Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp5419739ybe; Tue, 10 Sep 2019 03:28:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqwr8fx/aG16KBrpStvxHoSwjo9DWPd0eXBRKbrGAzSnFRN/pGoij5K5jfjZkNCGjO2kJ7+k X-Received: by 2002:a50:ab83:: with SMTP id u3mr23061929edc.228.1568111306569; Tue, 10 Sep 2019 03:28:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568111306; cv=none; d=google.com; s=arc-20160816; b=f3vObzf0YQHxGfIt3yLXP2HAyvMXEM2Ng7gMHIQK55nahJRCBUV2EvaEPuH29if3Jy KX70QvZ9IGvGNKcHdyM+A1wXjLpC0HI37HNV/tIDQzj9/TBaz2H5Zf+Xwk7K1V6UTklV uAyjYiwEFNKUkCTh+XeVgVPyd5y5eV2TuKYtDodUiWTynzvtYAIqb3AERaH4ty8eea0b ZTLqOR5fL3ZwBlnK6in+qvD3PEuBaNtFHp7Gs2+3EJ2IMhDHMQ/M0z/fFu8l15dlkFUv xOSYLhFc8jz+pP66LBhYqTM084ea5WWUc2kyOLf8sykNjHPfIR0WJ7afjKE3wDuGNDUV bpsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=YlMHrXEh69ciNBJd6mlmOGkLfH1wmxDk+9Xjr7nxuEc=; b=lWPnxA7FFgsbxB1poWowR6Osu1mFNlRndDXORk7+LMgoUcIVosatDg1si5G5oV4tF2 NgdEWZIXFEXmFy5mTO1ayF25LBiz2tHXQnepuEA4ZCTRVO0nGArohq6sXV/wcw36oja5 EhdFXFxcjA693RZSBbXmn9bmsu3h5bAdoLAjCKeuKqsX82S/dVnFi+tSnR/7oD372/v8 HPX5rt+bGZqGsEicMhLVkykGBQ7w8FdQ4gnyf0Dmm84BrSqOcq44FKinH4iMjf7Xj1vH l5oal/dA5Oh39o56MzoXXyks60weXs1voKZFeQ55eiCUt6y/yYfDDNWFOirNJMxz6O8v Lj8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y10si3192018edp.248.2019.09.10.03.27.54; Tue, 10 Sep 2019 03:28:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387515AbfIJBVt (ORCPT + 99 others); Mon, 9 Sep 2019 21:21:49 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:33100 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728356AbfIJBVt (ORCPT ); Mon, 9 Sep 2019 21:21:49 -0400 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.0.7]) by fornost.hmeau.com with smtp (Exim 4.89 #2 (Debian)) id 1i7Uqg-0000xr-4u; Tue, 10 Sep 2019 11:21:39 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Tue, 10 Sep 2019 11:21:34 +1000 Date: Tue, 10 Sep 2019 11:21:34 +1000 From: Herbert Xu To: Ard Biesheuvel Cc: Gilad Ben-Yossef , Uri Shir , "David S. Miller" , "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" Subject: Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS Message-ID: <20190910012134.GA24413@gondor.apana.org.au> References: <1567929866-7089-1-git-send-email-uri.shir@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Sep 09, 2019 at 03:38:02PM +0100, Ard Biesheuvel wrote: > > The blocksize is primarily used by the walking code to ensure that the > input is a round multiple. In the XTS case, we can't blindly use the > skcipher walk interface to go over the data anyway, since the last > full block needs special handling as well. > > So the answer is really that we had no reason to change it for the > other drivers, and changing it here will trigger a failure in the > testing code that compares against the generic implementations. I think it should be changed because this is no different than CTR where only the last block is allowed to be an arbitrary size. Of course we should change everything in one go due to the testing code. This does raise the issue that we may be using blocksize in places where we should be using chunksize instead, e.g., in algif_skcipher. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt