From: Joel Fernandes <joelf@ti.com>
To: Jussi Kivilinna <jussi.kivilinna@iki.fi>
Cc: Linux Crypto Mailing List <linux-crypto@vger.kernel.org>
Subject: Re: [RFC] Unaligned CTR mode tests in crypto/testmgr.h
Date: Wed, 30 Oct 2013 16:06:37 -0500 [thread overview]
Message-ID: <527174DD.1010504@ti.com> (raw)
In-Reply-To: <5270E903.3020502@iki.fi>
On 10/30/2013 06:09 AM, Jussi Kivilinna wrote:
> On 30.10.2013 02:11, Joel Fernandes wrote:
>> Hi,
>>
>> Some tests such as test 5 in AES CTR mode in crypto/testmgr.h have a unaligned
>> input buffer size such as 499 which is not aligned to any > 0 power of 2.
>>
>> Due to this, omap-aes driver, and I think atmel-aes too error out when
>> encryption is requested for these buffers.
>>
>> pr_err("request size is not exact amount of AES blocks\n") or a similar message.
>>
>> Is this failure considered a bug? How do we fix it?
>
> Counter mode turns block cipher into stream cipher and implementation must handle
> buffer lengths that do not match the block size of underlying block cipher.
>
>>
>> How were the result output vectors generated, did you use 0 padding? Do we 0 pad
>> the inputs to align in these cases to get correct results?
>
> See crypto/ctr.c:crypto_ctr_crypt_final() how to handle trailing bytes when
> 'buflen % AES_BLOCK_SIZE != 0'.
>
> Basically, you encrypt the last counter block to generate the last keystream
> block and xor only the 'buflen % AES_BLOCK_SIZE' bytes of last keystream block
> with the tail bytes of source buffer:
>
> key_last[0..15] = ENC(K, counter[0..15]);
> dst_last[0..trailbytes-1] = src_last[0..trailbytes-1] ^ key_last[0..trailbytes-1];
> /* key_last[trailbytes..15] discarded. */
>
> Or if you want to use hardware that only does block-size aligned CTR encryption,
> you can pad input to block size aligned length, do encryption, and then discard
> those padding bytes after encryption:
>
> src_padded[0..trailbytes-1] = src_last[0..trailbytes-1]
> src_padded[trailbytes..15] = /* don't care, can be anything/uninitialized */
> src_padded[0..15] = ENC_HW_CTR(src_padded[0..15]);
> dst_last[0..trailbytes-1] = src_padded[0..trailbytes-1];
> /* src_padded[trailbytes..15] discarded. */
>
> Here, ENC_HW_CTR(in) internally does:
> keystream[0..15] = ENC(K, counter[0..15]); INC_CTR(counter);
> out[0..15] = in[0..15] ^ keystream[0..15];
>
Thanks, I'll try that. Just one question- is it safe to assume the output buffer
(req->dst) is capable of holding those many bytes?
In your algorithm above, we're assuming here without allocating explicitly that
the output buffer passed to the driver has trailbytes..15 available. Because
otherwise we are in danger of introducing a memory leak, if we just assume they
are available in the output buffer.
That said, I don't want to allocate new buffer in the driver and then do copying
of encrypted data back into the output buffer. Because I did lot of hard work to
get rid of such code as it is slower.
thanks,
-Joel
next prev parent reply other threads:[~2013-10-30 21:06 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-10-30 0:11 [RFC] Unaligned CTR mode tests in crypto/testmgr.h Joel Fernandes
2013-10-30 1:54 ` Herbert Xu
2013-10-30 18:34 ` Fernandes, Joel
2013-10-30 11:09 ` Jussi Kivilinna
2013-10-30 21:06 ` Joel Fernandes [this message]
2013-10-31 8:40 ` Jussi Kivilinna
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=527174DD.1010504@ti.com \
--to=joelf@ti.com \
--cc=jussi.kivilinna@iki.fi \
--cc=linux-crypto@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).