On Wed, 2014-08-06 at 14:23 +0300, Cristian Stoica wrote: > Hi Nikos, > > On 06.08.2014 13:58, Nikos Mavrogiannopoulos wrote: > > On Fri, May 30, 2014 at 12:59 PM, Cristian Stoica > > <cristian.sto...@freescale.com> wrote: > >> - block and stream ciphers have their keys copied from userspace > >> just like before > >> - for aead composite ciphers, the cipher and hmac keys are > >> combined into a single key > > > > Hello Christian, > > Do you have some test case on that? Which composite AEAD ciphers are > > being supported? > > I've tested this patch with AES-CBC-HMAC-SHA1 using the tls module that > I've sent recently on Linux mailing list. That module needs rework for > Lucky 13 and is a software alternative to the caam driver that does the > same thing in hardware. > http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg11665.html
Is that supposed to be used with COP_FLAG_AEAD_TLS_TYPE? I believe I had added that flag to do exactly the same thing. The implementation is pretty old though, and should have the same issue with the cbc padding attacks. regards, Nikos _______________________________________________ Cryptodev-linux-devel mailing list Cryptodev-linux-devel@gna.org https://mail.gna.org/listinfo/cryptodev-linux-devel