Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1801766ybp; Fri, 11 Oct 2019 21:45:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqwhoHNPxSzaIdqr9u4auLeROevKmKk6yN0A0SP9lquLjY01jzJxOzwJiXMtnrrKOBbSlfZO X-Received: by 2002:a17:906:940a:: with SMTP id q10mr17585326ejx.250.1570855527373; Fri, 11 Oct 2019 21:45:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570855527; cv=none; d=google.com; s=arc-20160816; b=S5IahUMJl8V5hY7o+Re3ijZMErfpq7EvKZkq2psb8hSuRggciuZDYOm/OJLUDU79El ucT9mPROoy6LZ2YN9HyzPBznsbU8DQSfpZTkCSk5CXqzGIAq1fniCNEoBw+2rpwXzjUc 9u99UkdfkfOzGJPFHPumw6Xs4jW5Vv2VAjHjaQy7F3q5lx4R5aCoo72H5uNpki+jEH+z HMBa3banBBt94fvX5p4no+l9r2AuM+MUFsdAEUgWDMdZa1cm1T0ZdUzEDb0dH4SCMhKV j91ZccgmU+mmbgrl4vB1AiMvKI4uVPLQmmmjv70y8zLeoEXR8Fgm3xcMb+b31NsWuYRH OIDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=iJFaqAxFe/AgKLhZRAF4FcYh96eNTC1y/KesQjldQP0=; b=f9bn90fLqijuafWIeMO2/U+p0EMQIyOIb6pSkMKs6JBVeE/1xOtB2Vn1+yI2NiTyGv fx9GyC3kDXS7oooCNvuAKlBuO24cEnLGVSFp06G2e4s0ZN1ATgvCI/XrxjzIKX96IeBV CN2O0agY26R+F9BTgWiEfPdon8t/B5SgmT7TROMG2VQOBi8i3ISRWvwOPIIEbNH+iiQC hd+I0MFPJPnh1vYr6NOCRrBR0GunGKnrqN6KcRHT+li795qlnK9N6oYFjyBBpJ6LEO3w h/Tbf5LMBsvHqhwdOCYUppfC+3LQ6IXuYHctYJQF1XmId+ThVN1RLq0jXPhT90gaYy+7 qhcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=onVLMtLV; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s1si6968909ejf.305.2019.10.11.21.44.51; Fri, 11 Oct 2019 21:45:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=onVLMtLV; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727345AbfJLElH (ORCPT + 99 others); Sat, 12 Oct 2019 00:41:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:33072 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726269AbfJLElH (ORCPT ); Sat, 12 Oct 2019 00:41:07 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8473A206CD; Sat, 12 Oct 2019 04:41:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570855266; bh=ip7Nb00jzBWztmBph7CZwtdVG3BuzLMxefuhK/GHeoY=; h=From:To:Cc:Subject:Date:From; b=onVLMtLVYyIQiicnnvXyDSo7MIXJk0N6vgDh3UrvyUUmxBklUGW35XncqLNlq7Q24 V6wfS6zlvB/V+dnw+vajsZyVhSEwqTZfMuIxqNOqmrfXgD9jFH9RK7fCzd6xJAs953 gH3ta8E8H4bf7ZpQRAUe6bPlpA24uXTeU2ttmwkU= From: Eric Biggers To: Herbert Xu , linux-crypto@vger.kernel.org Cc: sparclinux@vger.kernel.org, "David S . Miller" Subject: [RFT PATCH 0/3] crypto: sparc - convert to skcipher API Date: Fri, 11 Oct 2019 21:38:47 -0700 Message-Id: <20191012043850.340957-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This series converts the glue code for the SPARC64 crypto opcodes implementations of AES, Camellia, DES, and 3DES modes from the deprecated "blkcipher" API to the "skcipher" API. This is needed in order for the blkcipher API to be removed. I've compiled this patchset, and the conversion is very similar to that which has been done for many other crypto drivers. But I don't have the hardware to test it, nor are SPARC64 crypto opcodes supported by QEMU. So I really need someone with the hardware to test it. You can do so by setting: CONFIG_CRYPTO_AES_SPARC64=y CONFIG_CRYPTO_CAMELLIA_SPARC64=y CONFIG_CRYPTO_DES_SPARC64=y # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set CONFIG_DEBUG_KERNEL=y CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y CONFIG_CRYPTO_AES=y CONFIG_CRYPTO_CAMELLIA=y CONFIG_CRYPTO_DES=y CONFIG_CRYPTO_CBC=y CONFIG_CRYPTO_CTR=y CONFIG_CRYPTO_ECB=y Then boot and check for crypto self-test failures by running 'dmesg | grep alg'. If there are test failures, please also check whether they were already failing prior to this patchset. Eric Biggers (3): crypto: sparc/aes - convert to skcipher API crypto: sparc/camellia - convert to skcipher API crypto: sparc/des - convert to skcipher API arch/sparc/crypto/aes_glue.c | 310 +++++++++---------- arch/sparc/crypto/camellia_glue.c | 217 ++++++------- arch/sparc/crypto/des_glue.c | 499 ++++++++++++++---------------- crypto/Kconfig | 5 +- 4 files changed, 468 insertions(+), 563 deletions(-) -- 2.23.0