summaryrefslogtreecommitdiff
path: root/crypto/ecdh.c
diff options
context:
space:
mode:
authorArd Biesheuvel <ardb@kernel.org>2020-11-20 12:04:33 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2020-11-27 17:13:45 +1100
commita8f0e3a397cd601adc3844d7f56a1ac53da66bda (patch)
treed0a2ee32ff92c119fcadf55636fa7ed5e2e57822 /crypto/ecdh.c
parent0e7a9e269de5500fc2e6eda8e105b7a89c7164c5 (diff)
downloadlinux-crypto-a8f0e3a397cd601adc3844d7f56a1ac53da66bda.tar.gz
linux-crypto-a8f0e3a397cd601adc3844d7f56a1ac53da66bda.zip
crypto: tcrypt - include 1420 byte blocks in aead and skcipher benchmarks
WireGuard and IPsec both typically operate on input blocks that are ~1420 bytes in size, given the default Ethernet MTU of 1500 bytes and the overhead of the VPN metadata. Many aead and sckipher implementations are optimized for power-of-2 block sizes, and whether they perform well when operating on 1420 byte blocks cannot be easily extrapolated from the performance on power-of-2 block size. So let's add 1420 bytes explicitly, and round it up to the next blocksize multiple of the algo in question if it does not support 1420 byte blocks. Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/ecdh.c')
0 files changed, 0 insertions, 0 deletions