Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp257125ybe; Wed, 18 Sep 2019 16:43:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqyzJdkAwYQZIXsOkkIgUtr8wvYd+y+p0rn1FI4+X+6pnfUYfwpkgz5TunGL4djd9UcNHpCm X-Received: by 2002:a50:99d5:: with SMTP id n21mr13233780edb.50.1568850185563; Wed, 18 Sep 2019 16:43:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568850185; cv=none; d=google.com; s=arc-20160816; b=xMa969UsUySV3sgs8Nmms/CW6qkrjKADAdAJfU44aILrDRCFsOVCGiVuym1dO2vpFk SvmWaS2P6VhaZ2S9AMza0rdUV6lIF7BPhwgwuYxZ3oSk8IvjHxnv8d+sQFk+CDotmosx RAn6kI09do+vhQ/ENYsrkiD6Pfd+0PuaBC/7yNiJx27fIcKngT2wL4UajjZZBqHJcfcZ 4IiPN4EHIOpeMdEFIn/FIvDpflaabs+gfM61zVdt5q1CNuZ5fHCvak+2r7zRJx1WtCbR grsSKQ5X6SVipzfwbkaP1Za1XOt9MbpvebAYkKwx6cCHSnJiNHMg9R40+VAg+IkBfOEf wKrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=u9r2H5oTJTlz18m4wb3uliEwNf5zQTrl6vtAV/D7/5k=; b=zbD8OyZSLI4ezO0PeV9F03WFv5cydACHmRgmKdr45wSizL45BpTtckg0PV/xKa6dPX LD5rdeSleNMRMkQ7qcC/1QYFzA++13CRGksaRdtHpP58QxPDU52lDR9/bFNm+k0S83qF hTtrr+7ucjCmOzoSS6dmKFbCn0EfY0XJ7yxRzIUrJevzPtNYN1rIQa+f18iQKXmgC2kz /y5Pl2DZPvkZtHvMHAwbXsyHwAYTeufIDnHiEcSCBRtD2p6Ulw1eZ+9A3CZb3Q9/C8CI oQC0pIHVVqAh5g9kZwVPTu5wu2AyudAp56R1nV20FoDbEJmQrFfRmkUZ6fEX6iALDq39 3nUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=q1B6ZxoA; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ox28si3575370ejb.130.2019.09.18.16.42.32; Wed, 18 Sep 2019 16:43:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=q1B6ZxoA; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730184AbfIRW2x (ORCPT + 99 others); Wed, 18 Sep 2019 18:28:53 -0400 Received: from mail-ed1-f68.google.com ([209.85.208.68]:38284 "EHLO mail-ed1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728823AbfIRW2w (ORCPT ); Wed, 18 Sep 2019 18:28:52 -0400 Received: by mail-ed1-f68.google.com with SMTP id a23so1393158edv.5 for ; Wed, 18 Sep 2019 15:28:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=u9r2H5oTJTlz18m4wb3uliEwNf5zQTrl6vtAV/D7/5k=; b=q1B6ZxoAuag7I1kpSQnWegLrTXqIA6EPPUuHOXaAH0y3r/nxRLmOdf/+PJgqmN4XAb nhAyi56Gy3xNP2dIHsTxfQcy5O00rXwSyOPIXxec633mz5RxMhdNZAQ3PI9mswLdcuzb DQ3VwDSY/24jq9xJc63CbMbw0kC35Rl6MDvVBh1K1JVmXnBMnZMg4deLLYpo6G+U+3U0 yTvB087tSH+YzfgWVPW9fHV4G8ElrBg7Dh9gnAzwsApzyrF3jkixMb/H4RxPefF7Yhip XrMGl29EnkfkvbyFXjO3nME6DtxVK/DG2zeKsMo9j976SiHlC6By2/yeyaxNL0W6w8l5 l0Ig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=u9r2H5oTJTlz18m4wb3uliEwNf5zQTrl6vtAV/D7/5k=; b=tHPXzHWSrKuTDBYKWvDjMt/Bbg7XPwgqyLA83sgukYEt/Kow0nCNtMK2Nf+wr/Fmrf ryfGjOHbwVgWu84VbJT9WktV/azKf0ao/BXbpYXR+G4i8sQvIOsBw67UejipOA3O3EJb vfMvJ+iVJzpJzblCRW2G4BnuLT9fCrnv3PpViMCCNEZu0M5icqy3hmkdKAnBwJ42k8oq xGUTtikAny++yFO63Ov6agiV+wG3lZ2ZaJkanH0VHeqwGQ+vaYk+x1FKfUeBgZYYVxLV m/LvUyR4scgJjrhzW7DkEJskzUQtg/dBUat6vc6zSi+VriwpIOOXOxKFy+6oiZtUZwZu g0Ow== X-Gm-Message-State: APjAAAVGgourFjW1KDtPSZLAdLJxOFND9epg4UXYxtMWvrm+0q34V471 lFmHmtaw/tS956/26nvQ9chD446d X-Received: by 2002:a50:a8c5:: with SMTP id k63mr12864241edc.122.1568845729494; Wed, 18 Sep 2019 15:28:49 -0700 (PDT) Received: from localhost.localdomain.com ([188.204.2.113]) by smtp.gmail.com with ESMTPSA id a3sm811951eje.90.2019.09.18.15.28.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 18 Sep 2019 15:28:48 -0700 (PDT) From: Pascal van Leeuwen X-Google-Original-From: Pascal van Leeuwen To: linux-crypto@vger.kernel.org Cc: antoine.tenart@bootlin.com, herbert@gondor.apana.org.au, davem@davemloft.net, Pascal van Leeuwen Subject: [PATCHv4 0/3] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites Date: Wed, 18 Sep 2019 23:25:55 +0200 Message-Id: <1568841958-14622-1-git-send-email-pvanleeuwen@verimatrix.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Extend driver support with chacha20, rfc7539(chacha20,poly1305) and rfc7539esp(chacha20,poly1305) ciphers. The patchset has been tested with the eip197c_iesb and eip197c_iewxkbc configurations on the Xilinx VCU118 development board, including the crypto extra tests. Note that this patchset applies on top of the earlier submitted "Add support for the CBCMAC" series. changes since v1: - rebased on top of DES library changes done on cryptodev/master - fixed crypto/Kconfig so that generic fallback is compiled as well changes since v2: - made switch entry SAFEXCEL_AES explit and added empty default, as requested by Antoine Tenart. Also needed to make SM4 patches apply. changes since v3: - for rfc7539 and rfc7539esp, allow more (smaller) AAD lenghts to be handled by the hardware instead of the fallback cipher (this allows running the tcrypt performance tests on the actual hardware) Pascal van Leeuwen (3): crypto: inside-secure - Added support for the CHACHA20 skcipher crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD crypto: Kconfig - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL drivers/crypto/Kconfig | 3 +- drivers/crypto/inside-secure/safexcel.c | 3 + drivers/crypto/inside-secure/safexcel.h | 11 + drivers/crypto/inside-secure/safexcel_cipher.c | 336 ++++++++++++++++++++++++- 4 files changed, 339 insertions(+), 14 deletions(-) -- 1.8.3.1