Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Tadeusz Struk
On 01/22/2015 02:23 PM, Herbert Xu wrote: > Yes but we should also fix this so that it's a proper aead > algorithm. Ok, I'll do that. Thanks, Tadeusz -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Herbert Xu
On Thu, Jan 22, 2015 at 10:23:57AM -0800, Tadeusz Struk wrote: > > No, I thought that the agreement was that we don't want to allow user > space to use these helpers directly, right? Am I missing something? Yes but we should also fix this so that it's a proper aead algorithm. Cheers, -- Email:

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Tadeusz Struk
On 01/22/2015 01:20 PM, Stephan Mueller wrote: > That would be correct. But if I understood Herbert correctly, he is > creating a patch that disables these service ciphers for general usage. Yes, and this should also implicitly fix the problem with user space. Thanks, Tadeusz -- To unsubscribe

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Stephan Mueller
Am Donnerstag, 22. Januar 2015, 10:23:57 schrieb Tadeusz Struk: Hi Tadeusz, >On 01/20/2015 05:25 PM, Stephan Mueller wrote: >>> Rather than adding a bogus setkey function, please fix this mess >>> properly by moving the top-level setkey function into the __driver >>> one where it should be.

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Tadeusz Struk
On 01/20/2015 05:25 PM, Stephan Mueller wrote: >> Rather than adding a bogus setkey function, please fix this mess >> properly by moving the top-level setkey function into the __driver >> one where it should be. Compare with how we handle it in the >> ablk_helper which is pretty much the same

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Herbert Xu
On Thu, Jan 22, 2015 at 10:23:57AM -0800, Tadeusz Struk wrote: No, I thought that the agreement was that we don't want to allow user space to use these helpers directly, right? Am I missing something? Yes but we should also fix this so that it's a proper aead algorithm. Cheers, -- Email:

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Tadeusz Struk
On 01/22/2015 01:20 PM, Stephan Mueller wrote: That would be correct. But if I understood Herbert correctly, he is creating a patch that disables these service ciphers for general usage. Yes, and this should also implicitly fix the problem with user space. Thanks, Tadeusz -- To unsubscribe

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Tadeusz Struk
On 01/22/2015 02:23 PM, Herbert Xu wrote: Yes but we should also fix this so that it's a proper aead algorithm. Ok, I'll do that. Thanks, Tadeusz -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Tadeusz Struk
On 01/20/2015 05:25 PM, Stephan Mueller wrote: Rather than adding a bogus setkey function, please fix this mess properly by moving the top-level setkey function into the __driver one where it should be. Compare with how we handle it in the ablk_helper which is pretty much the same thing.

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-22 Thread Stephan Mueller
Am Donnerstag, 22. Januar 2015, 10:23:57 schrieb Tadeusz Struk: Hi Tadeusz, On 01/20/2015 05:25 PM, Stephan Mueller wrote: Rather than adding a bogus setkey function, please fix this mess properly by moving the top-level setkey function into the __driver one where it should be. Compare with

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-20 Thread Stephan Mueller
Am Dienstag, 20. Januar 2015, 14:17:04 schrieb Herbert Xu: Hi Tadeusz, > On Sun, Jan 18, 2015 at 11:56:03PM +0100, Stephan Mueller wrote: > > The cipher registered as __driver-gcm-aes-aesni is never intended > > to be used directly by any caller. Instead it is a service mechanism to > >

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-20 Thread Stephan Mueller
Am Dienstag, 20. Januar 2015, 14:17:04 schrieb Herbert Xu: Hi Tadeusz, On Sun, Jan 18, 2015 at 11:56:03PM +0100, Stephan Mueller wrote: The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Herbert Xu
On Tue, Jan 20, 2015 at 04:54:44AM +0100, Stephan Mueller wrote: > > How would the fail manifest itself? If algif_aead would be present, user > space could use the __driver implementation regardless of a setkey or > authsize callback by simply calling encrypt/decrypt. Would the error be >

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Stephan Mueller
Am Dienstag, 20. Januar 2015, 14:37:05 schrieb Herbert Xu: Hi Herbert, >On Tue, Jan 20, 2015 at 04:35:41AM +0100, Stephan Mueller wrote: >> This in turn would then turn the __driver implementation into a full >> GCM implementation. That would mean that we should rename it from >> __driver into

