NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/57426: kernel aes(9) API should have optimized standard AES key schedule



>Number:         57426
>Category:       kern
>Synopsis:       kernel aes(9) API should have optimized standard AES key schedule
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Mon May 22 14:20:00 +0000 2023
>Originator:     Taylor R Campbell
>Release:        current
>Organization:
The NetAES Foundation
>Environment:
>Description:
Optimized AES implementations have callbacks for computing custom AES key schedules that can be used for custom AES encryption and decryption routines.

For example, the portable C AES code from BearSSL uses a variant key schedule that is optimized for bitslicing.

However, some drivers like mvxpsec(4) require software to compute the standard AES key schedule.

These drivers can call br_aes_ct_keysched_stdenc/dec, but if the CPU has AES-NI, for instance, they should be able to take advantage of that to compute the standard AES key schedule.
>How-To-Repeat:
think about removing the last abuse of tables for AES in mvxpsec(4) 
>Fix:
Yes, please!



Home | Main Index | Thread Index | Old Index