Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4520986ybp; Mon, 14 Oct 2019 06:04:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqzMdnO5MsXDLiPi4rEnwmb+mr2fCXIp+w/qu+kW9PCpIcXZJ3PHHfgayipTFfD4lg/zd5cP X-Received: by 2002:a17:907:393:: with SMTP id ss19mr28144494ejb.62.1571058298851; Mon, 14 Oct 2019 06:04:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571058298; cv=none; d=google.com; s=arc-20160816; b=J+bsrdQVPo4YcL9E3qpkwcfql/hcuDeeoZlt2guaQjicbI+ENFD9c4NnwYCkCD04Ny 1xA/ouds6xaQZO7dO9qbw8oKlYWw/XxYEvm9wMB6E3paliMG+FuOVtxTN+6cWLS66Qfe pR99aUCpgT2lSvKq0Vmq2EWXtXcBOdi+Lgpd+EWyWiGUfz4NlgBaOhS5qIi5uQx0dW8o YDjmoqcv8Pq0husKbLABP3k+81Gz44RePyQL/DKDtAAAj/+ZrDseaLH7PUi4383OLJg+ Phn4JprM8DhVUVdQWuiyN0/mRPlCypsENpcv9h/H9e7tMg72Z76D+SR7r0/pmLPqL8I2 gj7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=TTkA/5vTH9Kh1+XMRC6xhgxSKGDJRglBVbRfMO0b/uY=; b=jXpOwzIh1x/Z4+gB3GOnkU1pOIdM1cRQT7ptffz4WI7P5DFTWQlVSlKGnCaDHs317F 6UZeS2C2SkuSuAV78T5rgyl26fbNDStvKqNDpPNC3wMLbr3bkTjFvuJ2OmdiId6J0D6E nGvyX6fQt/s3GKX27/Aq39Pp/FSLvQIeLvl6PARQbQ+WzpI10BHPavkE07Tf4rwb4F0f C3ZvhWeIQnPG4znQ7aVcJTo9cbc9NyTPSxj7MJF1gW2Qojb9fRTpB1uQ5NQpFa3Bnq2W AQ4So1gmXOFoFp+jmHdheTfbA50sNg1Q2/WkAbIC3xOUiEMi+8MnqYrJyuxuT3O6Nr8K 0yuw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=hEqY218f; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d17si13776956eda.213.2019.10.14.06.04.33; Mon, 14 Oct 2019 06:04:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=hEqY218f; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730386AbfJNMrK (ORCPT + 99 others); Mon, 14 Oct 2019 08:47:10 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:55640 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730733AbfJNMrK (ORCPT ); Mon, 14 Oct 2019 08:47:10 -0400 Received: by mail-wm1-f66.google.com with SMTP id a6so17113673wma.5 for ; Mon, 14 Oct 2019 05:47:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=TTkA/5vTH9Kh1+XMRC6xhgxSKGDJRglBVbRfMO0b/uY=; b=hEqY218fHzvciuduGiB8zmFUf3M0b55irActkL0tbSl4V9ZW4yb2Gr8EbVZxRMUsak 2EEDG50n39iM1awJUJkvRG97oYZz4tX+EHLKLEWOvREf7Z+JrfkMUrZOYLfZRc00jEkg nrVFXNnLewGGtjWGzUsToPdaKNUKUpRuEKib7gDmcS3p2OjkfxvwZJ7CXQm3Ih8mEHBm GE6vtINAN+YDEePf/L+gWdG50qaKyATPJGNdeMnaVlUF12tOrKmIn987WhZLHvqp1FAU g75RQPG+tf4W76LB+oak+hQgOfGxgfngYrv3QwPf32ZJjQA1ssRuMpJ0Z6fobZCq9RKG rJSg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=TTkA/5vTH9Kh1+XMRC6xhgxSKGDJRglBVbRfMO0b/uY=; b=rXpek6rSIQzyuMVelxqf6kYutioFeRSf0uFbRyryXeGQQng7rre5bEp7u3mE9OBH8k /h0xIlUO0Tt2pBjoygrj+JG5eIyp2IMBez1Ml3CWy59S+W66oVVxqEabDVOQDSXUNn7t oPv5n1tf2mGb1Vb4nfqltFCQc1C5mAEM9EFrm2D+5Y1IUxyCMkIMZiuAHDEdlv+1JTeF DF/RD67M6tW1oCJP3ngEdfF50/YrADW1Xw7lZtANZT4Y34QgHi/Js5jXzhUjRMpKgVQC hdv7EFM47ijLZlYdbR7XuweGkn4WTR5S+G7tY3/nwldLUJ2WZmpi4iKnjrX1Sxz1HMUI DElw== X-Gm-Message-State: APjAAAXS3hc8ckLuKKZvvGawNKT3pLhQzgfAaNXmEAcAkL0rIS/tS/Uq KaYmStXq57R2IcOEIr3Mwiz5yUg23azCbu7O3GG9zw== X-Received: by 2002:a05:600c:2214:: with SMTP id z20mr15281643wml.10.1571057226626; Mon, 14 Oct 2019 05:47:06 -0700 (PDT) MIME-Version: 1.0 References: <20191012201809.160500-1-ebiggers@kernel.org> In-Reply-To: <20191012201809.160500-1-ebiggers@kernel.org> From: Ard Biesheuvel Date: Mon, 14 Oct 2019 14:46:55 +0200 Message-ID: Subject: Re: [RFT PATCH 0/3] crypto: s390 - convert to skcipher API To: Eric Biggers Cc: "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Herbert Xu , linux-s390 , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Harald Freudenberger Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sat, 12 Oct 2019 at 22:20, Eric Biggers wrote: > > This series converts the glue code for the S390 CPACF implementations of > AES, DES, and 3DES modes from the deprecated "blkcipher" API to the > "skcipher" API. This is needed in order for the blkcipher API to be > removed. > > I've compiled this patchset, and the conversion is very similar to that > which has been done for many other crypto drivers. But I don't have the > hardware to test it, nor is S390 CPACF supported by QEMU. So I really > need someone with the hardware to test it. You can do so by setting: > > CONFIG_CRYPTO_HW=y > CONFIG_ZCRYPT=y > CONFIG_PKEY=y > CONFIG_CRYPTO_AES_S390=y > CONFIG_CRYPTO_PAES_S390=y > CONFIG_CRYPTO_DES_S390=y > # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set > CONFIG_DEBUG_KERNEL=y > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y > CONFIG_CRYPTO_AES=y > CONFIG_CRYPTO_DES=y > CONFIG_CRYPTO_CBC=y > CONFIG_CRYPTO_CTR=y > CONFIG_CRYPTO_ECB=y > CONFIG_CRYPTO_XTS=y > > Then boot and check for crypto self-test failures by running > 'dmesg | grep alg'. > > If there are test failures, please also check whether they were already > failing prior to this patchset. > > This won't cover the "paes" ("protected key AES") algorithms, however, > since those don't have self-tests. If anyone has any way to test those, > please do so. > > Eric Biggers (3): > crypto: s390/aes - convert to skcipher API > crypto: s390/paes - convert to skcipher API > crypto: s390/des - convert to skcipher API > These look fine to me: Reviewed-by: Ard Biesheuvel but i cannot test them either.