summaryrefslogtreecommitdiff
path: root/crypto/jitterentropy-kcapi.c
diff options
context:
space:
mode:
authorArd Biesheuvel <ardb@kernel.org>2020-12-31 17:41:55 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2021-01-08 15:39:47 +1100
commit421fb0af08b7339f49abceec040b3f6fc8e08d61 (patch)
treeff60acc0b519064d8f65810d9e64233fa9de5280 /crypto/jitterentropy-kcapi.c
parent08012ae77c89b709b6f5bda2d2e8338cbd2fb1ad (diff)
downloadlinux-crypto-421fb0af08b7339f49abceec040b3f6fc8e08d61.tar.gz
linux-crypto-421fb0af08b7339f49abceec040b3f6fc8e08d61.zip
crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
The AES-NI driver implements XTS via the glue helper, which consumes a struct with sets of function pointers which are invoked on chunks of input data of the appropriate size, as annotated in the struct. Let's get rid of this indirection, so that we can perform direct calls to the assembler helpers. Instead, let's adopt the arm64 strategy, i.e., provide a helper which can consume inputs of any size, provided that the penultimate, full block is passed via the last call if ciphertext stealing needs to be applied. This also allows us to enable the XTS mode for i386. Tested-by: Eric Biggers <ebiggers@google.com> # x86_64 Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Reported-by: kernel test robot <lkp@intel.com> Reported-by: kernel test robot <lkp@intel.com> Reported-by: kernel test robot <lkp@intel.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/jitterentropy-kcapi.c')
0 files changed, 0 insertions, 0 deletions