Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp6517560rwr; Mon, 24 Apr 2023 22:47:15 -0700 (PDT) X-Google-Smtp-Source: AKy350bvFKZwwPxH1fGpE9+wfV7wDvIHed8jS9HgOiUoumqIOJEF8JjgOkM5M+6TvF1SpoZkuWjU X-Received: by 2002:a05:6a20:1610:b0:dc:e387:566b with SMTP id l16-20020a056a20161000b000dce387566bmr1556882pzj.1.1682401635189; Mon, 24 Apr 2023 22:47:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682401635; cv=none; d=google.com; s=arc-20160816; b=N3FAgY2smEXHX+tHYU/cyRkc1MaRH3RT7GjjkX+3ZhqPhQhN7VM+eypeWCJ8c+5R+4 HpZ69iRHBQ+6egnsXEsWuo9yxuaSOS97kxRMgHLrGKmIV5r7RL0xDkS9uA2sJettQ/NQ hT2I3JotBrxsZb8Y+Tht2GPOCs9UxTXMeUnA35Ahc8XEjasuL34xQTFMMjcSdLqJddEX AYg1VMV8hcjYKLNFx1sAtUPWo4BqYMM3PPGHFnYvP3TEapTqh6+YajH0HuKtoSZ9IB3h 3/myiAvlpxLbnENrc2cDBPC/Sf4uVP7+ppV7Af+8WEahsMTJN4cud3Bcc23pajVHyzUn wLZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=DhtZwu3UaU+BhpZkH9tJyskCh5aRB2R2hTL6tzo9w8s=; b=xORxu5bJUdYDZx2s8wTv4pRe0Gx/S4Tp7CvS2K+5ty7A/bcLb4DADwC/C7zNCmhjKx IXaR6AIS8mxtjwWWt7xf86YOUsNZ4uA4WsDV9uayGi5EDUg1ajZVz21VXq5aVqXJXrcJ Urxa9HhP2op/NAaZgKLNVBmup8IcAfyQCCksbEE3xSsPAse8v3789TBX5y3jtb6EcLmu 6NrnmPxZS0fOX7ylOiMoncgboTugHTmlZMOqvnpDAWU13JBZgQ/FdtKHCVPZIcXvxAw3 uTC8PGsXZa5noqx5pjiDerpgO9io3uczxCmvXI0lHMNQaaxYp+eEzkNPZKvRWw4MdmAe 8A5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y23-20020a63ce17000000b0051b4db5fd75si12384049pgf.850.2023.04.24.22.47.00; Mon, 24 Apr 2023 22:47:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233309AbjDYFom (ORCPT + 99 others); Tue, 25 Apr 2023 01:44:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55408 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231351AbjDYFom (ORCPT ); Tue, 25 Apr 2023 01:44:42 -0400 Received: from 167-179-156-38.a7b39c.syd.nbn.aussiebb.net (167-179-156-38.a7b39c.syd.nbn.aussiebb.net [167.179.156.38]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C3A430FE; Mon, 24 Apr 2023 22:44:41 -0700 (PDT) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1prBTZ-001zum-5I; Tue, 25 Apr 2023 13:44:31 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Tue, 25 Apr 2023 13:44:30 +0800 Date: Tue, 25 Apr 2023 13:44:30 +0800 From: Herbert Xu To: Danny Tsen Cc: linux-crypto@vger.kernel.org, leitao@debian.org, nayna@linux.ibm.com, appro@cryptogams.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, mpe@ellerman.id.au, ltcgcw@linux.vnet.ibm.com, dtsen@us.ibm.com Subject: Re: [PATCH 4/5] Glue code for optmized Poly1305 implementation for ppc64le. Message-ID: References: <20230424184726.2091-1-dtsen@linux.ibm.com> <20230424184726.2091-5-dtsen@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230424184726.2091-5-dtsen@linux.ibm.com> X-Spam-Status: No, score=2.7 required=5.0 tests=BAYES_00,HELO_DYNAMIC_IPADDR2, RDNS_DYNAMIC,SPF_HELO_NONE,SPF_PASS,TVD_RCVD_IP,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Apr 24, 2023 at 02:47:25PM -0400, Danny Tsen wrote: > > + if (likely(srclen >= POLY1305_BLOCK_SIZE)) { > + bytes = round_down(srclen, POLY1305_BLOCK_SIZE); > + used = crypto_poly1305_setdctxkey(dctx, src, bytes); > + if (likely(used)) { > + srclen -= used; > + src += used; > + } > + if (srclen >= POLY1305_BLOCK_SIZE*4) { > + vsx_begin(); Your chacha code has a SIMD-fallback, how come this one doesn't? Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt