Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp637669ybg; Tue, 28 Jul 2020 15:04:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSwJdgir1+aQ5+/Yj/4Hhj71seskQDx7ixPmTQ5fNwKuv3Fwkl3Se7YjDdDQeq51Swi24S X-Received: by 2002:a17:906:36d7:: with SMTP id b23mr3217039ejc.149.1595973876319; Tue, 28 Jul 2020 15:04:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595973876; cv=none; d=google.com; s=arc-20160816; b=Sk7PF4m544CcLeDiT6Nwa51wKFw9c3zWWIGG0ILNmzEWO74MuadqXzDMylsz0yV1/U MkBXI9qo6n9gJVcgjGzvnqqW1qYLCt8K80xFT9n8Mdw6VQBPC0ZAlyP1GVtqy6GeYsWb 7ZeKdXFdMKPjOhhOf2TCwv+B0XLG4KzEvACKNMmG5K6f7mcJWCmE8wz55d0nqgnqPtll XBn470/zv0d7njjO6drOMbkOcraZzz8S9Z1nu5j91+rpPCgBGydUK0tNhAstyK4vydzO ANCXH26lNU1EBArIFmkhe1/Pkg9hKgF5My5CNjXKT0ICfDzoK0EAkU4YPdkPsAfjeEmn JDhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id :organization:to:subject:from:dkim-signature:dkim-filter; bh=Y9gViOlK+0NqHMvHpVLuTl3DzLE7J8ZusOXltUy2FIw=; b=jFc+hlklcT6GGwIPKwCuzzZPNOpCKEzb5v0KX1/92EULd8+yTC57DzND/14HZ2b9bn at3P386xwTH4x30dmvktC9HBbv7eqWc/lSc+NUwE3DY8agedleyPjCn7jI+lV0RB9aDh Us4gI6V775fJMBMgl2tAxu1jHKkhSn9oVS0oCjdFJ482vzLBv627EB1ea/oE0DfdFMAy AAS9V1/2ciqV64V04rTtNNVpKoBrLYGFEl8VelcH8BW2fc+q7Q3dxEm7XQIUSafwfWiu 7eIQ3W61okvaDTSEcUFJAVarmIJ7yiZGz7+8vim7TgY11pQrX6PmY0GtCe2Ac2asWo8N GhYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=a99f1G6O; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dx22si8209133ejb.18.2020.07.28.15.04.00; Tue, 28 Jul 2020 15:04:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=a99f1G6O; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729512AbgG1WDa (ORCPT + 99 others); Tue, 28 Jul 2020 18:03:30 -0400 Received: from mail2.candelatech.com ([208.74.158.173]:42062 "EHLO mail3.candelatech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729437AbgG1WDa (ORCPT ); Tue, 28 Jul 2020 18:03:30 -0400 Received: from [192.168.254.5] (unknown [50.34.202.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail3.candelatech.com (Postfix) with ESMTPSA id F087113C2B0 for ; Tue, 28 Jul 2020 15:03:29 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 mail3.candelatech.com F087113C2B0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=candelatech.com; s=default; t=1595973810; bh=002seJvFn/8xfwTaV6ngO1WljEQNLrdWtOav/biwk+k=; h=From:Subject:To:Date:From; b=a99f1G6OGTFLJO0CVavB2MzrOE+EeT1lQdu9SeSN1/rpExm6/59hkiykA6sIbFTJ7 mrDEPqK5m+DjNPluOVnJUjubPi4kZzBJvLCWaQyTAXBtKVPAR8SogcIZpoEJs4U6qB 3UE7iS5o/Ze+r1B/3xDFniVyWSd0nxPrA5c8nrsY= From: Ben Greear Subject: Help getting aesni crypto patch upstream To: linux-crypto@vger.kernel.org Organization: Candela Technologies Message-ID: <2a55b661-512b-9479-9fff-0f2e2a581765@candelatech.com> Date: Tue, 28 Jul 2020 15:03:29 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-MW Content-Transfer-Encoding: 7bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello, As part of my wifi test tool, I need to do decrypt AES on the CPU, and the only way this performs well is to use aesni. I've been using a patch for years that does this, but recently somewhere between 5.4 and 5.7, the API I've been using has been removed. Would anyone be interested in getting this support upstream? I'd be happy to pay for the effort. Here is the patch in question: https://github.com/greearb/linux-ct-5.7/blob/master/wip/0001-crypto-aesni-add-ccm-aes-algorithm-implementation.patch Please keep me in CC, I'm not subscribed to this list. Thanks, Ben -- Ben Greear Candela Technologies Inc http://www.candelatech.com