Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp641528ybi; Fri, 7 Jun 2019 14:16:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqy8alVHNGvsBRWKYxOrkd6YdanapZR9tzqCZOOxAxHIkJ8RQtfJqmGKyV7e51ELwSTbbs3B X-Received: by 2002:a17:90a:ad8b:: with SMTP id s11mr8051720pjq.48.1559942171722; Fri, 07 Jun 2019 14:16:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559942171; cv=none; d=google.com; s=arc-20160816; b=W7wfwqzLm1r050ZuWLXc/BAt7kgpQj1x+qfgBksW9TB5c9qQtvV//ghtNMt/+Wtd7j dSUgMu4kyv08BBa0tEO0FE6kpYhuYxB7p+iGtVPJPFQ6fRpMZwfTvbakAiIBbhtTGHTc sBCTT+qby7vD3EwxuK8H3kHr3Ao6OiDWEeOCbv07hIYi+3yG3JHpYpXxtHq7MDmnBcgD dLZUtvCViXYnsIL/ZKkh6rN+uDhbQFJNF6oWX9ZHVbxvLuBSVTRsd35amszlbKMmIcsm qF+C21OyuC/FM/eG1VPB+cfC3d/BwO340zHSPC05BLHIFOOl0nRFVQVx9upzGuceDFMM KYpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=AWlfwU7lW6CWYeg1NL0of0pGTvb4S25MQTqR2GGB2VA=; b=tYseXo2RrdVfKTzHXjIKCxCJgI91c9o9xVqF7qfswA+hwLx9f2HjJ89QV3J7D0BdDI koe14rTyxcyewtOKLaLNBvoXpp+nV39FbtblJbq49EnyzGBOFvNT+AxMZ4SHaHr0puzI 9SV3X5nKZuEsjTsXmMwwZhsc7Xkr5+V8oSW3rISK41znj70jFtLpvtzfLIBcQ6i3ZISD O7sEB4pfqrBGcoHKPiv5mLmJl/Gmhuln5Zpbsibbqr+QT4v/03zy3dtrmmHl5tRIb03S Zm/f4+vv58a8AqbSY5XFpwHlAJ+LSrs619s3dzc2tvudu8bCpTLANeBPtcGGe7oEXBpD asgA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cGpM3aXD; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 23si2969074pgc.469.2019.06.07.14.15.52; Fri, 07 Jun 2019 14:16:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cGpM3aXD; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730409AbfFGVPQ (ORCPT + 99 others); Fri, 7 Jun 2019 17:15:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:47362 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730373AbfFGVPQ (ORCPT ); Fri, 7 Jun 2019 17:15:16 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F1A6520868; Fri, 7 Jun 2019 21:15:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559942116; bh=/ghVsTFhciHtNxqiR78yPUCb/eZO0pb75R7Y0dWyyy0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cGpM3aXDVscgYBCrgWw6WrUzgKIKPA3pXZA39mSgDIXXAGFjH5yCFg6/+sNBi5/c7 BcRJ3KUA4uzyRhSXYhBvUDvNv56VeSF0V1orjb2RxAkQiJ+v8IwZe6Js7hKQ4ecJT/ EgXl9eXFpYnrcqkomMoLK1225D5WMkCcTXnmyCqs= Date: Fri, 7 Jun 2019 14:15:14 -0700 From: Eric Biggers To: Denis Kenzior Cc: Ard Biesheuvel , Marcel Holtmann , "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Herbert Xu , Johannes Berg , "open list:NFC SUBSYSTEM" , "David S. Miller" Subject: Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface Message-ID: <20190607211514.GD648@sol.localdomain> References: <20190607144944.13485-1-ard.biesheuvel@linaro.org> <20190607175947.GB648@sol.localdomain> <97BB95F6-4A4C-4984-9EAB-6069E19B4A4F@holtmann.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, Jun 07, 2019 at 03:45:45PM -0500, Denis Kenzior wrote: > Hi Ard, > > > > > Ah ok, good to know. That does imply that the driver is not entirely > > broken, which is good news I suppose. > > > > Not entirely, but we did have to resort to using multiple sockets, otherwise > parallel encrypt/decrypt operations on the socket would result in invalid > behavior. Probably due to the issue Eric already pointed out. > > No such issue with any other ciphers that we use. > > Regards, > -Denis Okay, that sucks, so we do have to keep "ecb(arc4)" in the crypto API then. And we can't fix its name to be just "arc4". It's odd that someone would choose to use AF_ALG over writing a 20 line arc4_crypt() in userspace, but whatever. Yes, "ecb(arc4)" isn't currently thread safe. ARC4 uses a single key whereas modern stream ciphers use a key + IV. To comply with the crypto API it would have to copy the key to a stack buffer for each encryption/decryption. But it doesn't; it just updates the key instead, making it non thread safe. If users are actually relying on that, we'll have to settle for adding a mutex instead. In any case, we can still remove the 'cipher' algorithm version as Ard is suggesting, as well as possibly convert the in-kernel users to use an arc4_crypt() library function and remove the hardware driver support. - Eric