Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp2414748rwb; Fri, 20 Jan 2023 02:38:55 -0800 (PST) X-Google-Smtp-Source: AMrXdXvbKQOvyEGnP7RlMLpGe0uGR58+LDXzQKjuQfN7Oskhqqjk1EUDu0z2LpBhEJYzvDnE1P4C X-Received: by 2002:a05:6a20:1450:b0:b5:e1f5:c72f with SMTP id a16-20020a056a20145000b000b5e1f5c72fmr18337259pzi.28.1674211135017; Fri, 20 Jan 2023 02:38:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674211135; cv=none; d=google.com; s=arc-20160816; b=M9U2HN/+fEzm9V22SyDiYXJKmbw+L7RyaehIKiO9wQRheNz8DPMkrwQFj+XmEUGelO h0JApRwaTfh5n4Yu1qlE58BoCsUmO5ofhEAO7Lc02Q4NZfypUSG9k+iZQYqJ4dv705O8 dytHjQ9NHbphPqmito6gcbuNyP3/NVRRfqD5LZh+9b6nAWzHLFHYHAEqurwTH8dGyHMI 5911Vq9P6bRaNnZBC+r3tz6LWQHx2W6kGYZw6CYJGeQo2qMT+idBMwBhub/vkBDyltZP Hxs7JP7CHh6ntJF8wdlZE/CLs2Kj+Mzmvwd8mkRVwZuPJCrcSKaG1U3A11+0jgBUW6g7 LFYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=+1voPHwXgkadyOYM11halLv6srF//MHDS5dVcw2yF2M=; b=1LArqtgwbySnoECqDQZkiKsycMSKDnB99Z+HtxLKoLelBYna85hKzocX3typQ5FvPQ 2SwEy3fI+G2oAnaTv23Jhg57nglEDN8rFvA7HfPGl0k26Ro9LPoGNN2vLkQ2xnqhdVLx ydArwDm0GkIbiHQ4S+qv2jQozpvJ8o9pYwbKIAlE6oiVcGnxNfd6OxuiZ2iCaW1g+ffz wx0VoSjw1yzcdxRUUc9FiYOxFvoCzvfqxYlwqBvtX7SfFRWtIaqlm/jpWQ+7oVSP20+B LPwe+t2Ud7qYHv1lEerTkDTuTIu5hXxU1uyOHko/EZEtnSQr5zGbfZytHY7qo1bCLniw U2Hw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u185-20020a6385c2000000b004b668a36b0bsi10995174pgd.492.2023.01.20.02.38.41; Fri, 20 Jan 2023 02:38:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229528AbjATKcY (ORCPT + 99 others); Fri, 20 Jan 2023 05:32:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44308 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229619AbjATKcX (ORCPT ); Fri, 20 Jan 2023 05:32:23 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DA1BDB1EC1 for ; Fri, 20 Jan 2023 02:32:12 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pIogs-002BVY-6V; Fri, 20 Jan 2023 18:32:11 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Fri, 20 Jan 2023 18:32:10 +0800 Date: Fri, 20 Jan 2023 18:32:10 +0800 From: Herbert Xu To: Ard Biesheuvel Cc: linux-crypto@vger.kernel.org, Eric Biggers Subject: Re: [PATCH v2 0/4] crypto: Accelerated GCM for IPSec on ARM/arm64 Message-ID: References: <20221214171957.2833419-1-ardb@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221214171957.2833419-1-ardb@kernel.org> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Dec 14, 2022 at 06:19:53PM +0100, Ard Biesheuvel wrote: > This is a v2 as patch #1 was sent out in isolation a couple of days ago. > > As it turns out, we can get ~10% speedup for RFC4106 on arm64 > (Cortex-A53) by giving it the same treatment as ARM, i.e., avoid the > generic template and implement RFC4106 encapsulation directly in the > driver > > Patch #3 adds larger key sizes to the tcrypt benchmark for RFC4106 > > Patch #4 fixes some prose on AEAD that turned out to be inaccurate. > > Changes since v1: > - minor tweaks to the asm code in patch #1, one of which to fix a Clang > build error > > Note: patch #1 depends on the softirq context patches for kernel mode > NEON I sent out last week. More specifically, this implements a sync > AEAD that does not implement a !simd fallback, as AEADs are not callable > in hard IRQ context anyway. > > Cc: Eric Biggers > Cc: Herbert Xu > > Ard Biesheuvel (4): > crypto: arm/ghash - implement fused AES/GHASH version of AES-GCM > crypto: arm64/gcm - add RFC4106 support > crypto: tcrypt - include larger key sizes in RFC4106 benchmark > crypto: aead - fix inaccurate documentation > > arch/arm/crypto/Kconfig | 2 + > arch/arm/crypto/ghash-ce-core.S | 382 +++++++++++++++++- > arch/arm/crypto/ghash-ce-glue.c | 424 +++++++++++++++++++- > arch/arm64/crypto/ghash-ce-glue.c | 145 +++++-- > crypto/tcrypt.c | 8 +- > crypto/tcrypt.h | 2 +- > include/crypto/aead.h | 20 +- > 7 files changed, 913 insertions(+), 70 deletions(-) > > -- > 2.35.1 Patches 2-4 applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt