Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp7272138ybp; Wed, 16 Oct 2019 06:26:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqyvJ1sfw+H6EXckP6KoLTVrT6EU2C90sCSDvCj8Bhm/HLb+lSp+mjo9AfrnzzYqfmbgxszp X-Received: by 2002:a17:906:386:: with SMTP id b6mr39001437eja.148.1571232364554; Wed, 16 Oct 2019 06:26:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571232364; cv=none; d=google.com; s=arc-20160816; b=qervker9RSrKvpoNTgTBTDZjYQ9oKT7q/PLKDDDjjyjtlOkObJpa4fDK2Prsayhj9U IbXSAhu2zu77oRFmgMhGfxCM6gGmbw5L4t2v4or8Mp1UhlLWS2oTrcHaJ5rkUcrYhF1l 4ACPd2++KkcMlBiRHzWWtGm/MYP5WGHMwftIipr/N+uMi8QlkSgQ92429fNcNKMvdXTf w3NZhyESzntasnJScXfuQih05c4ZbQEnaAIwnHU3kJr3sr8ZrwTT4S/lur85l2YSiERw nZ5RyZE13RP17fCtOoKwD5l4znMaCEM5xvtijFVIs1XfgNN4t+t4JuNMw6yMCTR6XLZD 7aRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=6jUvM81mCFEJrPhVj3ktuFKsOAYFM0PHI7JF/RGSugc=; b=RGbu0oC+JOGvCf5oscNy/G6EUCSg0Pp/ciwn5gImrwFlmZT4/5eCxd6AjDAFkFsSjl BPTZMBOyH8gm35F1C5+B3KDBYjf/upyK67YwBqHdtT0OoXOYYY6ZHt2BHYT1VaSqW8Tl upDrJ2lSRZFyD0QL6L6S45zJV613eNoQyh3OE4QXcOLA9ufz0sTOd/GPLjZvzXtHCs05 tI0Btd/+ywZVsV0J72poFCEJG/mIK+X1b4GTrq2evWYTym7csguT2NimddgeD/rYgLc/ 4BEGAIbIXlueJcZ7COpEc+MazutFmIAEj5GwwemZsBFn8X8OnyMD9866ZHbh498jXCuq n8kQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@benyossef-com.20150623.gappssmtp.com header.s=20150623 header.b=zEoEoRFB; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n26si14519819eja.273.2019.10.16.06.25.31; Wed, 16 Oct 2019 06:26:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@benyossef-com.20150623.gappssmtp.com header.s=20150623 header.b=zEoEoRFB; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732045AbfJPJCu (ORCPT + 99 others); Wed, 16 Oct 2019 05:02:50 -0400 Received: from mail-vs1-f66.google.com ([209.85.217.66]:39767 "EHLO mail-vs1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732312AbfJPJCu (ORCPT ); Wed, 16 Oct 2019 05:02:50 -0400 Received: by mail-vs1-f66.google.com with SMTP id y129so15095088vsc.6 for ; Wed, 16 Oct 2019 02:02:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=benyossef-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=6jUvM81mCFEJrPhVj3ktuFKsOAYFM0PHI7JF/RGSugc=; b=zEoEoRFBpMGeuWqMXV1f2QHg2y48MKzrSWjmPr6/mDYgWWxOZbJL7d/8fWf/SG7HHV kKLadN9y/vYBRZU7Sk3mpCHh239xyDlA7O3DHiOTMowI8qPx+xDNM0BA1r1+/mQQ9gHC y79iDmELliQ/ijHblynfsz49H0zzWPN3L5FHCVA+IQF7NBLHXmvVS9v596wyzYHH3kjw WvaZpcpFC7slJ6G8fu0NP7l9UfJ2hAs5TeZGV6CG3EVqponasYr2bLW+OwCcvxbgb52V UXdJWUpaoOiGgxuhyl91XkUBnYFM533hNRijW+GUGt3bw/a7hRzZSH5Y3gDKWA4k6eAb OW/Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=6jUvM81mCFEJrPhVj3ktuFKsOAYFM0PHI7JF/RGSugc=; b=ZU2JTdj/F/md95JY/z7b3WdPSlj1O1lInEoe40SU9RMSi6FI4Qv3gie7+2gAAJfCZD Jmc6CIMA8ViEGk08pw7Iz1nOyuA0v3PCCU2qYlw3+CRlVLB7P+GHvC2GzxNFYqn7ERYQ OKbrO+BhNRXQfHx7kbuMs5quOHN6WbySz1sg2fKva1mS6Y79tfEfnUmkzsQNhVXVWnFy mABj/PjvNB47Xu/D/QcRkEvjvpf8pnQ4l58bnDdvUiDz5oK3QqGtbyWiR89uGucTC0Va oQwzaDvPIEnOes71WRvcMXKYVORIpam0OLDBYaLZ5JM/6bf2SwTdvQ1Xnb7JiHUmqCT3 P15g== X-Gm-Message-State: APjAAAXqpknuApPHkGIoXKB1zJBQMO0cXGO6OGGRdQNceMDpNdrpwlzh B0stBSs5uDeOvbtW76CkoPyx0w3XGguaYfdfBUUv5w== X-Received: by 2002:a67:b20d:: with SMTP id b13mr522223vsf.164.1571216569773; Wed, 16 Oct 2019 02:02:49 -0700 (PDT) MIME-Version: 1.0 References: <20191012201809.160500-1-ebiggers@kernel.org> In-Reply-To: <20191012201809.160500-1-ebiggers@kernel.org> From: Gilad Ben-Yossef Date: Wed, 16 Oct 2019 12:02:38 +0300 Message-ID: Subject: Re: [RFT PATCH 0/3] crypto: s390 - convert to skcipher API To: Eric Biggers Cc: Linux Crypto Mailing List , Herbert Xu , linux-s390@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Harald Freudenberger Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sat, Oct 12, 2019 at 11:20 PM Eric Biggers wrote: > > This series converts the glue code for the S390 CPACF implementations of > AES, DES, and 3DES modes from the deprecated "blkcipher" API to the > "skcipher" API. This is needed in order for the blkcipher API to be > removed. > > I've compiled this patchset, and the conversion is very similar to that > which has been done for many other crypto drivers. But I don't have the > hardware to test it, nor is S390 CPACF supported by QEMU. So I really > need someone with the hardware to test it. You can do so by setting: > > CONFIG_CRYPTO_HW=3Dy > CONFIG_ZCRYPT=3Dy > CONFIG_PKEY=3Dy > CONFIG_CRYPTO_AES_S390=3Dy > CONFIG_CRYPTO_PAES_S390=3Dy > CONFIG_CRYPTO_DES_S390=3Dy > # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set > CONFIG_DEBUG_KERNEL=3Dy > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=3Dy > CONFIG_CRYPTO_AES=3Dy > CONFIG_CRYPTO_DES=3Dy > CONFIG_CRYPTO_CBC=3Dy > CONFIG_CRYPTO_CTR=3Dy > CONFIG_CRYPTO_ECB=3Dy > CONFIG_CRYPTO_XTS=3Dy > > Then boot and check for crypto self-test failures by running > 'dmesg | grep alg'. > > If there are test failures, please also check whether they were already > failing prior to this patchset. > > This won't cover the "paes" ("protected key AES") algorithms, however, > since those don't have self-tests. If anyone has any way to test those, > please do so. It is probably impracticable to test paes algorithms since they rely on keys which are not accessible to the kernel and are typically tied to the specific machine you run on. Gilad --=20 Gilad Ben-Yossef Chief Coffee Drinker values of =CE=B2 will give rise to dom!