Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp2599049ybp; Sat, 12 Oct 2019 13:27:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqwMSEgDzV9Q6q28xDF0NLMCimerY6WSuAJ1w+uHLylvwH03VTxT7mGAShO5ZiH+pV0A2vqn X-Received: by 2002:a17:906:b314:: with SMTP id n20mr21481477ejz.11.1570912021677; Sat, 12 Oct 2019 13:27:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570912021; cv=none; d=google.com; s=arc-20160816; b=Ysc/EtMb6u3keVLXcZxZNk0wEhsn3huaoERsBzEYMR97UXfMDFzrwPWPqyNafvuPAK G+xW7z57c1/SP7t+5kt8ZqAuyVJPQrVpmK5p59KVc9r6UmTkwpL4y0gqNsJP+ZDj65aP 7LwCeqwhiHllwNvg2tjVfLFhH6AYc32V+pxsdS7xGF/sz3ILezdb/t43rLhbwTgbZJoD sBwPCEX37pXY4mETrddMX172qrgIm1cVsKEaD4B46Rka2osK8FG2yysARHfMVgtfZZBy ytffx7cqp6DwCafkbM7OqepyIaZwFMO43nwGO77eqQskyAUPONG6pv6fYjYnTxeSGmOc 79+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=JDogYqt5/z8D/xC23Jj5ZAbKaBvNh5us6U0Z5x6ycQ4=; b=iDZ70rR9f9iEfm9H1mQLlk+hB6K8P08HVdeaTF0tVthEEmWzUdJh+saI26b69LCJDM Jx8ZTK9kScuzA+9DygP2UgyYgYTOK28puyxYKf72KZ72ROOTG+7/qqH/h4rxRTlOykhG gKRtDP34Jy8OwgMXnD8KN7MebvTRi4V2DfLOsbje+w3mjxbMNVW5ZKqi+PjhZrifLt7K FZqUTLMESl5lhBQuUNf+UbWywvw2TiNOtCJqAHHmjD5HM3FQRMxmDvAGeWokDnOQvIZw AEb9IRr25DkdC9weSpzH5PQ+PkXBBqAM+ujTpcV94CNrTMWJF+FPlaZDQeE6zoNieZRC Ku5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Wtcyyyj4; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f57si8442640ede.78.2019.10.12.13.26.23; Sat, 12 Oct 2019 13:27:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Wtcyyyj4; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729463AbfJLUUP (ORCPT + 99 others); Sat, 12 Oct 2019 16:20:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:55776 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729413AbfJLUUO (ORCPT ); Sat, 12 Oct 2019 16:20:14 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E10CA20700; Sat, 12 Oct 2019 20:20:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570911612; bh=YIYi1aXNRP+OH+Apm03WWs+kylvIs7WZVZqljhJMypM=; h=From:To:Cc:Subject:Date:From; b=Wtcyyyj4WgWrdzYuvXPsmxBtee+NBOkA78/EDQol0K3HATlT85yB7khWhvEmm8aCK ONsEL5yZSf/9x8s+NEClmXeR9T/lG5Mp34ItZdV6+LRi0W0kxvI9mtUfby8/Q3/zGB b3LjhR15QwCNnjmXeQtga6uy39UO/Yv2FiI7juXA= From: Eric Biggers To: linux-crypto@vger.kernel.org, Herbert Xu Cc: linux-s390@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Harald Freudenberger Subject: [RFT PATCH 0/3] crypto: s390 - convert to skcipher API Date: Sat, 12 Oct 2019 13:18:06 -0700 Message-Id: <20191012201809.160500-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This series converts the glue code for the S390 CPACF implementations of AES, DES, and 3DES modes from the deprecated "blkcipher" API to the "skcipher" API. This is needed in order for the blkcipher API to be removed. I've compiled this patchset, and the conversion is very similar to that which has been done for many other crypto drivers. But I don't have the hardware to test it, nor is S390 CPACF supported by QEMU. So I really need someone with the hardware to test it. You can do so by setting: CONFIG_CRYPTO_HW=y CONFIG_ZCRYPT=y CONFIG_PKEY=y CONFIG_CRYPTO_AES_S390=y CONFIG_CRYPTO_PAES_S390=y CONFIG_CRYPTO_DES_S390=y # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set CONFIG_DEBUG_KERNEL=y CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y CONFIG_CRYPTO_AES=y CONFIG_CRYPTO_DES=y CONFIG_CRYPTO_CBC=y CONFIG_CRYPTO_CTR=y CONFIG_CRYPTO_ECB=y CONFIG_CRYPTO_XTS=y Then boot and check for crypto self-test failures by running 'dmesg | grep alg'. If there are test failures, please also check whether they were already failing prior to this patchset. This won't cover the "paes" ("protected key AES") algorithms, however, since those don't have self-tests. If anyone has any way to test those, please do so. Eric Biggers (3): crypto: s390/aes - convert to skcipher API crypto: s390/paes - convert to skcipher API crypto: s390/des - convert to skcipher API arch/s390/crypto/aes_s390.c | 609 ++++++++++++++--------------------- arch/s390/crypto/des_s390.c | 419 ++++++++++-------------- arch/s390/crypto/paes_s390.c | 414 ++++++++++-------------- 3 files changed, 580 insertions(+), 862 deletions(-) -- 2.23.0