On Fri, 20 Aug 2021 22:43:55 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Mon, 23 Aug 2021 20:04:00 GMT, Anthony Scarpino
wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> changes to make sure that ghash_long_swap_mask and counter_mask_addr calls
>> are not duplicated
>
> Tier 1-3 pas
On Fri, 20 Aug 2021 22:43:55 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Fri, 20 Aug 2021 22:43:55 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Fri, 20 Aug 2021 22:43:55 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request with a new target
On Tue, 17 Aug 2021 23:37:55 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Tue, 17 Aug 2021 23:37:55 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
On Wed, 11 Aug 2021 17:49:57 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
On Mon, 9 Aug 2021 15:49:07 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Mon, 9 Aug 2021 15:49:07 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Mon, 9 Aug 2021 18:08:53 GMT, Valerie Peng wrote:
>> I do not understand this comment
>
> Doesn't implGCMCrypt(...) return an int telling how much bytes it has
> processed? Then we adjust the index and remain input length with this value.
> But here we didn't save the return value which look
On Mon, 9 Aug 2021 15:49:07 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 6 Aug 2021 19:35:23 GMT, Anthony Scarpino wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 1779:
>>
>>> 1777: int len = 0;
>>> 1778: if (inLen >= PARALLEL_LEN) {
>>> 1779: implGCMCrypt(in, inOfs, inLen,
On Mon, 9 Aug 2021 15:49:07 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 6 Aug 2021 20:37:22 GMT, Anthony Scarpino wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 1120:
>>
>>> 1118: inOfs += r;
>>> 1119: inLen -= r;
>>> 1120: }
>>
>> Have you considered move the "if (in
On Fri, 6 Aug 2021 19:53:28 GMT, Anthony Scarpino wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 87:
>>
>>> 85: private static final int MAX_BUF_SIZE = Integer.MAX_VALUE;
>>> 86: // data size when buffer is divided up to aid in intrinsics
>>
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 6 Aug 2021 19:57:11 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with five additional
>> commits since the last revision:
>>
>> - Merge branch 'aes-gcm' of github.com:smita-kamath/jdk into aes-gcm
>> - Updates, comment and variable cleanup
>> -
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 6 Aug 2021 20:01:00 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with five additional
>> commits since the last revision:
>>
>> - Merge branch 'aes-gcm' of github.com:smita-kamath/jdk into aes-gcm
>> - Updates, comment and variable cleanup
>> -
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 6 Aug 2021 18:40:44 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with five additional
>> commits since the last revision:
>>
>> - Merge branch 'aes-gcm' of github.com:smita-kamath/jdk into aes-gcm
>> - Updates, comment and variable cleanup
>> -
On Fri, 6 Aug 2021 19:44:05 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with five additional
>> commits since the last revision:
>>
>> - Merge branch 'aes-gcm' of github.com:smita-kamath/jdk into aes-gcm
>> - Updates, comment and variable cleanup
>> -
On Fri, 6 Aug 2021 19:32:25 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with five additional
>> commits since the last revision:
>>
>> - Merge branch 'aes-gcm' of github.com:smita-kamath/jdk into aes-gcm
>> - Updates, comment and variable cleanup
>> -
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 6 Aug 2021 19:16:39 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with five additional
>> commits since the last revision:
>>
>> - Merge branch 'aes-gcm' of github.com:smita-kamath/jdk into aes-gcm
>> - Updates, comment and variable cleanup
>> -
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Wed, 4 Aug 2021 02:24:05 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
On Thu, 22 Jul 2021 22:52:14 GMT, Anthony Scarpino
wrote:
>> Yes, I know. Basically, we are trying to optimize performance by trying to
>> write into the supplied buffers (out) as much as we can. But then when tag
>> verification failed, the "written" bytes are erased w/ 0. Ideal case would
>
On Fri, 30 Jul 2021 18:40:14 GMT, Smita Kamath wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 717:
>>
>>> 715: in = new byte[Math.min(PARALLEL_LEN, srcLen)];
>>> 716: out = new byte[Math.min(PARALLEL_LEN, srcLen)];
>>
On Thu, 22 Jul 2021 17:57:13 GMT, Anthony Scarpino
wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 761:
>>
>>> 759: }
>>> 760:
>>> 761: dst.put(out, 0, rlen);
>>
>> This looks belong to the above if-block? I wonder how this
On Fri, 30 Jul 2021 18:23:18 GMT, Valerie Peng wrote:
>> Ok.. Moving it into GCMEncrypt makes sense. Now that I look at the code
>> GCMDecrypt only uses it when passed to a method. GCMEncrypt uses it
>
> This is still present in the latest update. Is there another update coming?
Yes.
---
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request with a new target
On Mon, 19 Jul 2021 19:18:54 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Fri, 30 Jul 2021 18:23:44 GMT, Valerie Peng wrote:
>> ok
>
> This is still present in the latest update. Is there another update coming?
Yes. There will be another update.
