On Wed, 2014-08-06 at 14:23 +0300, Cristian Stoica wrote:
> Hi Nikos,
> 
> On 06.08.2014 13:58, Nikos Mavrogiannopoulos wrote:
> > On Fri, May 30, 2014 at 12:59 PM, Cristian Stoica
> > <cristian.sto...@freescale.com> wrote:
> >> - block and stream ciphers have their keys copied from userspace
> >>   just like before
> >> - for aead composite ciphers, the cipher and hmac keys are
> >>   combined into a single key
> > 
> > Hello Christian,
> >  Do you have some test case on that? Which composite AEAD ciphers are
> > being supported?
> 
> I've tested this patch with AES-CBC-HMAC-SHA1 using the tls module that
> I've sent recently on Linux mailing list. That module needs rework for
> Lucky 13 and is a software alternative to the caam driver that does the
> same thing in hardware.
> http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg11665.html

Is that supposed to be used with COP_FLAG_AEAD_TLS_TYPE? I believe I had
added that flag to do exactly the same thing. The implementation is
pretty old though, and should have the same issue with the cbc padding
attacks.

regards,
Nikos



_______________________________________________
Cryptodev-linux-devel mailing list
Cryptodev-linux-devel@gna.org
https://mail.gna.org/listinfo/cryptodev-linux-devel

Reply via email to