Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp188608rdb; Tue, 5 Dec 2023 02:37:59 -0800 (PST) X-Google-Smtp-Source: AGHT+IE+wNeyI+hRNf+ZeG9ssPs/zCw6EvoMng0llxY3oObOuJONgrLJw63WsK1vt/B8AF6rx3eC X-Received: by 2002:a67:f551:0:b0:464:9f88:831e with SMTP id z17-20020a67f551000000b004649f88831emr1280627vsn.52.1701772679250; Tue, 05 Dec 2023 02:37:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701772679; cv=none; d=google.com; s=arc-20160816; b=puhIFPjnvzVViGYYPmiSOfrLl7bYqUbkYCgPe5CcM6GF/MeyLK7i5tU12WKrPfbkUA qnUG8UrhOs+adVQIxYRy1QgzEoBAM80jSjAvDV04WQwLLmtzF8o08N8+AyyI9vUcakvv 5pNirA/D206ZMmwZk01r++4r6vEaIoV33tp3W8oGtVzC9nCodiUw7uodrzf1v/MvP044 UHIWrvffVddeGpxcZfYBzzJkm6CSQEor6VhpfLIiM+r5nSrFg5lqT59U4CUNZbBNboAg B7RHVPZz+3vDzYuUHixaSTSJ6jNN3LyGu+dd0S9W93hBg7/WTbTQb8Hto5gisY0keUcU wPtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=gYJKKu5R7Elpwe99qbMipD9Sx3pmCFybvcm4scwUy8M=; fh=gvAaTn7V2ako+socwadq3mowY+XpjEU7R+nroQHn0Qk=; b=npCSdVHpC1MPh5kMboGlYXabIGzk6f09BunyElP/6MyEj1LbSZovQFafLHAEF9MP8q jRPcuhkXBz8TuxVTaz3Q7uZXSR+UvH4pD7t2R7b8rDwcVTLOthmc3xneOkpCzhnFXVQt wKJ8CpCoPwamm5XIQYHLqqKHmC2BgiAxvkNhsEP516XczVOustl+MlheExwpIbGpOQbe wLHE4UAerUVgsRA+t7McK6fknbCIGzZc6IEI4P073oYBw9idBicumW+QgWGV6XX3xp8Y tRzZR0lID29MWs/lsNhpmg8vfmj8ku2TRLw3BY/466pSbVlFoddL8AeFFLDNoTaYaOjN vbZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto+bounces-560-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-560-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id kr1-20020a0562142b8100b0067a9a18a8e0si10054498qvb.483.2023.12.05.02.37.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Dec 2023 02:37:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-560-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto+bounces-560-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-560-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 073111C20B5C for ; Tue, 5 Dec 2023 10:37:59 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6E5E755C1F for ; Tue, 5 Dec 2023 10:37:58 +0000 (UTC) X-Original-To: linux-crypto@vger.kernel.org Received: from abb.hmeau.com (abb.hmeau.com [144.6.53.87]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF3D7D3 for ; Tue, 5 Dec 2023 00:41:08 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1rAQzH-0070gh-0o; Tue, 05 Dec 2023 16:41:04 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Tue, 05 Dec 2023 16:41:12 +0800 Date: Tue, 5 Dec 2023 16:41:12 +0800 From: Herbert Xu To: Eric Biggers Cc: Linux Crypto Mailing List , Ard Biesheuvel Subject: Re: [PATCH 4/8] crypto: skcipher - Add lskcipher Message-ID: References: <20230914082828.895403-1-herbert@gondor.apana.org.au> <20230914082828.895403-5-herbert@gondor.apana.org.au> <20230920062551.GB2739@sol.localdomain> <20230922031030.GB935@sol.localdomain> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230922031030.GB935@sol.localdomain> On Thu, Sep 21, 2023 at 08:10:30PM -0700, Eric Biggers wrote: > > Yes, wide-block modes such as Adiantum and HCTR2 require multiple passes over > the data. As do SIV modes such as AES-GCM-SIV (though AES-GCM-SIV isn't yet > supported by the kernel, and it would be an "aead", not an "skcipher"). Right, AEAD algorithms have never supported incremental processing, as one of the first algorithms CCM required two-pass processing. We could support incremental processing if we really wanted to. It would require a model where the user passes the data to the API twice (or more if future algorithms requires so). However, I see no pressing need for this so I'm happy with just marking such algorithms as unsupported with algif_skcipher for now. There is also an alternative of adding an AEAD-like mode fo algif_skcipher for these algorithms but again I don't see the need to do this. As such I'm going to add a field to indicate that adiantum and hctr2 cannot be used by algif_skcipher. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt