From owner-freebsd-bugs@FreeBSD.ORG Fri Jan 24 21:50:58 2014 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0F3FBC9C; Fri, 24 Jan 2014 21:50:58 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id D88F71CE8; Fri, 24 Jan 2014 21:50:57 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id s0OLovhJ079563; Fri, 24 Jan 2014 21:50:57 GMT (envelope-from jmg@freefall.freebsd.org) Received: (from jmg@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id s0OLovsG079561; Fri, 24 Jan 2014 21:50:57 GMT (envelope-from jmg) Date: Fri, 24 Jan 2014 21:50:57 GMT Message-Id: <201401242150.s0OLovsG079561@freefall.freebsd.org> To: nievera@mm.st, jmg@FreeBSD.org, freebsd-bugs@FreeBSD.org From: jmg@FreeBSD.org Subject: Re: kern/170200: [crypto] [patch] AES-NI XTS mode performance lower than CBC X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Jan 2014 21:50:58 -0000 Synopsis: [crypto] [patch] AES-NI XTS mode performance lower than CBC State-Changed-From-To: open->feedback State-Changed-By: jmg State-Changed-When: Fri Jan 24 21:47:52 UTC 2014 State-Changed-Why: I recently did some work on pipelining aes-ni and I'm not sure how applicable your patch is anymore, can you evaluate and maybe we can work together to get even better performance from it? Thanks. http://www.freebsd.org/cgi/query-pr.cgi?pr=170200