-
PR: https://git.openjdk.java.net/jdk/pull/4019
On Thu, 22 Jul 2021 17:16:45 GMT, Anthony Scarpino
wrote:
>> Seems strange to have GCMOperation op defined in GCMEngine but not
>> initialized, nor used. The methods in GCMEngine which use op has an argument
>> named op anyway. Either you just use the "op" field (remove the "op"
>> argument)
On Thu, 22 Jul 2021 17:19:20 GMT, Anthony Scarpino
wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 650:
>>
>>> 648: int originalOutOfs = 0;
>>> 649: byte[] in;
>>> 650: byte[] out;
>>
>> The name "in", "out" are almost used
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
On Thu, 22 Jul 2021 18:30:50 GMT, Anthony Scarpino
wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 762:
>>
>>> 760:
>>> 761: dst.put(out, 0, rlen);
>>> 762: processed += srcLen;
>>
>> It seems that callers of this implGCMCr
On Thu, 22 Jul 2021 22:41:03 GMT, Valerie Peng wrote:
>> This is able in-place, not about two separate buffers.. zeroing happens
>> somewhere else for all decryption bad buffers
>
> Yes, I know. Basically, we are trying to optimize performance by trying to
> write into the supplied buffers (out
On Thu, 22 Jul 2021 18:36:16 GMT, Anthony Scarpino
wrote:
>> Hmm ok, so if it's not decryption in-place, then output buffer would still
>> be zero'ed when the auth tag failed, but this is ok?
>
> This is able in-place, not about two separate buffers.. zeroing happens
> somewhere else for all d
On Fri, 16 Jul 2021 00:09:37 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Mon, 19 Jul 2021 23:41:49 GMT, Valerie Peng wrote:
>> If decryption fails with a bad auth tag, the in is not overwritten because
>> it's in-place. Encryption is not needed because there is nothing to check.
>> I can add a comment.
>
> Hmm ok, so if it's not decryption in-place, then output
On Tue, 20 Jul 2021 01:35:04 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Mon, 19 Jul 2021 19:35:16 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Mon, 19 Jul 2021 19:22:53 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Fri, 16 Jul 2021 00:31:43 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Tue, 20 Jul 2021 22:36:28 GMT, Valerie Peng wrote:
>> Initializing op in abstract GCMEngine would mean another 'if(encryption)',
>> when that would not be needed in the GCMEncrypt() or GCMDecrypt(). I don't
>> see why that is clearer.
>>
>> GaloisCounterMode.implGCMCrypt(...) is the intr
On Fri, 16 Jul 2021 19:41:53 GMT, Valerie Peng wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 629:
>>
>>> 627: GCTR gctr;
>>> 628: GHASH ghash;
>>> 629: GCMOperation op;
>>
>> It seems clearer to initialize "op" in GCMEngine
On Fri, 16 Jul 2021 20:49:20 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GHASH.java
On Fri, 16 Jul 2021 00:10:52 GMT, Anthony Scarpino
wrote:
>> src/java.base/share/classes/com/sun/crypto/provider/GaloisCounterMode.java
>> line 992:
>>
>>> 990: */
>>> 991: byte[] overlapDetection(byte[] in, int inOfs, byte[] out, int
>>> outOfs) {
>>> 992: if (in
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Fri, 16 Jul 2021 00:32:16 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Thu, 15 Jul 2021 22:44:05 GMT, Valerie Peng wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> Updated AES-GCM intrinsic to match latest Java Code
>
> src/java.base/share/classes/com/sun/crypto/provider/GaloisCount
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
On Wed, 14 Jul 2021 21:02:01 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request with a new target
On Fri, 11 Jun 2021 17:54:02 GMT, Vladimir Kozlov wrote:
>> Thanks for your comments Vladimir. The intrinsic is called for encrypt as
>> well as decrypt operation.
>
> Only one intrinsic is declared in this change: `_galoisCounterMode_AESCrypt`.
> Other AES intrinsics have 2 that is why they ha
On Fri, 11 Jun 2021 17:19:37 GMT, Smita Kamath wrote:
>> src/hotspot/share/opto/library_call.cpp line 547:
>>
>>> 545:
>>> 546: case vmIntrinsics::_galoisCounterMode_AESCrypt:
>>> 547: return inline_galoisCounterMode_AESCrypt(intrinsic_id());
>>
>> You don't need to pass `intrinsic_id()`
On Fri, 11 Jun 2021 15:45:02 GMT, Vladimir Kozlov wrote:
>> Smita Kamath has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> 8267125:Updated intrinsic signature to remove copies of counter, state and
>> subkeyHtbl
>
> src/hotspot/share/opto
On Fri, 4 Jun 2021 23:49:31 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
On Fri, 4 Jun 2021 23:49:31 GMT, Smita Kamath wrote:
>> I would like to submit AES-GCM optimization for x86_64 architectures
>> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
>> and GHASH operations.
>> Performance gain of ~1.5x - 2x for message sizes 8k and above.
>
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Smita Kamath has updated the pull request incrementally wit
On Fri, 14 May 2021 00:42:35 GMT, Smita Kamath wrote:
> I would like to submit AES-GCM optimization for x86_64 architectures
> supporting AVX3+VAES (Evex encoded AES). This optimization interleaves AES
> and GHASH operations.
> Performance gain of ~1.5x - 2x for message sizes 8k and above.
Add
I would like to submit AES-GCM optimization for x86_64 architectures supporting
AVX3+VAES (Evex encoded AES). This optimization interleaves AES and GHASH
operations.
Performance gain of ~1.5x - 2x for message sizes 8k and above.
-
Commit messages:
- Merge master
- JDK-8267125: AES
81 matches
Mail list logo