Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp2175256rwp; Fri, 14 Jul 2023 01:51:02 -0700 (PDT) X-Google-Smtp-Source: APBJJlHfAH83Ka6JukwkhcCnI9pY0CzWLYKpZjtv1whz/6fd8L3wWLqfbWo3ASICzoyOKdbd4mcq X-Received: by 2002:a17:906:779c:b0:994:1ef9:91dc with SMTP id s28-20020a170906779c00b009941ef991dcmr4464537ejm.15.1689324662686; Fri, 14 Jul 2023 01:51:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689324662; cv=none; d=google.com; s=arc-20160816; b=Vd0YW/d4OBlPcDduc0cu1NdSTjq9YM13edBZLwfrHKE6ChcDqJQf8zEtBQ6vwAiVoF JG9FnbKtSZDrvQRs4AgTFzqQrKidIHdcTrw0pk6EIvMXJdjUpwbimuPD+tZreuAVjcc6 1tpDr38iHkgTza8CwFuwsTLZghroO8H4qiJp4M1zyVChTSDbwIvrFngas7ZgrUz4Rb8I fRRbmV36D8wTyg+HmFK/wD+DmJtjwMj1KcBBF7Zf6mClsvzXqCVoI1WsquYLsV4cF91q XjfrYLuAjO/Ncootpku6/R0jnqYoHdUJxITj05sUYGf4UMdXgAZQYAp1tg7frYo2AoCW hdkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=JpYK5rsgw8Lcid9GTw03yVmmmPV17NlHKc1/1zwzhRA=; fh=3WmQJvhv4T6FqLMWT7CrVD5QaFEx1UsAzsMHEAB01Vk=; b=htCjJjBsLflXRVf02XyD0mblYPZoFUufw/o2U52TT+MkJvMCY13tc2sZl3fctxXbya /H4aM93W2+YvepjJOtW1Xc7vlOshdBTezqsS9xNzboiWzo9U/HUXDROFFBegCmQ+xHyZ B6mZZh7qvRXuPpjrYPCQnZIiZDdVJbrdEVSMvkrUwmy0YU/6SMhn45oFbORJUml2sgOR iBv491vYZYqJ522dUJNYntp/GjTTvhz+X5WH/Tl7C9NR9ResEFxJytCuLxE5sLtyEOGZ LqshkiOxjR4bYCZ6UQdzvLWAamHYxxyOPZg8nmLpkDuB2eMBsrtJ11Eewi9UC+OPAVaY NWDg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d11-20020a1709064c4b00b00988b90f50b3si8182346ejw.607.2023.07.14.01.50.38; Fri, 14 Jul 2023 01:51:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233017AbjGNIuY (ORCPT + 99 others); Fri, 14 Jul 2023 04:50:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56130 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235439AbjGNIuX (ORCPT ); Fri, 14 Jul 2023 04:50:23 -0400 Received: from 167-179-156-38.a7b39c.syd.nbn.aussiebb.net (167-179-156-38.a7b39c.syd.nbn.aussiebb.net [167.179.156.38]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C78C12710; Fri, 14 Jul 2023 01:50:18 -0700 (PDT) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1qKEV3-001RdB-GM; Fri, 14 Jul 2023 18:50:06 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 14 Jul 2023 18:49:58 +1000 Date: Fri, 14 Jul 2023 18:49:58 +1000 From: Herbert Xu To: Danny Tsen Cc: linux-crypto@vger.kernel.org, leitao@debian.org, nayna@linux.ibm.com, appro@cryptogams.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, mpe@ellerman.id.au, ltcgcw@linux.vnet.ibm.com, dtsen@us.ibm.com Subject: Re: [PATCH v2 0/5] crypto: Accelerated Chacha20/Poly1305 implementation Message-ID: References: <20230426191147.60610-1-dtsen@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230426191147.60610-1-dtsen@linux.ibm.com> X-Spam-Status: No, score=2.7 required=5.0 tests=BAYES_00,HELO_DYNAMIC_IPADDR2, RCVD_IN_DNSWL_BLOCKED,RDNS_DYNAMIC,SPF_HELO_NONE,SPF_PASS,TVD_RCVD_IP, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Apr 26, 2023 at 03:11:42PM -0400, Danny Tsen wrote: > This patch series provide an accelerated/optimized Chacha20 and Poly1305 > implementation for Power10 or later CPU (ppc64le). This module > implements algorithm specified in RFC7539. The implementation > provides 3.5X better performance than the baseline for Chacha20 and > Poly1305 individually and 1.5X improvement for Chacha20/Poly1305 > operation. > > This patch has been tested with the kernel crypto module tcrypt.ko and > has passed the selftest. The patch is also tested with > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS enabled. > > > Danny Tsen (5): > An optimized Chacha20 implementation with 8-way unrolling for ppc64le. > Glue code for optmized Chacha20 implementation for ppc64le. > An optimized Poly1305 implementation with 4-way unrolling for ppc64le. > Glue code for optmized Poly1305 implementation for ppc64le. > Update Kconfig and Makefile. > > arch/powerpc/crypto/Kconfig | 26 + > arch/powerpc/crypto/Makefile | 4 + > arch/powerpc/crypto/chacha-p10-glue.c | 221 +++++ > arch/powerpc/crypto/chacha-p10le-8x.S | 842 ++++++++++++++++++ > arch/powerpc/crypto/poly1305-p10-glue.c | 186 ++++ > arch/powerpc/crypto/poly1305-p10le_64.S | 1075 +++++++++++++++++++++++ > 6 files changed, 2354 insertions(+) > create mode 100644 arch/powerpc/crypto/chacha-p10-glue.c > create mode 100644 arch/powerpc/crypto/chacha-p10le-8x.S > create mode 100644 arch/powerpc/crypto/poly1305-p10-glue.c > create mode 100644 arch/powerpc/crypto/poly1305-p10le_64.S > > -- > 2.31.1 All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt