Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp301777rwb; Thu, 12 Jan 2023 20:21:17 -0800 (PST) X-Google-Smtp-Source: AMrXdXu7LrrpjIPyfgt274GNlnEj2PXDWCnXOYnSZ4amzhCqLK/TdmkK+JrBfsi3pwrU6s8WyrSQ X-Received: by 2002:a05:6a20:e189:b0:ac:5671:adfa with SMTP id ks9-20020a056a20e18900b000ac5671adfamr9530064pzb.18.1673583677651; Thu, 12 Jan 2023 20:21:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673583677; cv=none; d=google.com; s=arc-20160816; b=YlMo2dJ/NX8K9y8vRdM0sdJY5M5rx5FB6/Gb/dIe6+3VTUmz0PSvynlUohQiN5j2Yu j78cGw76ztAP4SkVTqHeYn2CVPLDcNpeSkaSBCtrbGRzrYLWQ8s7XiS503ru1SGIfDo5 FluaK127Cp0kPepy42Y5mJxdww2kR6pJ60LaZQ7V8ZV63GRQcUScEAjhky5Ao3MgrF18 Ncaib3/ijYcz9LEC6QDDCMCAltAJPbxaVamyC0U9KRv0DMq/doiAkWgwFPQ/pK/J1DCZ QcbG7PDvN6YM+g6/4Si9mK1SSHUhDfWxLXqulmMJRptnbauE/r/8LzfD6mEIjDyevErQ 6bvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=pHdsupB6iU2PZR0qyUwvneOg4/Bx8sDcVGT+1IvXhjA=; b=K1tK5dPDH1dv+hwTqT2gvhH4Q3zTnO+qtfidgUxmce03gxQ9oYM4Oy34U7ahxcODNF J90uvWryJfuWOCdsbMCvH7sK5fLTFU0NoMEIV8VNOq4gSChf+Gd8hRQrDeS7PfeCzOOa ErUY2nSLPk/ln2RZn3LNRig3mSLUMCGrpB+HoIq82+mrqyIElEE7w7GGWUeUE/SYDTD3 UqRYoF/7dw78J2JV5egWNL9+ZCEAW4GgARabhSxZWCeoRqoXT6j8ZrhC41o/SXOv33oO iyhlZ5nTilLy7kmaC7A+AsfWYGB67z5vc74ZmUR1mf0bcb/JF5CqN1IXobmurbZ5KI5S jMLg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t9-20020a17090340c900b001943dcf2035si9916222pld.460.2023.01.12.20.20.59; Thu, 12 Jan 2023 20:21:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235389AbjAMEQq (ORCPT + 99 others); Thu, 12 Jan 2023 23:16:46 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37196 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233212AbjAMEPi (ORCPT ); Thu, 12 Jan 2023 23:15:38 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A12CF65355; Thu, 12 Jan 2023 20:13:05 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pGBR0-00H5Ig-Q3; Fri, 13 Jan 2023 12:12:55 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Fri, 13 Jan 2023 12:12:54 +0800 Date: Fri, 13 Jan 2023 12:12:54 +0800 From: Herbert Xu To: Danny Tsen Cc: linux-crypto@vger.kernel.org, leitao@debian.org, nayna@linux.ibm.com, appro@cryptogams.org, linux-kernel@vger.kernel.org, ltcgcw@linux.vnet.ibm.com Subject: Re: [PATCH v2 0/6] crypto: Accelerated AES/GCM stitched implementation Message-ID: References: <20221205003458.4182-1-dtsen@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221205003458.4182-1-dtsen@linux.ibm.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sun, Dec 04, 2022 at 07:34:52PM -0500, Danny Tsen wrote: > This patch series enable an accelerated AES/GCM stitched implementation for > Power10+ CPU(ppc64le). This module supports AEAD algorithm. The stitched > implementation provides 3.5X+ better performance than the baseline. > > This patch has been tested with the kernel crypto module tcrypt.ko and has > passed the selftest. The patch is also tested with > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS enabled > > Danny Tsen (6): > Patch1: Update Kconfig and Makefile. > Patch2: Glue code for AES/GCM stitched implementation. > Patch3: An accelerated AES/GCM stitched implementation. > Patch4: Supporting functions for AES. > Patch5: Supporting functions for ghash. > Patch6: A perl script to process PowerPC assembler source. > > arch/powerpc/crypto/Kconfig | 11 + > arch/powerpc/crypto/Makefile | 10 + > arch/powerpc/crypto/aesp8-ppc.pl | 3846 ++++++++++++++++++++++++ > arch/powerpc/crypto/ghashp8-ppc.pl | 370 +++ > arch/powerpc/crypto/p10-aes-gcm-glue.c | 345 +++ > arch/powerpc/crypto/p10_aes_gcm.S | 1519 ++++++++++ > arch/powerpc/crypto/ppc-xlate.pl | 229 ++ > 7 files changed, 6330 insertions(+) > create mode 100644 arch/powerpc/crypto/aesp8-ppc.pl > create mode 100644 arch/powerpc/crypto/ghashp8-ppc.pl > create mode 100644 arch/powerpc/crypto/p10-aes-gcm-glue.c > create mode 100644 arch/powerpc/crypto/p10_aes_gcm.S > create mode 100644 arch/powerpc/crypto/ppc-xlate.pl > > -- > 2.31.1 All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt