Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3870103pxb; Tue, 17 Nov 2020 05:51:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJxzCv5XPWqO/dgzQClTF0KgIN4EgF/frAcHlltY/fgb9WBaCfmc8vgJN8lq7RFNI/3nFrCU X-Received: by 2002:a50:e0c9:: with SMTP id j9mr15447065edl.380.1605621080619; Tue, 17 Nov 2020 05:51:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605621080; cv=none; d=google.com; s=arc-20160816; b=iyeih0n4k9I20t0+yH1Y7HQIoWo/fgu7Vh3ke7GXQ6P+lki9kJczn0C2bIURjkLXie NW8hMTkCk9M9q6yyM1esv0Po4uCpxC2Y17Ef3+4rrKGpGK44RO19f/HVTPsZpsftUgTP JB1O7GKVi8ZowdoiNDiKGCHRW2XB0aoRP2SfTzGTW7CIsxMCMtXArwxftlghFPnUsQlr 5aZrDGI5nlno5/OL19iR8svib93akGgiIXGrhaOMQYaL0tcFk0kjPNkFCiSIJOGlqAVI u3yRgvkc/bNqpB+fwXJIyCr2LAiSQIgSreAMk28vyMvFwZotXxFznne/0wA/UVadSxqv RnBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=oKEZKPl1By8+1bPXeT/c63hbyP36AXEskA2/9VS42Nc=; b=Gnvnf8qi7Wy/qhNgekPHYDrjbVNMtnYgMwrgB3OxWd+1+gjsj9fgNwulFFa+DVyXF2 rFZBReSKbQxxSVmd9+CmL/vk0E4ndZM3mlW2slPdvU/qd/rwYmWpZRl8pznKeZJ0lGk7 OBqR29ZU6MtZFE1HDX/hvQmEzFmWDsjUUtTbM6tjxgTZWpWL2zyrMkGqJQP/G3k37tsv MldCg7z4cjMb5HyzyBZAzPBOZ7+47DNNPi38xV+Kb1al5nXv6mfC6dj+dShSkNEUQXak G/uUQKDWD2vXqoesdvIdAA0OwYD9Ar4/CaGFYowEV2aMsFZPrWBC4kNomVZIPbGYlEGb ksDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gjN/JhPe"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f15si11532691edj.239.2020.11.17.05.50.56; Tue, 17 Nov 2020 05:51:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gjN/JhPe"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732321AbgKQNci (ORCPT + 99 others); Tue, 17 Nov 2020 08:32:38 -0500 Received: from mail.kernel.org ([198.145.29.99]:42322 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732315AbgKQNcf (ORCPT ); Tue, 17 Nov 2020 08:32:35 -0500 Received: from e123331-lin.nice.arm.com (lfbn-nic-1-188-42.w2-15.abo.wanadoo.fr [2.15.37.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 64E9B207BC; Tue, 17 Nov 2020 13:32:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605619956; bh=oiVGcTqRY5uab+1tLpgkJEwoZKWfuoa6ABQDcm2KJ+U=; h=From:To:Cc:Subject:Date:From; b=gjN/JhPeKbOYeT9RvNHHEDbsgRcZ43mVYGwkjJbRAAsUENkhUbam5lVPf3f5EKxwM drJC5GuACJVoRZQeg2dAFmy7v8HORz/WJImNzkKibac6cNLAhcRL/uMern2yaMfCzX +cPgtF23xO/5IUpqmsilK3n+CYZXeq7Fu7fXh1pQ= From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: herbert@gondor.apana.org.au, linux-arm-kernel@lists.infradead.org, Ard Biesheuvel , Ondrej Mosnacek , Eric Biggers Subject: [PATCH v3 0/4] crypto: aegis128 enhancements Date: Tue, 17 Nov 2020 14:32:10 +0100 Message-Id: <20201117133214.29114-1-ardb@kernel.org> X-Mailer: git-send-email 2.17.1 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This series supersedes [0] '[PATCH] crypto: aegis128/neon - optimize tail block handling', which is included as patch #3 here, but hasn't been modified substantially. Patch #1 should probably go to -stable, even though aegis128 does not appear to be widely used. Patches #2 and #3 improve the SIMD code paths. Patch #4 enables fuzz testing for the SIMD code by registering the generic code as a separate driver if the SIMD code path is enabled. Changes since v2: - add Ondrej's ack to #1 - fix an issue spotted by Ondrej in #4 where the generic code path would still use some of the SIMD helpers Cc: Ondrej Mosnacek Cc: Eric Biggers [0] https://lore.kernel.org/linux-crypto/20201107195516.13952-1-ardb@kernel.org/ Ard Biesheuvel (4): crypto: aegis128 - wipe plaintext and tag if decryption fails crypto: aegis128/neon - optimize tail block handling crypto: aegis128/neon - move final tag check to SIMD domain crypto: aegis128 - expose SIMD code path as separate driver crypto/aegis128-core.c | 245 ++++++++++++++------ crypto/aegis128-neon-inner.c | 122 ++++++++-- crypto/aegis128-neon.c | 21 +- 3 files changed, 287 insertions(+), 101 deletions(-) -- 2.17.1