Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2825138imu; Sun, 23 Dec 2018 08:37:18 -0800 (PST) X-Google-Smtp-Source: ALg8bN511dMIBilX6Em/k1t4E3vW/frJZmMjMSRqQzNkzFbaEhvxdZfhyf8TvgG5Em67F4BENPve X-Received: by 2002:a17:902:1745:: with SMTP id i63mr9903391pli.145.1545583038139; Sun, 23 Dec 2018 08:37:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545583038; cv=none; d=google.com; s=arc-20160816; b=wrDJQZXQX8hR7pFWhZtsmavwH+c9hTRss0fffeoHFGbzyYTo6lYwkIBd9Z6i3SmaB9 xW+R2FQw9Zqla2guuSJ3tI0L0H35XhoBgmwrmJUuxL7HGyhvJnEtOd0RPKa8bOT3GBXb CEwKp5fsQsb6UdZV8Gnltbf7T0qFJKm4sFaOtysDUUn6h0GjaoenxKmP2EUlsqmm8tCm vV+oDqjJCwdCPmKqA4EeaYAUnNR8ke4lNgyvhlof0oW/fYUr02fU8BfbduOp9zylLUCY qyMGcbGwqkRBBvejgGFqZEn/vkIp+JNzCyuCP7hTyxjjS72tfg5ayUzCPaNTNrlbYjwS G8NA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=5Te/OgME5qYfyNFr6DolXT0qiOBlO/8zlCItKLtMSXk=; b=Qb69A2LLehioJDIMxjc6jg/W7xt/x0ysyDcd/EDtNTgfYUcitY6Fnfr5TwCfnlXAff x6VFgDJQMkVKYorKeevdENYnwFhFdbF4VqQZgTvliqNIlmFJa9vsLMS8Wf+B6Trhdasl wvSCpQw9RwnZSjWzI78XHIvmCsNWenozaJVB0cZ7q+KAYZNArmiIl6HGP78CTp7lmV9c TpeKEmEPf9DwnIOBRy7A5eTJ4evXdOgV5GVzJEGbtNaXWahcJUEh1drSZU3VOdHMFjOG n0PMOvthmMV8YpfzG518jS3TDSzXUKsQ+Y+P09NPD+uCM2ctdO7BsGHS1+Zas+BflyKu 18wg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f5si24791076plo.422.2018.12.23.08.37.02; Sun, 23 Dec 2018 08:37:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393138AbeLWEBZ (ORCPT + 99 others); Sat, 22 Dec 2018 23:01:25 -0500 Received: from orcrist.hmeau.com ([104.223.48.154]:38944 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731793AbeLWEBZ (ORCPT ); Sat, 22 Dec 2018 23:01:25 -0500 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1gauwx-0008HQ-3Y; Sun, 23 Dec 2018 12:01:11 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1gauwm-0004n2-L9; Sun, 23 Dec 2018 12:01:00 +0800 Date: Sun, 23 Dec 2018 12:01:00 +0800 From: Herbert Xu To: Dave Watson Cc: Junaid Shahid , Steffen Klassert , "linux-crypto@vger.kernel.org" , Doron Roberts-Kedes , Sabrina Dubroca , "linux-kernel@vger.kernel.org" , Stephan Mueller Subject: Re: [PATCH 00/12] x86/crypto: gcmaes AVX scatter/gather support Message-ID: <20181223040100.lemyilorwoc36kq5@gondor.apana.org.au> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 10, 2018 at 07:56:28PM +0000, Dave Watson wrote: > This patch set refactors the x86 aes/gcm AVX crypto routines to > support true scatter/gather by adding gcm_enc/dec_update methods. > > It is similar to the previous SSE patchset starting at e1fd316f. > Unlike the SSE routines, the AVX routines did not support > keysize 192 & 256, this patchset also adds support for those > keysizes. > > The final patch updates the C glue code, passing everything through > the crypt_by_sg() function instead of the previous memcpy based > routines. > > Dave Watson (12): > x86/crypto: aesni: Merge GCM_ENC_DEC > x86/crypto: aesni: Introduce gcm_context_data > x86/crypto: aesni: Macro-ify func save/restore > x86/crypto: aesni: support 256 byte keys in avx asm > x86/crypto: aesni: Add GCM_COMPLETE macro > x86/crypto: aesni: Split AAD hash calculation to separate macro > x86/crypto: aesni: Merge avx precompute functions > x86/crypto: aesni: Fill in new context data structures > x86/crypto: aesni: Move ghash_mul to GCM_COMPLETE > x86/crypto: aesni: Introduce READ_PARTIAL_BLOCK macro > x86/crypto: aesni: Introduce partial block macro > x86/crypto: aesni: Add scatter/gather avx stubs, and use them in C > > arch/x86/crypto/aesni-intel_avx-x86_64.S | 2125 ++++++++++------------ > arch/x86/crypto/aesni-intel_glue.c | 353 ++-- > 2 files changed, 1117 insertions(+), 1361 deletions(-) All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt