]> git.ipfire.org Git - thirdparty/openssl.git/commit
Implement interleaving aes-cbc-hmac-sha on aarch64
authorfangming.fang <fangming.fang@arm.com>
Wed, 17 Jan 2024 10:48:55 +0000 (10:48 +0000)
committerMatt Caswell <matt@openssl.org>
Mon, 14 Apr 2025 13:53:30 +0000 (14:53 +0100)
commit86408fa8de640ebf09b08cb5fce8173d2dbc5702
tree8f5f766c39ee315abad43b08b6a604884fdfae67
parent44af96b9c57573e20b52d2204dfe0ff3bd53dc39
Implement interleaving aes-cbc-hmac-sha on aarch64

This is to implement #19932, it adds enc-then-mac aes-cbc-hmac-sha1/256,
aes-cbc and hmac-sha1/256 are interleaved to achieve better performance.
It only supports non-padding mode that means the length of input data
should be multiple of 16 bytes.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/22949)
27 files changed:
apps/enc.c
apps/lib/opt.c
crypto/aes/asm/aes-sha1-armv8.pl [new file with mode: 0644]
crypto/aes/asm/aes-sha256-armv8.pl [new file with mode: 0644]
crypto/aes/build.info
crypto/evp/evp_lib.c
crypto/objects/obj_dat.h
crypto/objects/obj_mac.num
crypto/objects/objects.txt
include/crypto/aes_platform.h
include/openssl/evp.h
include/openssl/obj_mac.h
providers/common/include/prov/providercommon.h
providers/defltprov.c
providers/fips/fipsprov.c
providers/implementations/ciphers/build.info
providers/implementations/ciphers/cipher_aes_cbc_hmac_sha1_etm_hw.c [new file with mode: 0644]
providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_etm_hw.c [new file with mode: 0644]
providers/implementations/ciphers/cipher_aes_cbc_hmac_sha_etm.c [new file with mode: 0644]
providers/implementations/ciphers/cipher_aes_cbc_hmac_sha_etm.h [new file with mode: 0644]
providers/implementations/ciphers/ciphercommon.c
providers/implementations/include/prov/implementations.h
providers/implementations/include/prov/names.h
test/evp_libctx_test.c
test/evp_test.c
test/recipes/30-test_evp_data/evpciph_aes_stitched.txt
util/perl/OpenSSL/paramnames.pm