Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp3778085rdb; Thu, 14 Sep 2023 02:13:05 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEdOoDQ/AcG4X190iyL56eBLYMThVM7UhuShhMXzUg0BEb3Ygpq+Y0rUy9LlGan1svSZ0ZN X-Received: by 2002:a17:902:ced1:b0:1bf:712:e4bd with SMTP id d17-20020a170902ced100b001bf0712e4bdmr5776405plg.65.1694682785349; Thu, 14 Sep 2023 02:13:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694682785; cv=none; d=google.com; s=arc-20160816; b=WYiVXcIhHSxSelXGpDKASvSXLYOqqtbpHxM7lhWGR+r2TZCSdGagj5HbnJGJNlwV+y MpyXihMQhbWE3JNhEkayXSNcO/nDwCsZsXJ85Ugw6pYn9+cdCKvEpuJY0Qbhp7WTkzwc J6q3kthJ/IdRbvOFJEd83KCq3yxxKH2q1c55ILHOPkKPc9ZOD/Zwbw4JDBk/T+4gFymq UQAVvr0WXR66pZchmBljFJ2mS3o0bIllfK9wMCiy9daFHJmOB4qpPOaDYeyy8QYyB1Sk VRvz9AB7rxrtlas0NHy50rH5XO/GddgEquZIR4RQO1v8tSv0h/OMV7p+1DPaQQjqXygi TVYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=g40qSWtm7YmYIasFKmSk3Wk1f0RJoBWBVpeZjtiy09g=; fh=OUpgHz8gu+EFyREjScBnwgXxe9p5hHef04jJGlkpTWE=; b=MiG10huAnrFs6ex6ta9FgcZe9uxANLd94KPVFga8JNDna9xOFJZ1AS0oHpfF6oVfxq vj02bRd7XiAtJ44oQ+HoXuxn9xih49dFLkBkH1jibsYnNt61l3/m1rqwlAcTQgnsWDqb i/BQKd/P2FELIZ0KYQ+LL5ySj+TrQlwUAC4BwOQzxCTMpGp6JizF1nkLveIdtF6KU7hL KJijo1K7joStJNn65F3Uhb7OscAYg4ZSVm/EBqmlofwOeRBdLAe5ZMxEg1Z/po4EPw5v 8xIod+fux5XJAw2LATWLhJLVTyUwQHsqB6+SLsfb6WTZ32o6mwdhTgr0SiUIcL+Vgf5m Jykg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=kvPbjmbP; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id kg7-20020a170903060700b001bb8a57d518si1184705plb.379.2023.09.14.02.13.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Sep 2023 02:13:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=kvPbjmbP; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 08B1181F274F; Thu, 14 Sep 2023 01:51:37 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235913AbjINIvj (ORCPT + 99 others); Thu, 14 Sep 2023 04:51:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232458AbjINIvi (ORCPT ); Thu, 14 Sep 2023 04:51:38 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D71741BEA for ; Thu, 14 Sep 2023 01:51:34 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7F47DC433C8 for ; Thu, 14 Sep 2023 08:51:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1694681494; bh=SlOZA2ase7BWhItInKW++A2ourC/kqoavmP2GMeou30=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=kvPbjmbPMahq1JQpHn5C8V1NrLgogkednPTH8qzPRrhjfTtVMRRCgUcXCveOT6yUf 5dMBELScy7Hvd0dTwbqGLD2QKns6qMA6sdmYWBvUZH/U2PMQtb3Sn0u+Zl+XQcREHd LH4kA4wHTpcU1fV/Y0alBp9vGwwF+mcGqNctrkcr8SFFb+SVfrUzyK74+Vr+2DdghS S+72j9CZfWDmM9oAScqlosaeDAN+SttEw2omPKxRCEVPVFIWMGcZJJSJWJMIgaAqP9 PwlXq3wvddoijARDWYNVvGaEPX4mDp/+WFPjW0Y+AuqsAcYcPjraisUPL/mzJD/fjg 9V/+lDDKw/mmw== Received: by mail-lj1-f176.google.com with SMTP id 38308e7fff4ca-2bf66a32f25so10159191fa.2 for ; Thu, 14 Sep 2023 01:51:34 -0700 (PDT) X-Gm-Message-State: AOJu0YzfiCPfwj4SNMZ1k6zDWZ2zc951BT4HaGu1rkBttrK5En6QAAPx NbikNZxoZ14N1vARTiAH+aB3eGFvTTy/ze8EtTs= X-Received: by 2002:a05:651c:8f:b0:2bf:9576:afd4 with SMTP id 15-20020a05651c008f00b002bf9576afd4mr4106176ljq.16.1694681492675; Thu, 14 Sep 2023 01:51:32 -0700 (PDT) MIME-Version: 1.0 References: <20230914082828.895403-1-herbert@gondor.apana.org.au> In-Reply-To: <20230914082828.895403-1-herbert@gondor.apana.org.au> From: Ard Biesheuvel Date: Thu, 14 Sep 2023 10:51:21 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/8] crypto: Add lskcipher API type To: Herbert Xu Cc: Linux Crypto Mailing List Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Thu, 14 Sep 2023 01:51:37 -0700 (PDT) X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email On Thu, 14 Sept 2023 at 10:28, Herbert Xu wrote: > > This series introduces the lskcipher API type. Its relationship > to skcipher is the same as that between shash and ahash. > > This series only converts ecb and cbc to the new algorithm type. > Once all templates have been moved over, we can then convert the > cipher implementations such as aes-generic. > > Ard, if you have some spare cycles you can help with either the > templates or the cipher algorithm conversions. The latter will > be applied once the templates have been completely moved over. > > Just let me know which ones you'd like to do so I won't touch > them. > Hello Herbert, Thanks for sending this. So the intent is for lskcipher to ultimately supplant the current cipher entirely, right? And lskcipher can be used directly by clients of the crypto API, in which case kernel VAs may be used directly, but no async support is available, while skcipher API clients will gain access to lskciphers via a generic wrapper (if needed?) That makes sense but it would help to spell this out. I'd be happy to help out here but I'll be off on vacation for ~3 weeks after this week so i won't get around to it before mid October. What I will do (if it helps) is rebase my recent RISC-V scalar AES cipher patches onto this, and implement ecb(aes) instead (which is the idea IIUC?)