I made a merge request for optimizing AES modes on s390x architecture, the
patch implements the optimized cores using cipher instructions that have
been added to s390x arch in message security assist extensions. The patch
uses the following functions:
KM-AES-128 (ECB-AES128)
KM-AES-192 (ECB-AES192)
KM-AES-256 (ECB-AES256)
KMC-AES-128 (CBC-AES128)
KMC-AES-192 (CBC-AES192)
KMC-AES-256 (CBC-AES256)
KMAC-AES-128 (CCM-AES128, CMAC-AES128)
KMAC-AES-192 (CCM-AES192)
KMAC-AES-256 (CCM-AES256, CMAC-AES256)
KMF-AES-128 (CFB-AES128, CFB8-AES128)
KMF-AES-192 (CFB-AES192, CFB8-AES192)
KMF-AES-256 (CFB-AES256, CFB8-AES256)
KM-XTS-AES-128 (XTS-AES128)
KM-XTS-AES-256 (XTS-AES256)
KIMD-GHASH (GHASH)
KMCTR-AES-128, KMA-GCM-AES-128 (CTR-AES128)
KMCTR-AES-192, KMA-GCM-AES-192 (CTR-AES192)
KMCTR-AES-256, KMA-GCM-AES-256 (CTR-AES256)
KMA-GCM-AES-128 (GCM-AES128)
KMA-GCM-AES-192 (GCM-AES192)
KMA-GCM-AES-256 (GCM-AES256)

The merge request has also a benchmark that measures the speed of optimized
cores on s390x arch.

I can't set up gitlab CI for automatic testing on s390x arch because qemu
hasn't implemented cipher functions for this arch. However, there is an
easy way to test the patch manually by requesting a free account on the
LinuxONE Community
Cloud, both short-term and long-term access are available.
https://linuxone.cloud.marist.edu/#/register?flag=VM

regards,
Mamone
_______________________________________________
nettle-bugs mailing list
nettle-bugs@lists.lysator.liu.se
http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs

Reply via email to