On 04/21/2015 09:27 AM, jonathan.thieuleux@xxxxxxxxx wrote: > I'm implementing a new cipher block within the kernel and I'm stuck into a > problem. My algorithm works pretty well, it can cipher and decipher a block. The > algorithm also works with ECB, CBC, and CTR modes, however when I try to use the > modes such as XTS or LRW I have the following errors which are attached. Did I > need to add more code to make it work with XTS and other modes ? First, from the cryptsetup log # Userspace crypto wrapper cannot use gost-xts-plain64 (-2). it seems that there is some problem with loading of your gost cipher implementation. What key size you are using in cryptsetup (default is probably 256bit)? LRW and XTS modes requires *two* keys in fact (tweaking+encryption). GOST should use 256bit key, so if you add --key-size 512 to your cryptsetup command does it help? Milan -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html