lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 26 Jun 2017 14:47:44 +0800 From: Herbert Xu <herbert@...dor.apana.org.au> To: David Gstir <david@...ma-star.at> Cc: Horia Geantă <horia.geanta@....com>, Dan Douglass <dan.douglass@....com>, "davem@...emloft.net" <davem@...emloft.net>, "richard@...ma-star.at" <richard@...ma-star.at>, "linux-crypto@...r.kernel.org" <linux-crypto@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt On Mon, Jun 26, 2017 at 07:40:58AM +0200, David Gstir wrote: > > So, am I correct in assuming that it is required for all modes including AEAD modes like GCM? > In that case I'll include a fix for the CAAM GCM mode too. It's only required for skcihper. As we do not do chunking/streaming with our AEAD interface it is not required for GCM. Cheers, -- Email: Herbert Xu <herbert@...dor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
Powered by blists - more mailing lists