Re: [PATCH 01/16] crypto: cfb - add missing 'chunksize' property

2019-01-04 Thread Herbert Xu
On Fri, Jan 04, 2019 at 07:07:48PM -0800, Eric Biggers wrote: > > Herbert, why was CFB accepted without any test vectors in the first place? That was an oversight. Longer term we should restructure how the test vectors are stored by moving them in with the generic implementation. That should als

Re: [PATCH 01/16] crypto: cfb - add missing 'chunksize' property

2019-01-04 Thread Eric Biggers
On Fri, Jan 04, 2019 at 09:03:10PM +, Sasha Levin wrote: > Hi, > > [This is an automated email] > > This commit has been processed because it contains a "Fixes:" tag, > fixing commit: a7d85e06ed80 crypto: cfb - add support for Cipher FeedBack > mode. > > The bot has tested the following tre

Re: [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest

2019-01-04 Thread David Howells
Eric Biggers wrote: > It makes it clearer what's going on, especially since some modes update the > 'iv' pointer after each block (delaying the copy to 'walk.iv' until the end) > but others can't do that. The 'const' is helpful to further distinguish > these two cases, which were confused in bot

Re: [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest

2019-01-04 Thread Eric Biggers
On Fri, Jan 04, 2019 at 09:57:13AM +, David Howells wrote: > Eric Biggers wrote: > > > - u8 *iv = walk->iv; > > + u8 * const iv = walk->iv; > > Does adding this const actually gain anything? (this is done twice) > > David It makes it clearer what's going on, especially since some mode

Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK

2019-01-04 Thread Horia Geanta
On 1/4/2019 5:17 PM, Horia Geanta wrote: > On 12/21/2018 10:07 AM, Christophe Leroy wrote: > [snip] >> IV cannot be on stack when CONFIG_VMAP_STACK is selected because the stack >> cannot be DMA mapped anymore. >> This looks better, thanks. > >> This patch copies the IV into the extended descripto

Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK

2019-01-04 Thread Horia Geanta
On 12/21/2018 10:07 AM, Christophe Leroy wrote: [snip] > IV cannot be on stack when CONFIG_VMAP_STACK is selected because the stack > cannot be DMA mapped anymore. > This looks better, thanks. > This patch copies the IV into the extended descriptor when iv is not > a valid linear address. > Thoug

Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property

2019-01-04 Thread Jens Wiklander
On Fri, Jan 4, 2019 at 1:02 PM Sumit Garg wrote: > > On Fri, 4 Jan 2019 at 16:31, Jens Wiklander wrote: > > > > On Fri, Jan 4, 2019 at 7:39 AM Sumit Garg wrote: > > > > > > On Thu, 3 Jan 2019 at 22:44, Daniel Thompson > > > wrote: > > > > > > > > On Fri, Dec 28, 2018 at 02:41:01PM +0530, Sumit

Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property

2019-01-04 Thread Sumit Garg
On Fri, 4 Jan 2019 at 16:31, Jens Wiklander wrote: > > On Fri, Jan 4, 2019 at 7:39 AM Sumit Garg wrote: > > > > On Thu, 3 Jan 2019 at 22:44, Daniel Thompson > > wrote: > > > > > > On Fri, Dec 28, 2018 at 02:41:01PM +0530, Sumit Garg wrote: > > > > On Thu, 27 Dec 2018 at 19:10, Ard Biesheuvel >

Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property

2019-01-04 Thread Jens Wiklander
On Fri, Jan 4, 2019 at 7:39 AM Sumit Garg wrote: > > On Thu, 3 Jan 2019 at 22:44, Daniel Thompson > wrote: > > > > On Fri, Dec 28, 2018 at 02:41:01PM +0530, Sumit Garg wrote: > > > On Thu, 27 Dec 2018 at 19:10, Ard Biesheuvel > > > wrote: > > > > > > > > On Thu, 27 Dec 2018 at 12:08, Sumit Gar

Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms

2019-01-04 Thread Vitaly Chikunov
On Thu, Dec 13, 2018 at 06:12:33PM +0800, Herbert Xu wrote: > Vitaly Chikunov wrote: > > Current akcipher .verify() just decrypts signature to uncover message > > hash, which is then verified in upper level public_key_verify_signature > > by memcmp with the expected signature value, which is never

Re: [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest

2019-01-04 Thread David Howells
Eric Biggers wrote: > - u8 *iv = walk->iv; > + u8 * const iv = walk->iv; Does adding this const actually gain anything? (this is done twice) David

Re: IPSec ESN: Packets decryption fail with ESN enabled connection

2019-01-04 Thread Steffen Klassert
On Thu, Jan 03, 2019 at 04:16:56PM +0530, Harsh Jain wrote: > > On 02-01-2019 18:21, Herbert Xu wrote: > > Does this occur if you use software crypto on the receiving end > > while keeping the sending end unchanged? > > I tried with "authencesn(hmac(sha1-ssse3),cbc(aes-asm))" on both sides. > >