enable AES RFC3686, ECB, CFB and OFB offloads") > Signed-off-by: Christian Lamparter > --- > drivers/crypto/amcc/crypto4xx_core.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) Patch applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt