lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 21 Nov 2023 16:04:19 +0800 From: LeoLiu-oc <leoliu-oc@...oxin.com> To: Dave Hansen <dave.hansen@...el.com>, kernel test robot <lkp@...el.com>, <herbert@...dor.apana.org.au>, <davem@...emloft.net>, <tglx@...utronix.de>, <mingo@...hat.com>, <bp@...en8.de>, <dave.hansen@...ux.intel.com>, <x86@...nel.org>, <hpa@...or.com>, <seanjc@...gle.com>, <kim.phillips@....com>, <pbonzini@...hat.com>, <babu.moger@....com>, <jiaxi.chen@...ux.intel.com>, <jmattson@...gle.com>, <pawan.kumar.gupta@...ux.intel.com>, <linux-crypto@...r.kernel.org>, <linux-kernel@...r.kernel.org> CC: <oe-kbuild-all@...ts.linux.dev>, <CobeChen@...oxin.com>, <TonyWWang@...oxin.com>, <YunShen@...oxin.com>, <Leoliu@...oxin.com> Subject: Re: [PATCH v2] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation 在 2023/11/16 3:21, Dave Hansen 写道: > >> vim +/asm +43 arch/x86/crypto/sm2-zhaoxin-gmi_glue.c >> >> 35 >> 36 /* Zhaoxin sm2 verify function */ >> 37 static inline int zhaoxin_gmi_sm2_verify(unsigned char *key, unsigned char *hash, unsigned char *sig, >> 38 unsigned char *scratch) >> 39 { >> 40 uint64_t cword, f_ok; >> 41 cword = (uint64_t)0x8; >> 42 >> > 43 asm(".byte 0xf2, 0x0f, 0xa6, 0xc0" >> 44 :"=c"(f_ok), "+a"(hash), "+b"(key), "+d"(cword), "+S"(scratch), "+D"(sig)); >> 45 >> 46 return f_ok; >> 47 } >> 48 > > When you go fix your compile error, can you please look around the tree > and see what folks do for replacing .byte? AS_SHA1_NI, for example. Thank you for your advice. We have found the root cause of the compile error and conducted detailed testing again. A corrected version will be released soon. Sincerely. Leoliu-oc
Powered by blists - more mailing lists