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Herbert Xu
On Tue, Jan 20, 2015 at 04:35:41AM +0100, Stephan Mueller wrote: > > This in turn would then turn the __driver implementation into a full GCM > implementation. That would mean that we should rename it from __driver > into gcm(aes) / gcm-aesni. No you shouldn't because it'll fail in interrupt

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Stephan Mueller
Am Dienstag, 20. Januar 2015, 14:17:04 schrieb Herbert Xu: Hi Herbert, >On Sun, Jan 18, 2015 at 11:56:03PM +0100, Stephan Mueller wrote: >> The cipher registered as __driver-gcm-aes-aesni is never intended >> to be used directly by any caller. Instead it is a service mechanism >> to

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Herbert Xu
On Sun, Jan 18, 2015 at 11:56:03PM +0100, Stephan Mueller wrote: > The cipher registered as __driver-gcm-aes-aesni is never intended > to be used directly by any caller. Instead it is a service mechanism to > rfc4106-gcm-aesni. > > The kernel crypto API unconditionally calls the registered setkey

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Tadeusz Struk
On 01/18/2015 02:56 PM, Stephan Mueller wrote: > The cipher registered as __driver-gcm-aes-aesni is never intended > to be used directly by any caller. Instead it is a service mechanism to > rfc4106-gcm-aesni. > > The kernel crypto API unconditionally calls the registered setkey > function. In

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Herbert Xu
On Sun, Jan 18, 2015 at 11:56:03PM +0100, Stephan Mueller wrote: The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to rfc4106-gcm-aesni. The kernel crypto API unconditionally calls the registered setkey

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Herbert Xu
On Tue, Jan 20, 2015 at 04:54:44AM +0100, Stephan Mueller wrote: How would the fail manifest itself? If algif_aead would be present, user space could use the __driver implementation regardless of a setkey or authsize callback by simply calling encrypt/decrypt. Would the error be limited to

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Stephan Mueller
Am Dienstag, 20. Januar 2015, 14:37:05 schrieb Herbert Xu: Hi Herbert, On Tue, Jan 20, 2015 at 04:35:41AM +0100, Stephan Mueller wrote: This in turn would then turn the __driver implementation into a full GCM implementation. That would mean that we should rename it from __driver into gcm(aes)

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Herbert Xu
On Tue, Jan 20, 2015 at 04:35:41AM +0100, Stephan Mueller wrote: This in turn would then turn the __driver implementation into a full GCM implementation. That would mean that we should rename it from __driver into gcm(aes) / gcm-aesni. No you shouldn't because it'll fail in interrupt

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Stephan Mueller
Am Dienstag, 20. Januar 2015, 14:17:04 schrieb Herbert Xu: Hi Herbert, On Sun, Jan 18, 2015 at 11:56:03PM +0100, Stephan Mueller wrote: The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to rfc4106-gcm-aesni.

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-19 Thread Tadeusz Struk
On 01/18/2015 02:56 PM, Stephan Mueller wrote: The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to rfc4106-gcm-aesni. The kernel crypto API unconditionally calls the registered setkey function. In case a

[PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-18 Thread Stephan Mueller
The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to rfc4106-gcm-aesni. The kernel crypto API unconditionally calls the registered setkey function. In case a caller erroneously uses __driver-gcm-aes-aesni a call

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-18 Thread Stephan Mueller
Am Sonntag, 18. Januar 2015, 23:56:03 schrieb Stephan Mueller: Hi Tadeusz, > The cipher registered as __driver-gcm-aes-aesni is never intended > to be used directly by any caller. Instead it is a service mechanism to > rfc4106-gcm-aesni. > > The kernel crypto API unconditionally calls the

[PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-18 Thread Stephan Mueller
The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to rfc4106-gcm-aesni. The kernel crypto API unconditionally calls the registered setkey function. In case a caller erroneously uses __driver-gcm-aes-aesni a call

Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni

2015-01-18 Thread Stephan Mueller
Am Sonntag, 18. Januar 2015, 23:56:03 schrieb Stephan Mueller: Hi Tadeusz, The cipher registered as __driver-gcm-aes-aesni is never intended to be used directly by any caller. Instead it is a service mechanism to rfc4106-gcm-aesni. The kernel crypto API unconditionally calls the registered