From patchwork Tue Nov 17 13:32:10 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 11912315 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C5B1C2D0E4 for ; Tue, 17 Nov 2020 13:50:50 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3C9EF2465E for ; Tue, 17 Nov 2020 13:50:50 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="gjN/JhPe" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732321AbgKQNci (ORCPT ); Tue, 17 Nov 2020 08:32:38 -0500 Received: from mail.kernel.org ([198.145.29.99]:42322 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732315AbgKQNcf (ORCPT ); Tue, 17 Nov 2020 08:32:35 -0500 Received: from e123331-lin.nice.arm.com (lfbn-nic-1-188-42.w2-15.abo.wanadoo.fr [2.15.37.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 64E9B207BC; Tue, 17 Nov 2020 13:32:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605619956; bh=oiVGcTqRY5uab+1tLpgkJEwoZKWfuoa6ABQDcm2KJ+U=; h=From:To:Cc:Subject:Date:From; b=gjN/JhPeKbOYeT9RvNHHEDbsgRcZ43mVYGwkjJbRAAsUENkhUbam5lVPf3f5EKxwM drJC5GuACJVoRZQeg2dAFmy7v8HORz/WJImNzkKibac6cNLAhcRL/uMern2yaMfCzX +cPgtF23xO/5IUpqmsilK3n+CYZXeq7Fu7fXh1pQ= From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: herbert@gondor.apana.org.au, linux-arm-kernel@lists.infradead.org, Ard Biesheuvel , Ondrej Mosnacek , Eric Biggers Subject: [PATCH v3 0/4] crypto: aegis128 enhancements Date: Tue, 17 Nov 2020 14:32:10 +0100 Message-Id: <20201117133214.29114-1-ardb@kernel.org> X-Mailer: git-send-email 2.17.1 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This series supersedes [0] '[PATCH] crypto: aegis128/neon - optimize tail block handling', which is included as patch #3 here, but hasn't been modified substantially. Patch #1 should probably go to -stable, even though aegis128 does not appear to be widely used. Patches #2 and #3 improve the SIMD code paths. Patch #4 enables fuzz testing for the SIMD code by registering the generic code as a separate driver if the SIMD code path is enabled. Changes since v2: - add Ondrej's ack to #1 - fix an issue spotted by Ondrej in #4 where the generic code path would still use some of the SIMD helpers Cc: Ondrej Mosnacek Cc: Eric Biggers [0] https://lore.kernel.org/linux-crypto/20201107195516.13952-1-ardb@kernel.org/ Ard Biesheuvel (4): crypto: aegis128 - wipe plaintext and tag if decryption fails crypto: aegis128/neon - optimize tail block handling crypto: aegis128/neon - move final tag check to SIMD domain crypto: aegis128 - expose SIMD code path as separate driver crypto/aegis128-core.c | 245 ++++++++++++++------ crypto/aegis128-neon-inner.c | 122 ++++++++-- crypto/aegis128-neon.c | 21 +- 3 files changed, 287 insertions(+), 101 deletions(-) Tested-by: Geert Uytterhoeven