[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ED9DFB96-B15E-493F-9089-4B69F5456532@intel.com>
Date: Mon, 17 May 2021 22:20:44 +0000
From: "Bae, Chang Seok" <chang.seok.bae@...el.com>
To: Eric Biggers <ebiggers@...nel.org>
CC: Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...nel.org>, Borislav Petkov <bp@...e.de>,
Andy Lutomirski <luto@...nel.org>, X86 ML <x86@...nel.org>,
Herbert Xu <herbert@...dor.apana.org.au>,
"Williams, Dan J" <dan.j.williams@...el.com>,
"Hansen, Dave" <dave.hansen@...el.com>,
"Shankar, Ravi V" <ravi.v.shankar@...el.com>,
Linux Crypto Mailing List <linux-crypto@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [RFC PATCH v2 10/11] crypto: x86/aes-kl - Support AES algorithm
using Key Locker instructions
On May 17, 2021, at 14:34, Eric Biggers <ebiggers@...nel.org> wrote:
> On Fri, May 14, 2021 at 01:15:07PM -0700, Chang S. Bae wrote:
>> Included are methods for ECB, CBC, CTR, and XTS modes. They are not
>> compatible with other implementations as referencing an encrypted form
>> only.
>
> Your code uses the standard algorithm names like cbc(aes), which implies that it
> is compatible with the standard cbc(aes). So which is it -- compatible or not
> compatible -- and if it isn't compatible, what is the expected use case?
Yes, it provides AES-CBC functionality. Well, it was intended to avoid mixed
use of functions -- setkey(), decrypt(), and encrypt() -- from others.
Perhaps, rewrite this as:
Each method should not be used along with other implementations'. E.g., KL’s
setkey() output can’t be used to the input to the encrypt() method of AES-NI or
generic implementation.
Thanks,
Chang
Powered by blists - more mailing lists