mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-30 08:04:13 +08:00
b087dfab4d
Add an implementation of the ChaCha20 stream cipher (see e.g. RFC 7539) that makes use of z13's vector instruction set extension. The original implementation is by Andy Polyakov which is adapted for kernel use. Four to six blocks are processed in parallel resulting in a performance gain for inputs >= 256 bytes. chacha20-generic 1 operation in 622 cycles (256 bytes) 1 operation in 2346 cycles (1024 bytes) chacha20-s390 1 operation in 218 cycles (256 bytes) 1 operation in 647 cycles (1024 bytes) Cc: Andy Polyakov <appro@openssl.org> Reviewed-by: Harald Freudenberger <freude@de.ibm.com> Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com> Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
15 lines
277 B
C
15 lines
277 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* s390 ChaCha stream cipher.
|
|
*
|
|
* Copyright IBM Corp. 2021
|
|
*/
|
|
|
|
#ifndef _CHACHA_S390_H
|
|
#define _CHACHA_S390_H
|
|
|
|
void chacha20_vx(u8 *out, const u8 *inp, size_t len, const u32 *key,
|
|
const u32 *counter);
|
|
|
|
#endif /* _CHACHA_S390_H */
|