From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smail.rz.tu-ilmenau.de (smail.rz.tu-ilmenau.de [141.24.4.149]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Thu, 6 Aug 2015 13:46:51 +0200 (CEST) Message-ID: <55C34926.8000802@tu-ilmenau.de> Date: Thu, 06 Aug 2015 13:46:46 +0200 From: Lars Winterfeld MIME-Version: 1.0 References: <55C3060B.6030206@freescale.com> <55C325AE.6070604@gmail.com> <55C33919.40101@freescale.com> <55C342C2.3090800@tu-ilmenau.de> <55C345CA.90101@freescale.com> In-Reply-To: <55C345CA.90101@freescale.com> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="BR0V0fo21hLNmdN8O3RNDnVcM2vqrKIpe" Subject: Re: [dm-crypt] out of order encryption List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Vasile Catalin-B50542 , dm-crypt@saout.de This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --BR0V0fo21hLNmdN8O3RNDnVcM2vqrKIpe Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable As far as I understand, your commands are used to set up the crypto mapper. They should be executed previous to any read/write operations. I think Milan was talking about read/write operations that are executed after the crypto mapper has been set up successfully. Btw... I guess that if two write operations result in two different changes in the same sector, there are no write conflicts, because for each write, the current sector contents is decrypted first, changes are applies, encrypted and written back. Is that correct? Am 06.08.2015 um 13:32 schrieb Vasile Catalin-B50542: > I am sending crypto requests to a hardware component which has > an option to keeping them in order or not. I was trying to use the out = of > order option because this would let requests run in parallel. > If I tried running them with the out of order option bun then I get: > No key available with this passphrase. > When trying to execute the following commands: > cryptsetup -c aes-xts-plain -y -v luksFormat /dev/sda1 > cryptsetup open /dev/sda1 test_xts1 >=20 > On 06.08.2015 14:19, Lars Winterfeld wrote: >> Am 06.08.2015 um 12:38 schrieb Vasile Catalin-B50542: >>> Does the underlying encryption layer (CryptoAPI) have to ensure the >>> complete callbacks are called in the order the requests were submitte= d? >> Are you thinking about parallelization or asynchronous processing? >> --BR0V0fo21hLNmdN8O3RNDnVcM2vqrKIpe Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iQIcBAEBAgAGBQJVw0kqAAoJEHVR+BAIQ6atZpcP/jYsObZ3x0kfa82UsBZhTbXV 1By85q03ZGmLh2DnEGbgOP5rJL7xCK6W0gqO8OQc/1MnWzzjhOjC9FJaQ87XbDIY 5A8057zQOWQLhoRLWzxOS5/btz8FOYrpmsOYvR2LV8q4FOUks3tQQ+VZJwlXwnXF EQj65fi/jcwuDYf/uVOCPsk/Mlv3r+M8oJDOdaR/kyu8+tc7AUjy+Ii/lHy7yEpc +RGFMC2KRTrRqIkMzlRRqwdZFWkFlqNcl5/U/VN3r5f8RstqAb5OLpyMDswwab9h DD+ES0JIbt4hN3XRIHhtYZdtHR25CYZZIIuY58pg3RStf/qzm1ROTrg+T1H4E+T4 aj93ZE01f1bckKPTeyFrzRw08mQQYjsKFLISim0Q18I6rqBieKItP3V8wu9WP0QY rVyDx10Y7C8+JP9G4NlomBzV9zbwjK/+Vm+c4eOmGmITpGtuGedm7ATpSeY02ko8 2lV/BWuO9WtgkQYz7jC9kA/tL8kRChfRbgU72iL728VmbBz4az0KNPhw10ibAfqt XzI9zmAeh8Qoj6KKNaf05LxurhKW7KPzFICrJo4rr0d+wkbg5zYhJMcjH83vlCd9 jIfG3TKHs/ntaYc+0hdPcScMCsQ23BimUXVZAjV8H3ewQd93faHsJVqw3LWegV8f zKLsT1bSIUoJjkiOCZj4 =CUS5 -----END PGP SIGNATURE----- --BR0V0fo21hLNmdN8O3RNDnVcM2vqrKIpe--