> Date: Thu, 18 Jun 2020 17:17:56 +0000
> From: Taylor R Campbell <riastr...@netbsd.org>
> 
> > Date: Thu, 18 Jun 2020 09:37:36 -0700
> > From: Brian Buhrow <buh...@nfbcal.org>
> > 
> >     hello.  I have what may be a silly question.  Does this change mean
> > that I386 users won't have AES capabilities in the kernel at all going
> > forward?  (I gather that's true for architectures like Sparc, but I'm
> > assuming the AES code we did have didn't run very well on Sparc anyway.)
> > However, it seems we still have a number of I386 users and I'm wondering
> > where this leaves them?
> 
> No functionality is lost: there was, and there remains, a software
> implementation of AES that can be used in cgd, ipsec, /dev/crypto with
> swcrypto, &c., even if the CPU doesn't have AES instructions that we
> can take advantage of.

I should clarify that when I said

   2. Add support for CPU AES instructions on Intel, AMD, VIA, and
      aarch64 CPUs to implement the kernel's synchronous AES API,

and then noted that as future work,

     With a little more effort we could:
     - adapt the x86 AES-NI logic to 32-bit mode

what I meant is that in _adding_ x86 AES-NI logic I only implemented
it in 64-bit mode.  The patch set doesn't _take away_ AES-NI logic in
32-bit mode because we never had that to begin with -- the only AES
logic we've _ever_ had in the kernel is the vulnerable AES reference
implementation.

I don't expect a lot of users will run x86 CPUs with AES-NI in 32-bit
mode, so I didn't think it would be worth the effort just yet, but if
you are in this situation and it would benefit you, I'm happy to look
into it.

Reply via email to