Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp971509pxk; Mon, 31 Aug 2020 06:34:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/wIpe26XzJfnwNY6D9vOAfm/Dx33L7AVVK1b6OsN+YUD9X3gp40OAebrKzFCAqXnMTzvt X-Received: by 2002:aa7:de91:: with SMTP id j17mr1298212edv.85.1598880862735; Mon, 31 Aug 2020 06:34:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598880862; cv=none; d=google.com; s=arc-20160816; b=s5YbM9yniuUc0wBZ/8GhEl0pj+o/cJP6PfF7IZkygoNDf+XL/IZOI/xdkNNsW+ofs1 5uhVUS9hgLsTMH377S21DwS87yf3TrcKMAjpEsg/llSJCqh60pAlr2y2SRPfoUM/7q+l sr2bumRJub9lIV6uWt3yXD+MntPR/kDAwpLzLzQpMbhmxYsyBV7//bzewB9L4P/jxcQj OMGNEXGWC5IvuzvZGoK27i6GizRWo1qACOJuqSzU9hTvZ1BFbJNdM47qzHRU6zDiHPRo q3g8lcNaaZ0s5DgSL13BV0KtgeswBQsXO+b5LG8cnstq6Rk2qI5WlzVJw9Qjd2uXYDs/ kbfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=u2a7baBYxCtS6DOTTeQGZqtz7VOaC/H7QNvgVVWX2Jo=; b=jglV7Q6bZ15elaSlfx0LZ7saxOzMSY5wEg5KkgxCx5/z8aqAJiBhTkAX/gA6I0RKw/ NmrRLS6mElzosLsBKRcYjQsGYgcTxrUxZ2oeudX3WIrkAsP75bYjyasoVAr5neapquIZ l1JMQIQYXPOfm++TEEHIbsntVPYdOdhALZQKqkrRF4XiiMCVPnyTU6EI9GMi8F1D2UBw B3uTEK+r9E4a1+4tK7JSh0gdIE8EFyJGyog9292VEGjtO6v/pznjurUiKOtQ/5KZ2kDF 2YqildkLKOVgiHGcuyNw4fwPDxjO4LEOHYuyzHYURPkjTnh/l/S52fCBikEVDC6Lqkjq u87w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qPrKoaFG; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id sa23si5263875ejb.5.2020.08.31.06.33.57; Mon, 31 Aug 2020 06:34:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qPrKoaFG; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727892AbgHaNde (ORCPT + 99 others); Mon, 31 Aug 2020 09:33:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:54806 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727855AbgHaN1J (ORCPT ); Mon, 31 Aug 2020 09:27:09 -0400 Received: from mail-ot1-f43.google.com (mail-ot1-f43.google.com [209.85.210.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DC5DF208CA for ; Mon, 31 Aug 2020 13:27:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598880429; bh=u2a7baBYxCtS6DOTTeQGZqtz7VOaC/H7QNvgVVWX2Jo=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=qPrKoaFGCLtht+2qrHlKUsOpZ8WYGO56M1NWa4G3HG1rYXZlfWKEjR2kMYZI91Rbu a+C1VGhlux33vWwhKQU1FnRvgBiSayPb2Qbl98+hq46kaZOF2ne2l74kqMcP1Oc+Ba 3OSsVG7LECM5wHPgvjb/CMG2OK/IANu1MwA/zNCc= Received: by mail-ot1-f43.google.com with SMTP id e23so5285074otk.7 for ; Mon, 31 Aug 2020 06:27:08 -0700 (PDT) X-Gm-Message-State: AOAM533bRqvVCpjRxCkFr8z1rulpTGHCSAsVQuZels5IwTOdiRg2pbJH EuZXU7JbOopUSxKtBalXfOE07km12FifSSrO1T8= X-Received: by 2002:a9d:5189:: with SMTP id y9mr1035591otg.77.1598880428253; Mon, 31 Aug 2020 06:27:08 -0700 (PDT) MIME-Version: 1.0 References: <20200822072934.4394-1-giovanni.cabiddu@intel.com> <1cffce42de2f4e7b84514a27bd9a889d@irsmsx602.ger.corp.intel.com> <20200828092359.GA62902@silpixa00400314> In-Reply-To: <20200828092359.GA62902@silpixa00400314> From: Ard Biesheuvel Date: Mon, 31 Aug 2020 16:26:57 +0300 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] crypto: qat - aead cipher length should be block multiple To: Giovanni Cabiddu Cc: Herbert Xu , Linux Crypto Mailing List , qat-linux , "Przychodni, Dominik" Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, 28 Aug 2020 at 12:24, Giovanni Cabiddu wrote: > > On Sat, Aug 22, 2020 at 02:04:10PM +0100, Ard Biesheuvel wrote: > > On Sat, 22 Aug 2020 at 09:29, Giovanni Cabiddu > > wrote: > > > > > > From: Dominik Przychodni > > > > > > Include an additional check on the cipher length to prevent undefined > > > behaviour from occurring upon submitting requests which are not a > > > multiple of AES_BLOCK_SIZE. > > > > > > Fixes: d370cec32194 ("crypto: qat - Intel(R) QAT crypto interface") > > > Signed-off-by: Dominik Przychodni > > > Signed-off-by: Giovanni Cabiddu > > > > I only looked at the patch, and not at the entire file, but could you > > explain which AES based AEAD implementations require the input length > > to be a multiple of the block size? CCM and GCM are both CTR based, > > and so any input length should be supported for at least those modes. > This is only for AES CBC as the qat driver supports only > authenc(hmac(sha1),cbc(aes)), authenc(hmac(sha256),cbc(aes)) and > authenc(hmac(sha512),cbc(aes)). > Ah right, yes that makes sense.