Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3071835ybt; Mon, 29 Jun 2020 14:33:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwcEa4JhZOoCjKx0C2BPzbyR85x76/OmHcev+i41m5rqQoyIgFJnRz2BI9vDGQteIqO2VvV X-Received: by 2002:aa7:d7d0:: with SMTP id e16mr19452226eds.10.1593466395040; Mon, 29 Jun 2020 14:33:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593466395; cv=none; d=google.com; s=arc-20160816; b=PSeOgNhr1yFCqp50G8OXgQ2bizeeBy+zsATNL9okQ9a/i8fBv9vOXDW6R2dzp6vLsz DRKK2OQ4fbso6Y6RZ5liglkgWgOoGzfzmwEPbvekJdCk6W6DHT+B5SbDfjwX2fzErEGc RBDZcGDrK8nW5WqUKcSR9SPdVxMqBXZ77IolnmaI5JahDzLkD5LKR+vUnJxJDwfAMuA9 oF5vml7OqlpvS1oAzVsADCF+Jo0yvajlnwg88rSqDPn320MozLQVSnfbJJi76/lo5o8y z5Gb8dsWEBr1LTVv391bKC/LkVxNe5EDDs59CH2UAXpMrHEDG2My77Lp9WxzDu+Wfyle elCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=enoLNRcjY8SHhW9Z8nftr2Qkwy0B0LTt7KVY/yxfNZw=; b=fmwx/QaFwF7+W7Y/rDprd+hqAbshWM0SU19erL8hjTQH8H5deVvrdOpa26OgeqNuwg l1II+Y+7v4NKwlFUl4XE4o98Eq5M5HWgU6HR5S4mIb1j8/5qunhHSI5Fl/xR0FTyvWB6 IuKDapXTF7zyCcRbDLmraumTAmPPGZ4p/5bYjPUQYUIsstzawv5i29bel230w/Ojt2Rm QD87tjp/njSczxzgl5Uclb0vlECbK01zBaWe9hQDsjKXUz3SlLBYUXjNiVCmc8jJPGxT UXLpblrUNpOpLd8fVXUXs3Pg7OrvQDx+Qvt9CHfyMr00XWqW6sTl81pvmnTVDdcK9PQh Eq8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hk5EfjvS; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 13si526170ejz.228.2020.06.29.14.32.47; Mon, 29 Jun 2020 14:33:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hk5EfjvS; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728759AbgF2Vbr (ORCPT + 99 others); Mon, 29 Jun 2020 17:31:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:60644 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728764AbgF2SlM (ORCPT ); Mon, 29 Jun 2020 14:41:12 -0400 Received: from localhost.localdomain (82-64-249-211.subs.proxad.net [82.64.249.211]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 80E2423158; Mon, 29 Jun 2020 07:39:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593416381; bh=lJG5ZO1f+HcOWTF3Fmo4H94YFIp+LKXgJGhgVEceGZY=; h=From:To:Cc:Subject:Date:From; b=hk5EfjvSf4JQVsoSRW/cmTTTcuDatjtDOMkQ97QiXd7cPBprPuynHU+r+VKbjsP7m KDFWJJdSlkaT9MvagEM3lB3LmG4pD+3WOymJrdRtyoTUX0K+dSVBeIgatFp3iLa48M /zGKAR0CzewHOhzjIMixhirH03YsjglxG+W3HP90= From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: herbert@gondor.apana.org.au, Ard Biesheuvel Subject: [PATCH 0/5] crypto: clean up ARM/arm64 glue code for GHASH and GCM Date: Mon, 29 Jun 2020 09:39:20 +0200 Message-Id: <20200629073925.127538-1-ardb@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Get rid of pointless indirect calls where the target of the call is decided at boot and never changes. Also, make the size of the key struct variable, and only carry the extra keys needed for aggregation when using a version of the algorithm that makes use of them. Ard Biesheuvel (5): crypto: arm64/ghash - drop PMULL based shash crypto: arm64/gcm - disentangle ghash and gcm setkey() routines crypto: arm64/gcm - use variably sized key struct crypto: arm64/gcm - use inline helper to suppress indirect calls crypto: arm/ghash - use variably sized key struct arch/arm/crypto/ghash-ce-glue.c | 51 ++-- arch/arm64/crypto/ghash-ce-glue.c | 257 +++++++------------- 2 files changed, 118 insertions(+), 190 deletions(-) -- 2.20.1