Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp308542ybv; Thu, 13 Feb 2020 00:40:39 -0800 (PST) X-Google-Smtp-Source: APXvYqwEIMmzzS6vDorMIM4WZrOU92brTejwPe7GuC2bMc/qFKFjP+f+YDLgXHDTLtGppFPmt/zg X-Received: by 2002:a05:6830:1e37:: with SMTP id t23mr12712316otr.16.1581583239188; Thu, 13 Feb 2020 00:40:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581583239; cv=none; d=google.com; s=arc-20160816; b=YyT+G1ehkf5479tAPnjZLrkdQPUSIU2KXR1z6DNBaCZR5N/i9dbDSr4+AMPP5ZhVEH 6k8POk6T8Ku6SsNZpkIBeUH2OeTx1sQoGFl383tgI0DIN6A0g1GPK+RBCPdZj8WPghj9 Qm9d3TlsgW6NdfR48eIrUwNat+6VINhQAgn0ipDCEtaqlL07zBC2Imqp8mRqYCFd8o9D aqpqHxsymEs3IAEWr3NV/eNtPrFL3a10W4UWGmC/5zSp4AcLgdGYyeAn7HaB6dpHazc3 AqyzBrIgL7OfmOp/k4N46bqmXy2W5fbgQJK9BVWY2d4JcpinufvRLanUAboPnxaeApVt 970A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=eS4yzLSXj8YQo4uhrxX1EqQIL0gr9MJY0/YC1KnDlwk=; b=mp3flR2qROePCCCE0Liq71QeRqd4HantzwV9+M5A6FPFNVEEg3BAIOSGioWUa9+7qJ 0fs3WKVhdUOAJPAYYRKNzl9vRf4WujbThtkZtaKUCIqlcXRehYcjpOeNZQ2a5GkmvDHY 8WdCYsbcAbi7rLWq7XI17phl1w29kLlrcL+udB6Eg4TYLQcISf6eaqMYEKjeY84H1CWn aoUHx8nd+fQSCas/6/pFFUhm1enWp+dbXjOT1m269iWQ2hW8/IBrQdHXVP+bziF5ZrIv YGyCJB6YTDNhHq6gGMFz669g8E8sEI/gVpWbeguKz1SqQUifPttVkkKMFhcpfKewpT88 wowg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z15si799445oih.41.2020.02.13.00.40.18; Thu, 13 Feb 2020 00:40:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729586AbgBMIjt (ORCPT + 99 others); Thu, 13 Feb 2020 03:39:49 -0500 Received: from helcar.hmeau.com ([216.24.177.18]:41264 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729485AbgBMIjs (ORCPT ); Thu, 13 Feb 2020 03:39:48 -0500 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1j2A2F-0003qG-Nq; Thu, 13 Feb 2020 16:39:47 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1j2A2E-0001Sg-6E; Thu, 13 Feb 2020 16:39:46 +0800 Date: Thu, 13 Feb 2020 16:39:46 +0800 From: Herbert Xu To: Harald Freudenberger Cc: "linux-crypto@vger.kernel.org" , Heiko Carstens , Vasily Gorbik Subject: Re: [PATCH] crypto/testmgr: add selftests for paes-s390 Message-ID: <20200213083946.zicarnnt3wizl5ty@gondor.apana.org.au> References: <20191113105523.8007-4-freude@linux.ibm.com> <2391ff22-97be-bc6a-3650-3cade8a78393@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <2391ff22-97be-bc6a-3650-3cade8a78393@linux.ibm.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, Feb 13, 2020 at 08:40:06AM +0100, Harald Freudenberger wrote: > This patch enables the selftests for the s390 specific protected key > AES (PAES) cipher implementations: > ? * cbc-paes-s390 > ? * ctr-paes-s390 > ? * ecb-paes-s390 > ? * xts-paes-s390 > PAES is an AES cipher but with encrypted ('protected') key > material. However, the paes ciphers are able to derive an protected > key from clear key material with the help of the pkey kernel module. > > So this patch now enables the generic AES tests for the paes > ciphers. Under the hood the setkey() functions rearrange the clear key > values as clear key token and so the pkey kernel module is able to > provide protected key blobs from the given clear key values. The > derived protected key blobs are then used within the paes cipers and > should produce the very same results as the generic AES implementation > with the clear key values. > > The s390-paes cipher testlist entries are surrounded > by #if IS_ENABLED(CONFIG_CRYPTO_PAES_S390) because they don't > make any sense on non s390 platforms or without the PAES > cipher implementation. > > Signed-off-by: Harald Freudenberger > Signed-off-by: Vasily Gorbik > --- > ?crypto/testmgr.c | 36 ++++++++++++++++++++++++++++++++++++ > ?1 file changed, 36 insertions(+) Acked-by: Herbert Xu Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt