Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp6332347ybp; Tue, 15 Oct 2019 13:16:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqwFXgcLxvXWCXUZXUphSo50tIiirsYTmoWgi2X/h+GjHRYkTM1ePw+hgtnVAefHzJeK8eI+ X-Received: by 2002:a17:906:7094:: with SMTP id b20mr36890823ejk.134.1571170591298; Tue, 15 Oct 2019 13:16:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571170591; cv=none; d=google.com; s=arc-20160816; b=Qnq3Xg1dnVFXE6zna1YxfoDnFJXGHBZ3JtTZpglpTjsDxYqVf8fDBSgrMGPQfcL7jv Bi3eXXpg5aHaEgXckpSDyRVOwtXdzHezQPmNBDSWBqevGAwQov78CBOhxlp/QJ3vhhL5 DMr7/cJDKyh1FwiG+ylnN9fHNzRCLOFiO0WS1DRnCen5ztPWXBrPyxaC0UJNcUQllY5D kxqNFvR5wl66FjFbYZ19huQVVlKl95Ixhtz+dnMY7xuHgZTYPtbc0qcWxOmFAm/6a0Si RK3Q2q7rnP+IbUYK2XOgqyD1+5vl51sahzVcEhAkGQ/xeKegixrxa2HtEcVImjloEQna WjRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=/Te6hGFYGXLL/xhilRcG6QHzw/2u0UBZfOm58sAT1uQ=; b=uukAf9xkCHx5gIAMmTlQZhbyYbkiDmgRga5tLjUcUaT/Clduf/lGdGPFuwm5GYRUFR gUaVWd0Xs6DxCBekz78ks93qIbZHLv1OfYeZXTg8dkizM3PMQsMDJvMB/5Dtlh9jQwzN NsxhG4Q0H2Tpl4sfqcMjdX7vKQToIzJrmX7dOPGY6htaQlahVbUWmMma5leT0tiuZZIV PyVnS4w9k8R8Y7JAZPJwzNic955NtjrwS/QZrWzxR1MlFq/8F+hMmrQfKvFxaarxpurA j4twFDEtSu57kEWgBEGo90eCmyYvB+JGBYkuvoct9WzlGmJ+lm5I4JcRVVTIuvfQQ5Ze dvbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Pxn30roB; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ch10si13666596ejb.89.2019.10.15.13.16.05; Tue, 15 Oct 2019 13:16:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Pxn30roB; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726200AbfJOQZm (ORCPT + 99 others); Tue, 15 Oct 2019 12:25:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:47128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725804AbfJOQZl (ORCPT ); Tue, 15 Oct 2019 12:25:41 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E203E2086A; Tue, 15 Oct 2019 16:25:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571156741; bh=9JG55cwvKySt54+bjBUW5hdtYN86mrw1dcSP1VGesMk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Pxn30roB0HoZF4bdmmOtOx+jCJsmf6mLH+Gk/jvQU71OtO9uII3GS6w0tgi2Oh5QR Y15ac4YQo6HjJDy8aT1vjUAc4neG3AyvDWZfIvI8kOyfb1kb4oxxTBJD7s3aMVyL3d CkFaaybuvECb/3mKLcHnM+cyEg6ewAOWTu4ol3Yk= Date: Tue, 15 Oct 2019 09:25:39 -0700 From: Eric Biggers To: Christoph Hellwig Cc: Herbert Xu , linux-crypto@vger.kernel.org, sparclinux@vger.kernel.org, "David S . Miller" Subject: Re: [RFT PATCH 0/3] crypto: sparc - convert to skcipher API Message-ID: <20191015162539.GA852@sol.localdomain> Mail-Followup-To: Christoph Hellwig , Herbert Xu , linux-crypto@vger.kernel.org, sparclinux@vger.kernel.org, "David S . Miller" References: <20191012043850.340957-1-ebiggers@kernel.org> <20191015081138.GA23837@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191015081138.GA23837@infradead.org> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Oct 15, 2019 at 01:11:38AM -0700, Christoph Hellwig wrote: > On Fri, Oct 11, 2019 at 09:38:47PM -0700, Eric Biggers wrote: > > This series converts the glue code for the SPARC64 crypto opcodes > > implementations of AES, Camellia, DES, and 3DES modes from the > > deprecated "blkcipher" API to the "skcipher" API. This is needed in > > order for the blkcipher API to be removed. > > Not knowing much about the API: do you have an explanation of what the > difference is and why it matters? > They're all APIs for length-preserving encryption algorithms, but the skcipher API has some improvements, such as: - a much less confusing name - better type safety (skcipher_alg, crypto_skcipher, etc. instead of crypto_alg, crypto_tfm, etc.) - optional support for asynchronous operation (like "ablkcipher") - optional support per request-contexts (like "ablkcipher") - simpler scatterlist walks for some algorithms The skcipher API was introduced in 2015 to replace blkcipher and ablkcipher, and most implementations and almost all API users were converted. But some implementations weren't converted, so the crypto subsystem still has to carry all the blkcipher and ablkcipher compatibility code, as well as all documentation for blkcipher and ablkcipher. This is really confusing for people working with the crypto API, and bad for testing as there's no easy way to test {,a}blkcipher on x86, arm, or arm64 anymore. So, Ard and I are finishing the conversions so that blkcipher and ablkcipher can finally be removed. - Eric