Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2184734ybx; Fri, 8 Nov 2019 01:00:52 -0800 (PST) X-Google-Smtp-Source: APXvYqxYz2ovyYVk2QAx05RZ4M8knl6Q5B6VdRQjPUSne4CzbZVr/PQADM2++Va2MC0tYRqnKQLz X-Received: by 2002:a17:906:b310:: with SMTP id n16mr7585852ejz.129.1573203652637; Fri, 08 Nov 2019 01:00:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573203652; cv=none; d=google.com; s=arc-20160816; b=J8ScIFSLYdoJqcJEZ4BkvmcdFw7TbQQAjMHWPyTtuz2sX9VAD34hKiDBjL2nqgg13k PEY8F9Hz8/sZPVHQDz/R0evoQmrdzTDNqUN1yl8UFDxF30zjlySpiFHNypSPdCwz9nMc tZ/IGPID3c3+yvww8qYj7FJOH6oxR5Ke54q92/wEjEBZj3d7n9lkZTyRsSmAm138fJHM F3MLdds572OtWCn7WOAMwPDfZ0YFUG2ggKhLv34kTuWQ4ze8AYwBBNABrq6MyIb9vWG/ 4yOXYlP9WLQioXsfB8PxrYQUGDUAvB39/4PuN438Zw7F7sxQE3M2vaeUK+rwutf9jvzs TQDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=sXSaqqdb0u9vm+JdykFgKcAJgl2PbqAejS1ttkwBCfg=; b=bLTOBAY50qsD3+ZW7C5TBCuYLAN0OsCnXGl2FZYoEXQ6UxuvebEQrUBxLAtjS50kv6 VaBoCBF6Q2FZpvXG70omkwpHq3AEVBq9e1Q7N/Ros0hIqsKRCUn2two37W4rSClBrJbo Gz8wmiFqZSoy+e+hGsYGPfNrhz0hcJUmthMDAQxnAuqJFgk2MTMn/FZsndUHYeDqzUmM iHx2QbQdgw4AxmreqC+XJPXMrkOD1e9kPnnzTxOKcdrmJ+YI3Ox8cURe97zOn4IKYmYE LVvACSp3lb2+IXvHxUTYcuRdKkXge6mlYJE1T9VN/UPKNvqW6J2pkTz8ssqDDNAbhMml kLVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=BshbsTJg; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p3si3794273edj.395.2019.11.08.01.00.27; Fri, 08 Nov 2019 01:00:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=BshbsTJg; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730618AbfKHI55 (ORCPT + 99 others); Fri, 8 Nov 2019 03:57:57 -0500 Received: from mail-wm1-f67.google.com ([209.85.128.67]:38183 "EHLO mail-wm1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730005AbfKHI55 (ORCPT ); Fri, 8 Nov 2019 03:57:57 -0500 Received: by mail-wm1-f67.google.com with SMTP id z19so5343547wmk.3 for ; Fri, 08 Nov 2019 00:57:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sXSaqqdb0u9vm+JdykFgKcAJgl2PbqAejS1ttkwBCfg=; b=BshbsTJgopykaEGVap+GT8HBWzfBB0mtH7bPwWOAZRL4QqVuiLUzeFH/JzFbAfM0wY N88vL74sQPANNSKA+TKLzCiigTPdQS9uzcl+Xg4jXRSsTAucqGgSKiBOTkR4rTLzReLx UTzlHVwnKwhNvgSSOZOtd8HVJQRYxb5/J57bnlis3pjFQC0rFv1j/+rIlV1Dcgep3fPU JOhwuyFCwCbrGov++QvIFQfpCX5PqQpR54hxjCW1z/yVsxkE7E0s5S6QzaIHjaVmNLUM /tuXtxh1eoTBMDAteOuAeiytdMdYYJTaT8JvGe6njLi9VAlX/7NjyOU6SXff1izkMx1A 6RyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sXSaqqdb0u9vm+JdykFgKcAJgl2PbqAejS1ttkwBCfg=; b=W7N4Mf6Or57N4oBzv2bwOXCCOi9oRDUXAOESFnv8tRt4S5Ib396a+Yt+LqRU+9mC/D /pB+kahXeRFraKhnGGAMgneawyDE9yQU6gfG0OslHJZbVVJ9Url7W7mMWXf72v4kVZ4V O8mEwRgEb2H4+uGdbDjrAhjwYXB6mR3iVLqHBF2GsVnnUkBa3KvLoiTX1lFbb1uqvTz2 