From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S940867AbcLVQPI (ORCPT ); Thu, 22 Dec 2016 11:15:08 -0500 Received: from smtpout.microchip.com ([198.175.253.82]:30256 "EHLO email.microchip.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1757887AbcLVQPG (ORCPT ); Thu, 22 Dec 2016 11:15:06 -0500 From: Cyrille Pitchen To: , , CC: , , , Cyrille Pitchen Subject: [PATCH 00/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes Date: Thu, 22 Dec 2016 17:15:05 +0100 Message-ID: X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Brightmail-Tracker: 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 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi all, this series of patches has been based and tested on next-20161222 with CRYPTO_MANAGER_DISABLED_TESTS not set. The series adds support to the hmac(shaX) algorithms first, then combines both the Atmel SHA and AES hardware accelerators to implement authenc(hmac(shaX),Y(aes)) algorithms as used by IPSEC/SSL connections. It has also been tested with strongswan + xl2tpd to create an IPSEC+L2TP (transport mode) VPN and strongswan only (tunnel mode) for an IPSEC VPN. Then iperf was used to measure the bandwidth improvement in tunnel mode: drivers AES SHA SPLIP iperf half-duplex Mbit/s authenc(hmac(sha1-generic),cbc(aes)) SW SW N/A 27.7 authenc(hmac(sha1-generic),atmel-cbc-aes) HW SW N/A 30.2 (mainline) authenc(atmel-hmac-sha1,atmel-cbc-aes) HW HW no 29.1 atmel-authenc-hmac-sha1-cbc-aes HW hW yes 38.8 SPLIP: Secure Protocol Layers Improved Performances (AES+SHA combined). Some patches of this series are purely transitional: I've split the modifications into many patches to ease the review. Best regards, Cyrille Cyrille Pitchen (12): crypto: atmel-sha: create function to get an Atmel SHA device crypto: atmel-sha: update request queue management to make it more generic crypto: atmel-sha: make atmel_sha_done_task more generic crypto: atmel-sha: redefine SHA_FLAGS_SHA* flags to match SHA_MR_ALGO_SHA* crypto: atmel-sha: add atmel_sha_wait_for_data_ready() crypto: atmel-sha: add SHA_MR_MODE_IDATAR0 crypto: atmel-sha: add atmel_sha_cpu_start() crypto: atmel-sha: add simple DMA transfers crypto: atmel-sha: add support to hmac(shaX) crypto: atmel-aes: fix atmel_aes_handle_queue() crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes crypto: atmel-sha: add verbose debug facilities to print hw register names drivers/crypto/Kconfig | 12 + drivers/crypto/atmel-aes-regs.h | 16 + drivers/crypto/atmel-aes.c | 478 ++++++++++++- drivers/crypto/atmel-sha-regs.h | 20 + drivers/crypto/atmel-sha.c | 1438 +++++++++++++++++++++++++++++++++++++-- 5 files changed, 1896 insertions(+), 68 deletions(-) -- 2.7.4