Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp762462ybe; Wed, 4 Sep 2019 07:24:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqxPZfpuhQFFD3OzmYxWi2RLHeIhgyZ0hqxnskDUxOolblS0W7xnDSZt16QuxJ91YO02wYQ3 X-Received: by 2002:a17:902:a706:: with SMTP id w6mr773036plq.166.1567607079648; Wed, 04 Sep 2019 07:24:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567607079; cv=none; d=google.com; s=arc-20160816; b=yqlRbXPb1RbacjZCoDUbM1tKYAocwbI749WAesUqT8m3pdVn13z9Sfl5KWnwGTLXfC 7lueoWmS91IPig1zW5cjjTEF8vR7dnIf5ePxQkJqCUVznH6Fb9MsMf4GG0AenAKvghyu 61/bVOkctSHcHkTEu3zWLOo8YBweiHfZ2JOWjVFwpuUevKRin4fCtfHrkUP74QCSyp9v wbtk3fVk9rFQpw+r1bfDZlFJSy7GbnTgVnuWoIl0aGj0thYf2GO1cyeJgP2vbiLHK2qb b92lEvGSlykeQ78vr6PfH+t0GXoBraPhbt4o2WZOQfRyTROz4dN6FJfnrhkylXjkyfHR 21gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=MOucKwxyOMSdV1lq4JpX6GteCAGudM3NFzlYYmtKmMo=; b=iY2BzJwJ9XxpiscUAOjUbG0Q+OP9HZo3p4sOs1tIHDonHo9TbqwRp3HRjFXNCUGjcu upnA3Ez5LU0cR1QP6MPa8hYKI4v2Y+Zk1AqtoO+kPCHdZEwwEQ3NBf/p8zlTQuZe6VPJ KxPayTaFFc1mjwKutkX+/UGGxUhT0M2XAUIX92fJAjdMjGvSBTLCxyGm2d+fhIoPO6o7 tergYK5dFnJpkthtXB2wbjNULQWeKrBxR2nib+82CVlfDU/JqAIDKLEMbpNGxvsEJA9V uqPd4kxUxt/rbZpWszHV+nTYAygM2CW+nxYE4b65NKsSgx8sbmmZCr2oTATa3A2o91zT utnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=A+5kP410; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p14si17293157plo.47.2019.09.04.07.24.25; Wed, 04 Sep 2019 07:24:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=A+5kP410; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727544AbfIDOXl (ORCPT + 99 others); Wed, 4 Sep 2019 10:23:41 -0400 Received: from mail-wm1-f68.google.com ([209.85.128.68]:52856 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730552AbfIDOXl (ORCPT ); Wed, 4 Sep 2019 10:23:41 -0400 Received: by mail-wm1-f68.google.com with SMTP id t17so3551031wmi.2 for ; Wed, 04 Sep 2019 07:23:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=MOucKwxyOMSdV1lq4JpX6GteCAGudM3NFzlYYmtKmMo=; b=A+5kP4105+Fiiz6ZY3ZWlk0Qh9vXFx4t4D4Z8sBGWBOudh80rIuyoRZumZnFZn7Y6m 1ICUp1qytPYdPcIH1+it6Sy17YsXaLd+GM2m73cidlRQEttA7VhSr4gZQQj+xayPK0FI jCc5UnMwAMdFVnoLc2Qoh13wiO0LDS/2urAmjDOD1TxYD0OVsfVw06ng6ehJC/xT4I4o XRs8I7vv82NHTWKbjvTZoMkBk0MHbvr8fS7SiZKRvvJahOFQZQRxTDme1yf+tAjonUFV g5F9QsoKDC/fJ2J0c0dZcOD2dFnr39d6uKREfXYnHdNKU8ZPEJtN98ThrW2fxy+j9/TC eQaQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=MOucKwxyOMSdV1lq4JpX6GteCAGudM3NFzlYYmtKmMo=; b=pjaiS+UMIdHRpvABQfDHSJoeKo5R9rZzmxU8hniGmG/tvstZQu04fdkuLvM2ofArDc /R+txIOWQWeZUW9SI07jkOd6D00ATtHU2ThgQj2GvucvE/iKpxlrt6xetMSL9+vfEhcQ 5/bAOlK6YFLrkIwkM0uPE2h2DWDqpqP+o+FBbDyEo8jLSSFlzYFCEO7Ef6P3+jrXAdJD eblEaypfPDuRS80uP38aG2D0sFtIcPYDtknxLUfH8Hn0Gy4lNmd/Oq2K0GMagHINN3PG