lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 30 May 2019 13:45:47 +0000
From:   Iuliana Prodan <>
To:     Herbert Xu <>
CC:     Ard Biesheuvel <>,
        Eric Biggers <>,
        "David S. Miller" <>,
        Horia Geanta <>,
        Sascha Hauer <>,
        Linux Kernel Mailing List <>,
        dl-linux-imx <>
Subject: Re: [PATCH] crypto: gcm - fix cacheline sharing

On 5/30/2019 4:34 PM, Herbert Xu wrote:
> On Thu, May 30, 2019 at 01:29:41PM +0000, Iuliana Prodan wrote:
>> I've tried coping the IV before the extended descriptor allocation, but
>> is not working and to make it work will need to make more changes in
>> CAAM. We need the original iv, and if we move it before
>> skcipher_edesc_alloc we lose it.
>> The fix exclusively in CAAM drv, to copy iv before DMA map, is more complex.
> Why doesn't it work (apart from the fact that this only makes sense
> for CBC and yet you're doing it for everything including CTR)?
> Cheers,

On the current structure of caamalg, to work, iv needs to be copied 
before memcpy(iv, req->iv, ivsize), from skcipher_edesc_alloc function. 
For this we need edesc, but this cannot be allocated before knowing how 
much memory we need. So, to make it work, we'll need to modify more in CAAM.


Powered by blists - more mailing lists