From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0115.outbound.protection.outlook.com [65.55.169.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Thu, 6 Aug 2015 13:32:37 +0200 (CEST) Message-ID: <55C345CA.90101@freescale.com> Date: Thu, 6 Aug 2015 14:32:26 +0300 From: Vasile Catalin-B50542 MIME-Version: 1.0 References: <55C3060B.6030206@freescale.com> <55C325AE.6070604@gmail.com> <55C33919.40101@freescale.com> <55C342C2.3090800@tu-ilmenau.de> In-Reply-To: <55C342C2.3090800@tu-ilmenau.de> Content-Type: multipart/alternative; boundary="------------060904030608050004030701" Subject: Re: [dm-crypt] out of order encryption List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Lars Winterfeld , dm-crypt@saout.de --------------060904030608050004030701 Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit I am sending crypto requests to a hardware component which has an option to keeping them in order or not. I was trying to use the out of order option because this would let requests run in parallel. If I tried running them with the out of order option bun then I get: No key available with this passphrase. When trying to execute the following commands: cryptsetup -c aes-xts-plain -y -v luksFormat /dev/sda1 cryptsetup open /dev/sda1 test_xts1 On 06.08.2015 14:19, Lars Winterfeld wrote: > Am 06.08.2015 um 12:38 schrieb Vasile Catalin-B50542: >> Does the underlying encryption layer (CryptoAPI) have to ensure the >> complete callbacks are called in the order the requests were submitted? > Are you thinking about parallelization or asynchronous processing? > --------------060904030608050004030701 Content-Type: text/html; charset="windows-1252" Content-Transfer-Encoding: 7bit I am sending crypto requests to a hardware component which has
an option to keeping them in order or not. I was trying to use the out of
order option because this would let requests run in parallel.
If I tried running them with the out of order option bun then I get:
No key available with this passphrase.
When trying to execute the following commands:
cryptsetup -c aes-xts-plain -y -v luksFormat /dev/sda1
cryptsetup open /dev/sda1 test_xts1

On 06.08.2015 14:19, Lars Winterfeld wrote:
Am 06.08.2015 um 12:38 schrieb Vasile Catalin-B50542:
Does the underlying encryption layer (CryptoAPI) have to ensure the
complete callbacks are called in the order the requests were submitted?
Are you thinking about parallelization or asynchronous processing?

--------------060904030608050004030701--