P36ZmghkiFKEK3ykYy2SzylhWczTBIbiTDrlE4Wnj51s/d1fvxAO6+nc7W61FPEx9nP/ GmUw== X-Gm-Message-State: APjAAAWEHHpldXyHg7iXtGKoDG5fibMwCrJDe4hHQ8rLkmS+lZgQ63J8 bnIpDbR5tA+L87HiS+Sh8eq5YwjHAZZW9M3b+JUxEA== X-Received: by 2002:a1c:3cc3:: with SMTP id j186mr4465756wma.119.1567607019303; Wed, 04 Sep 2019 07:23:39 -0700 (PDT) MIME-Version: 1.0 References: <20190822102454.4549-1-ard.biesheuvel@linaro.org> <8e480e5b-14d5-8ff1-0630-5a53b4646a1c@linux.ibm.com> In-Reply-To: <8e480e5b-14d5-8ff1-0630-5a53b4646a1c@linux.ibm.com> From: Ard Biesheuvel Date: Wed, 4 Sep 2019 07:23:27 -0700 Message-ID: Subject: Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier To: Harald Freudenberger Cc: "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Herbert Xu , Christian Borntraeger , Reinhard Buendgen Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, 4 Sep 2019 at 07:21, Harald Freudenberger wrote: > > On 22.08.19 12:24, Ard Biesheuvel wrote: > > Fix a typo XTS_BLOCKSIZE -> XTS_BLOCK_SIZE, causing the build to > > break. > > > > Signed-off-by: Ard Biesheuvel > > --- > > Apologies for the sloppiness. > > > > Herbert, could we please merge this before cryptodev hits -next? > > > > arch/s390/crypto/aes_s390.c | 4 ++-- > > 1 file changed, 2 insertions(+), 2 deletions(-) > > > > diff --git a/arch/s390/crypto/aes_s390.c b/arch/s390/crypto/aes_s390.c > > index a34faadc757e..d4f6fd42a105 100644 > > --- a/arch/s390/crypto/aes_s390.c > > +++ b/arch/s390/crypto/aes_s390.c > > @@ -586,7 +586,7 @@ static int xts_aes_encrypt(struct blkcipher_desc *desc, > > struct s390_xts_ctx *xts_ctx = crypto_blkcipher_ctx(desc->tfm); > > struct blkcipher_walk walk; > > > > - if (unlikely(!xts_ctx->fc || (nbytes % XTS_BLOCKSIZE) != 0)) > > + if (unlikely(!xts_ctx->fc || (nbytes % XTS_BLOCK_SIZE) != 0)) > > return xts_fallback_encrypt(desc, dst, src, nbytes); > > > > blkcipher_walk_init(&walk, dst, src, nbytes); > > @@ -600,7 +600,7 @@ static int xts_aes_decrypt(struct blkcipher_desc *desc, > > struct s390_xts_ctx *xts_ctx = crypto_blkcipher_ctx(desc->tfm); > > struct blkcipher_walk walk; > > > > - if (unlikely(!xts_ctx->fc || (nbytes % XTS_BLOCKSIZE) != 0)) > > + if (unlikely(!xts_ctx->fc || (nbytes % XTS_BLOCK_SIZE) != 0)) > > return xts_fallback_decrypt(desc, dst, src, nbytes); > > > > blkcipher_walk_init(&walk, dst, src, nbytes); > > Applied together with the aes xts common code fix and the testmanager fixes, > build and tested. Works fine, Thanks. > With the 'extra run-time crypto self tests' enabled I see a failure of the s390 xts > implementation when nbytes=0 is used (should return with EINVAL but actually > returns with 0). I'll send a fix for this via the s390 maintainers. Thanks Harald.