From patchwork Tue May 19 19:02:09 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 11558551 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id D531114B7 for ; Tue, 19 May 2020 19:02:18 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BE32F20874 for ; Tue, 19 May 2020 19:02:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589914938; bh=p2x2LclJ0xI5fOs4bKaK0KKKNU41HHkLK1/dnIsHhbo=; h=From:To:Cc:Subject:Date:List-ID:From; b=P4VYHtOgg9JTlQSVggIuIZXkpUJ5gTS8v7c1wTOBhL0YOfW0kbcx/FsnKKf8JTWjH d+Yt951dKxzdOtFr1MkRkAXOuLBSGdZO3aMrvkmddgPQhPjGGvavbLC/VlLm5j84wA aULwjC4aF/34JKZqhXUBQ5QScBaKDg7ByijXpgEE= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727839AbgESTCR (ORCPT ); Tue, 19 May 2020 15:02:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:56034 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726059AbgESTCR (ORCPT ); Tue, 19 May 2020 15:02:17 -0400 Received: from localhost.localdomain (laubervilliers-657-1-83-120.w92-154.abo.wanadoo.fr [92.154.90.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0E025207E8; Tue, 19 May 2020 19:02:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589914937; bh=p2x2LclJ0xI5fOs4bKaK0KKKNU41HHkLK1/dnIsHhbo=; h=From:To:Cc:Subject:Date:From; b=ed4rYd06KgneWuTtKnnW/R+djaWb82I8QTBhJc0jZJlJ0rzytKbNy+1RtJlXBofD1 4brbfdRk+QiBYQNEfFB8eZdX4hEzXS7eGt2YhLnfNCZkBWNU+kPSapCxJ5YW9kBvRu cR5tu2Ri5IFMPTwexevC84whByKeQ+IAON2s07GQ= From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, ebiggers@kernel.org, Ard Biesheuvel , Stephan Mueller Subject: [RFC/RFT PATCH 0/2] crypto: add CTS output IVs for arm64 and testmgr Date: Tue, 19 May 2020 21:02:09 +0200 Message-Id: <20200519190211.76855-1-ardb@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Stephan reports that the arm64 implementation of cts(cbc(aes)) deviates from the generic implementation in what it returns as the output IV. So fix this, and add some test vectors to catch other non-compliant implementations. Stephan, could you provide a reference for the NIST validation tool and how it flags this behaviour as non-compliant? Thanks. Cc: Stephan Mueller Ard Biesheuvel (2): crypto: arm64/aes - align output IV with generic CBC-CTS driver crypto: testmgr - add output IVs for AES-CBC with ciphertext stealing arch/arm64/crypto/aes-modes.S | 2 ++ crypto/testmgr.h | 12 ++++++++++++ 2 files changed, 14 insertions(+)