On 9/21/2020 10:32 AM, Andrei Botila (OSS) wrote: > From: Andrei Botila <andrei.botila@xxxxxxx> > > This patch series fixes some problems in CAAM's implementation of xts(aes): > - CAAM until Era 9 can't process XTS with 16B IV > - CAAM can only process in hardware XTS key lengths of 16B and 32B > - These hardware limitations are resolved through a fallback > - CAAM used to return 0 for XTS block length equal to zero > > This patch series also adds a new feature in CAAM's xts(aes): > - CAAM is now able to process XTS with 16B IV in HW > > Changes since v1: > - use only get_unaligned() for calculating XTS IV size > - fixed the double calling of crypto_skcipher_set_reqsize() in case of XTS > - added a patch which modifies the return value for XTS when block length > is equal to zero > Nitpick: The new patches are 7-9/12. Since they have the same Fixes tag and solve the same issue, it would probably be better to squash them into a single patch. Thanks, Horia