From patchwork Mon Nov 5 12:05:01 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gilad Ben-Yossef X-Patchwork-Id: 150185 Delivered-To: patch@linaro.org Received: by 2002:a2e:299d:0:0:0:0:0 with SMTP id p29-v6csp2514768ljp; Mon, 5 Nov 2018 04:05:08 -0800 (PST) X-Google-Smtp-Source: AJdET5dX204KxQTBz2d+mE5hqWT1jotKtSGwB70PV40WEDv22Omig8OkkW4IknuoL60VhoQw761a X-Received: by 2002:a17:902:2cc1:: with SMTP id n59-v6mr21219957plb.144.1541419507984; Mon, 05 Nov 2018 04:05:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541419507; cv=none; d=google.com; s=arc-20160816; b=uFeTNnMw9pV0nwprImsClH1DFp3ZvOXi8DfvkQ66BKWmCa1UCd8OiAiyBOzZ2xpbjp CeVM0t9g9UArOg4yAMMYgCufAOcqTmPn3cWME00+mxX8crbNRWkYcRmR1lMKHV/0bUvt 6Bf2pHpwWRlgIIKl9AdiluEJXcsULhqNCoZD1bb0ue/htoXxB44rpogsRPFJA1B/X+J3 xkRvbBdadanDQxwnnASzNlW+ZdcC4HxQHy+4yMUiCZ8v2oZsS1H1pZS5reeq74O8kmBi lPtRKLmnhN9ELdKTce8v4g0oyjvpzwgNGFOt9hOBgNg3v3E6NxNY34ftbW+Ot3ft16y+ JfBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=v5GnsjtFnzY36PyiMUJmN7OG5+QvgIY08c53/YLZ6ts=; b=VEK4tuzeZ1UuTrVm4fMMmkqKnvhtDC2mNvfo5mFuuTjhM7WEWYv5LVK2voHuc1XjV0 0XsPODQ1bRtwynAjPpX+FNUOLWDw3+kkry6CXfmwxIZsPL07lXmqxbgZL0oDirUmtrqz FvkdymHVujZnOHvvVkwfoM3j98ExmW7BItm7sf58GyYuribOi3pjkBHFnAT53nFotUi1 IZDDXRHT41lli7Hkvx0JpTGsnW0HTjKoOIqov849nwJPnKwD6V8lof5EmAcghmVNdRPr Rblylw+LdlGk61eTnfdyAXgpvUjvVa/qNOem+J4PnGvAvUSVA1x2eNskk+jRthYzHL+E hiPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e39-v6si36277745plg.366.2018.11.05.04.05.07; Mon, 05 Nov 2018 04:05:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727332AbeKEVYb (ORCPT + 2 others); Mon, 5 Nov 2018 16:24:31 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:42126 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727128AbeKEVYb (ORCPT ); Mon, 5 Nov 2018 16:24:31 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A444180D; Mon, 5 Nov 2018 04:05:06 -0800 (PST) Received: from sugar.kfn.arm.com (E110176.Arm.com [10.50.4.178]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 02FED3F5BD; Mon, 5 Nov 2018 04:05:04 -0800 (PST) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , Yael Chemla , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: cts: document NIST standard status Date: Mon, 5 Nov 2018 12:05:01 +0000 Message-Id: <1541419502-7286-1-git-send-email-gilad@benyossef.com> X-Mailer: git-send-email 2.7.4 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org cts(cbc(aes)) as used in the kernel has been added to NIST standard as CBC-CS3. Document it as such. Signed-off-by: Gilad Ben-Yossef Suggested-by: Stephan Mueller --- crypto/Kconfig | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) -- 2.7.4 Acked-by: Ard Biesheuvel diff --git a/crypto/Kconfig b/crypto/Kconfig index f7a235d..9176023 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig @@ -430,11 +430,14 @@ config CRYPTO_CTS help CTS: Cipher Text Stealing This is the Cipher Text Stealing mode as described by - Section 8 of rfc2040 and referenced by rfc3962. - (rfc3962 includes errata information in its Appendix A) + Section 8 of rfc2040 and referenced by rfc3962 + (rfc3962 includes errata information in its Appendix A) or + CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010. This mode is required for Kerberos gss mechanism support for AES encryption. + See: https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final + config CRYPTO_ECB tristate "ECB support" select CRYPTO_BLKCIPHER