summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/exported-sql-viewer.py
diff options
context:
space:
mode:
authorArd Biesheuvel <ardb@kernel.org>2024-01-18 18:06:34 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2024-01-26 16:39:32 +0800
commit948ffc66e595e56c6ebf672db38d59c8a9efc108 (patch)
treeeb93f400d69d6e38442865625644ef1e8ac63be3 /tools/perf/scripts/python/exported-sql-viewer.py
parentc131098d6d9c5d0a580456f527dedefaf61acb7b (diff)
crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
CCM combines the counter (CTR) encryption mode with a MAC based on the same block cipher. This MAC construction is a bit clunky: it invokes the block cipher in a way that cannot be parallelized, resulting in poor CPU pipeline efficiency. The arm64 CCM code mitigates this by interleaving the encryption and MAC at the AES round level, resulting in a substantial speedup. But this approach does not apply to the additional authenticated data (AAD) which is not encrypted. This means the special asm routine dealing with the AAD is not any better than the MAC update routine used by the arm64 AES block encryption driver, so let's reuse that, and drop the special AES-CCM version. Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'tools/perf/scripts/python/exported-sql-viewer.py')
0 files changed, 0 insertions, 0 deletions