Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp3039523iog; Mon, 20 Jun 2022 09:52:52 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tQ9Om2YKZvcRHJBaNwgq66OgpqayLkMOr8MF/7Thao0L+919n2trQtF2LIjrgW3uzZa+k0 X-Received: by 2002:a05:6402:2999:b0:434:edcc:f12c with SMTP id eq25-20020a056402299900b00434edccf12cmr30149110edb.96.1655743972233; Mon, 20 Jun 2022 09:52:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655743972; cv=none; d=google.com; s=arc-20160816; b=qVYxw4No1uvfXazTAdUhGqxfanimIR6TR5Fv0P2Cx/mrkgZnvXcEpsVtS2k9vTCVOE ZxduQK6b50NjDgm7JAaS+HJ9VpNQ82gfgVCQinmjm95OuyC5Ry8p7oKurgLdXYmH1Ikz j99vLKZR2IN7f7V+WOCk0Xk51AuvGMl2XuhhP3yHy8RRa9p4zhrdJitYzW8yPoaCz5Ua zNnHEYTrNgPk1SJitWkdS9HHzo4w1Q4uOn1TwGCZStxkiGxI0vcbsl7FzswIqplEI0Wz V9GybN7kCN9KWVtqnOuq8l6BqgpzYI8JV28BcC7R9Se7WyW1R4yBhKvk7nmkD3UWOqDL j8tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=jkTNHHPNDGGLKc5xuzfd0bMYE5EZ7uFugnebxElHYkE=; b=NIE+PCpyvaNn4IJWsnA4c3mPKOYJKcuhoXHHh4PvUaNeEx/AaSMAZ8+7/7WEavWc61 8PVVUrNywbYiTkabkraRMHXCuBljF6KxiMdT0cElo3SDlvxSoO7v43kEBMCUND5Kv7MV AXxdX3LJuKAr0VhxW2TcfLMaxgCGeQh92THkQe0U0RjFolDnjek2bkOd9TVBGLXdtT4+ a9aRN3hMBfpPczEHlrWWnKZzHnVBG51+ieLh24iCa6RrTe5n1RfzgDotOjjXGklAYXay fn+44barZOlYdDR1JPJEAbe1cM1dswFI+X+N0qOuFF4bwE/ARBhZU4ZRABZgfZzTD/YV 5QJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=lJfjRX54; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w5-20020a056402070500b0043574c5a72fsi6171462edx.360.2022.06.20.09.52.09; Mon, 20 Jun 2022 09:52:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=lJfjRX54; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236268AbiFTQll (ORCPT + 99 others); Mon, 20 Jun 2022 12:41:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57368 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234773AbiFTQlg (ORCPT ); Mon, 20 Jun 2022 12:41:36 -0400 Received: from mail-pg1-x52a.google.com (mail-pg1-x52a.google.com [IPv6:2607:f8b0:4864:20::52a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21D16BE15 for ; Mon, 20 Jun 2022 09:41:35 -0700 (PDT) Received: by mail-pg1-x52a.google.com with SMTP id d129so10722163pgc.9 for ; Mon, 20 Jun 2022 09:41:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id; bh=jkTNHHPNDGGLKc5xuzfd0bMYE5EZ7uFugnebxElHYkE=; b=lJfjRX54AwFeXLoGhQeV9HX45cEL1KaeT7uV6LpXwJa8LjpzJDZREV7rpz58VumB3j 1yV4RYy8IZ0C0fXRRYOtJlso19RbP398lUNAYzoCn09nU/2MDjToktqfvVazznQYAI71 Z5wLXkfWxB1posbAXHdMcWfCMnlvLZf+Fs9R5Ld13wO0+vtlSgDCyBFt5bvXAA/kNhzc PlbUip1nA+TLz8B4UrCh4GGYft5mflPEm5CrMEjCK3YkeDMFkifXyQeXnMCFSRx2HhEG F1K7KT9vL8IzPDRszGfYrEqMNzmVXfOEL30qz1qmi2P4hIz+B8cBarQQqb9ZFrwNgs/2 aiAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=jkTNHHPNDGGLKc5xuzfd0bMYE5EZ7uFugnebxElHYkE=; b=saFlXGPoByA+JLVe8c+lRGggbLLJpydyWLh8eDeskqKhVHfzkDfZRkgDJN+S9DG/7q vJdtBlK729Xu1P5RgfaIggO+L9MQ26soAiXBvWT00e7LmUR809HNfmDNI0qIpui2Y+Xv 3ai0QFzyueHHjSvRImTygT0ULcZR4wOGDkwA6AJ+cvttqh2VquGU3/DS6fQsrNJkazC3 fdSdxvt9FxhTEEVhwTKUdWHTJYo67BzFHN2/a2AUAHRmnDB6h8hNoqGOuhR/MJ1BJw+D RJBVoj+nA7Eom0nHfdC9F/wPW0Kc9Fwhd5ByDK8PZ9eehNjC/+IJQAQpcRWxRPdX3Hli H2+A== X-Gm-Message-State: AJIora9T5IKijt/gZRXbvLwhGohQKhpLpKj1Hw8kM5F3r3RCB3GKTqZ2 D3DpaZEJs+KrH/9MW/gt65lC9vqqIK4= X-Received: by 2002:a05:6a00:9a2:b0:505:974f:9fd6 with SMTP id u34-20020a056a0009a200b00505974f9fd6mr25189864pfg.12.1655743294207; Mon, 20 Jun 2022 09:41:34 -0700 (PDT) Received: from localhost.localdomain ([182.213.254.91]) by smtp.gmail.com with ESMTPSA id c11-20020a17090a1d0b00b001e6a230c2f5sm10677469pjd.34.2022.06.20.09.41.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Jun 2022 09:41:33 -0700 (PDT) From: Taehee Yoo To: linux-crypto@vger.kernel.org, herbert@gondor.apana.org.au, davem@davemloft.net Cc: ap420073@gmail.com Subject: [PATCH 0/2] crypto: Introduce ARIA symmetric cipher algorithm Date: Mon, 20 Jun 2022 16:41:25 +0000 Message-Id: <20220620164127.6380-1-ap420073@gmail.com> X-Mailer: git-send-email 2.17.1 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This patchset adds a new ARIA(RFC 5794) symmetric cipher algorithm. Like SEED, the ARIA is a standard cipher algorithm in South Korea. Especially Government and Banking industry have been using this algorithm. So the implementation of ARIA will be useful for them and network vendors. Usecases of this algorithm are TLS[1], and IPSec. It would be very useful for them if it implements kTLS for ARIA. It is tested in x86 and MIPS with the tcrypt module. The first patch is an implementation of ARIA algorithm. The second patch adds tests for ARIA. [1] https://datatracker.ietf.org/doc/html/rfc6209 Taehee Yoo (2): crypto: Implement ARIA symmetric cipher algorithm crypto: add ARIA testmgr tests crypto/Kconfig | 15 + crypto/Makefile | 1 + crypto/aria.c | 288 +++++ crypto/tcrypt.c | 38 +- crypto/testmgr.c | 31 + crypto/testmgr.h | 2860 +++++++++++++++++++++++++++++++++++++++++ include/crypto/aria.h | 461 +++++++ 7 files changed, 3693 insertions(+), 1 deletion(-) create mode 100644 crypto/aria.c create mode 100644 include/crypto/aria.h -- 2.17.1