Hi Herbert, Sorry for the delayed response, I was busy with testing dm-crypt with bonnie++ for regressions. I tried to find some alternative way to keep the IV algorithms' registration in the dm-crypt. Also there were some changes done in dm-crypt keys structure too recently. c538f6e dm crypt: add ability to use keys from the kernel key retention service On Thu, Dec 22, 2016 at 04:25:12PM +0530, Binoy Jayan wrote: > > > It doesn't have to live outside of dm-crypt. You can register > > these IV generators from there if you really want. > > Sorry, but I didn't understand this part. What I mean is that moving the IV generators into the crypto API does not mean the dm-crypt team giving up control over them. You could continue to keep them within the dm-crypt code base and still register them through the normal crypto API mechanism When we keep these in dm-crypt and if more than one key is used (it is actually more than one parts of the original key), there are more than one cipher instance created - one for each unique part of the key. Since the crypto requests are modelled to go through the template ciphers in the order: "essiv -> cbc -> aes" a particular cipher instance of the IV (essiv in this example) is responsible to encrypt an entire bigger block. If this bigger block is to be later split into 512 bytes blocks and then encrypted using the other cipher instance depending on the following formula: key_index = sector & (key_count - 1) it is not possible as the cipher instances do not have access to each other's instances. So, number of keys used is crucial while performing encryption. If there was only a single key, it should not have been a problem. But if there are more than one key, then encrypting a bigger block with a single key would cause backward incompatibility. I was wondering if this is acceptable. bigger block: What I mean by bigger block here is the set of 512-byte blocks that dm-crypt can be optimized to process at once. Thanks, Binoy -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html