[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YaWaGfwjLLbrBzHk@sol.localdomain>
Date: Mon, 29 Nov 2021 19:27:21 -0800
From: Eric Biggers <ebiggers@...nel.org>
To: "Chang S. Bae" <chang.seok.bae@...el.com>
Cc: tglx@...utronix.de, bp@...e.de, dave.hansen@...ux.intel.com,
mingo@...nel.org, luto@...nel.org, x86@...nel.org,
herbert@...dor.apana.org.au, linux-kernel@...r.kernel.org,
linux-crypto@...r.kernel.org, dan.j.williams@...el.com,
charishma1.gairuboyina@...el.com, kumar.n.dwarakanath@...el.com,
lalithambika.krishnakumar@...el.com, ravi.v.shankar@...el.com
Subject: Re: [PATCH v3 00/15] x86: Support Key Locker
On Wed, Nov 24, 2021 at 12:06:45PM -0800, Chang S. Bae wrote:
>
> == Non Use Cases ==
>
> Bare metal disk encryption is the only use case intended by these patches.
If that's the case, why are so many encryption modes being added (ECB, CTR, CBC,
and XTS)? Wouldn't just XTS be sufficient?
> * PATCH10-15: For the x86 crypto library, it first prepares the AES-NI code
> to accommodate the new AES implementation. Then incrementally add base
> functions and various modes support -- ECB, CBC, CTR, and XTS. The code
> was found to pass the crypto test.
Did you test with CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y?
- Eric
Powered by blists - more mailing lists