GAUggoUpiRH+vzE6Ehi/B/PwO64G2wqGz9qcaklFq51a0wUskSNRHI1jYhipiWT4Bu6r fzbBix7JIT9BGvBeVhhBwDSv535A514vM6s/W0L8w2oxOiDBT3Wazb/8gY2cWl74IETm jUyQ== X-Gm-Message-State: APjAAAVmbKX7f/rgDGHsQ4O7P0GYCyXwOfj25DDaWEeiGAdHWfTKlOkl sfp9NAWalx918U0J8nfuAJnshPjDEFELgBy+vztO1Q== X-Received: by 2002:a1c:b1c3:: with SMTP id a186mr7291210wmf.10.1573203474585; Fri, 08 Nov 2019 00:57:54 -0800 (PST) MIME-Version: 1.0 References: <1573203234-8428-1-git-send-email-pvanleeuwen@verimatrix.com> In-Reply-To: <1573203234-8428-1-git-send-email-pvanleeuwen@verimatrix.com> From: Ard Biesheuvel Date: Fri, 8 Nov 2019 09:57:43 +0100 Message-ID: Subject: Re: [PATCHv3] crypto: inside-secure - Fixed authenc w/ (3)DES fails on Macchiatobin To: Pascal van Leeuwen Cc: "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Antoine Tenart , Herbert Xu , "David S. Miller" , Pascal van Leeuwen Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, 8 Nov 2019 at 09:57, Pascal van Leeuwen wrote: > > Fixed 2 copy-paste mistakes in the commit mentioned below that caused > authenc w/ (3)DES to consistently fail on Macchiatobin (but strangely > work fine on x86+FPGA??). > Now fully tested on both platforms. > > changes since v1: > - added Fixes: tag > > changes since v2: > - moved Fixes: tag down near other tags > Please put the changelog below the --- It does not belong in the commit log itself. > Fixes: 13a1bb93f7b1c9 ("crypto: inside-secure - Fixed warnings on > inconsistent byte order handling") > > Signed-off-by: Pascal van Leeuwen > --- > drivers/crypto/inside-secure/safexcel_cipher.c | 5 +++-- > 1 file changed, 3 insertions(+), 2 deletions(-) > > diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c b/drivers/crypto/inside-secure/safexcel_cipher.c > index 98f9fc6..c029956 100644 > --- a/drivers/crypto/inside-secure/safexcel_cipher.c > +++ b/drivers/crypto/inside-secure/safexcel_cipher.c > @@ -405,7 +405,8 @@ static int safexcel_aead_setkey(struct crypto_aead *ctfm, const u8 *key, > > if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) { > for (i = 0; i < keys.enckeylen / sizeof(u32); i++) { > - if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { > + if (le32_to_cpu(ctx->key[i]) != > + ((u32 *)keys.enckey)[i]) { > ctx->base.needs_inv = true; > break; > } > @@ -459,7 +460,7 @@ static int safexcel_aead_setkey(struct crypto_aead *ctfm, const u8 *key, > > /* Now copy the keys into the context */ > for (i = 0; i < keys.enckeylen / sizeof(u32); i++) > - ctx->key[i] = cpu_to_le32(aes.key_enc[i]); > + ctx->key[i] = cpu_to_le32(((u32 *)keys.enckey)[i]); > ctx->key_len = keys.enckeylen; > > memcpy(ctx->ipad, &istate.state, ctx->state_sz); > -- > 1.8.3.1 >