[PATCH 2/5] Support for PowerPC's AES acceleration.

Shawn Landden shawn at git.icu
Tue Jul 9 16:58:09 CEST 2019


The CPU does not require the 4KB table to be provided to it,
and thus is more resistant to side-channel attacks.

I get an approximentally 2-3X speed-up with vcrypto support.

This numbers are incorrect because of turbo mode:

Before:
Cipher:
AES | nanosecs/byte mebibytes/sec cycles/byte auto Mhz

 ECB enc |      6.27 ns/B     152.2 MiB/s      7.92 c/B      1263
 ECB dec |      7.10 ns/B     134.4 MiB/s      8.97 c/B      1264
 CBC enc |      4.52 ns/B     211.2 MiB/s      5.71 c/B      1264
 CBC dec |      4.59 ns/B     207.9 MiB/s      8.69 c/B      1895
 CFB enc |      4.34 ns/B     219.6 MiB/s      8.23 c/B      1895
 CFB dec |      4.14 ns/B     230.6 MiB/s      7.84 c/B      1895
 OFB enc |      6.09 ns/B     156.7 MiB/s     11.54 c/B      1895
 OFB dec |      6.03 ns/B     158.2 MiB/s     11.43 c/B      1895
 CTR enc |      4.17 ns/B     228.9 MiB/s      7.90 c/B      1895
 CTR dec |      4.17 ns/B     228.6 MiB/s      7.91 c/B      1895
 XTS enc |      4.53 ns/B     210.4 MiB/s      8.59 c/B      1895
 XTS dec |      5.00 ns/B     190.8 MiB/s      9.47 c/B      1895
 CCM enc |      8.51 ns/B     112.0 MiB/s     16.13 c/B      1895
 CCM dec |      8.51 ns/B     112.0 MiB/s     16.13 c/B      1895
CCM auth |      4.35 ns/B     219.1 MiB/s      8.25 c/B      1895
 EAX enc |      8.51 ns/B     112.1 MiB/s     16.13 c/B      1895
 EAX dec |      8.55 ns/B     111.5 MiB/s     16.21 c/B      1895
EAX auth |      4.34 ns/B     219.5 MiB/s      8.23 c/B      1895
 GCM enc |      7.49 ns/B     127.3 MiB/s     14.20 c/B      1895
 GCM dec |      7.49 ns/B     127.3 MiB/s     14.20 c/B      1895
GCM auth |      3.33 ns/B     286.2 MiB/s      6.31 c/B      1895
 OCB enc |      4.33 ns/B     220.1 MiB/s      8.21 c/B      1895
 OCB dec |      5.69 ns/B     167.5 MiB/s      9.32 c/B      1638
OCB auth |      5.05 ns/B     189.0 MiB/s      8.26 c/B      1638

After:
Cipher:
AES | nanosecs/byte mebibytes/sec cycles/byte auto Mhz

 ECB enc |      2.14 ns/B     445.7 MiB/s      4.06 c/B      1895
 ECB dec |      2.41 ns/B     396.0 MiB/s      4.54 c/B      1887
 CBC enc |      2.11 ns/B     451.9 MiB/s      4.00 c/B      1895
 CBC dec |      2.06 ns/B     462.7 MiB/s      3.91 c/B      1895
 CFB enc |      2.09 ns/B     455.9 MiB/s      3.96 c/B      1895
 CFB dec |      2.09 ns/B     456.2 MiB/s      3.96 c/B      1895
 OFB enc |      2.17 ns/B     439.9 MiB/s      4.11 c/B      1895
 OFB dec |      2.12 ns/B     449.6 MiB/s      4.02 c/B      1895
 CTR enc |      2.10 ns/B     454.6 MiB/s      3.98 c/B      1895
 CTR dec |      2.09 ns/B     456.7 MiB/s      3.96 c/B      1895
 XTS enc |      2.30 ns/B     415.3 MiB/s      4.35 c/B      1895
 XTS dec |      2.29 ns/B     415.8 MiB/s      4.35 c/B      1895
 CCM enc |      4.67 ns/B     204.2 MiB/s      7.65 c/B      1638
 CCM dec |      4.83 ns/B     197.3 MiB/s      7.92 c/B      1638
CCM auth |      2.43 ns/B     391.9 MiB/s      3.99 c/B      1638
 EAX enc |      4.84 ns/B     197.2 MiB/s      7.92 c/B      1638
 EAX dec |      4.83 ns/B     197.3 MiB/s      7.92 c/B      1638
EAX auth |      2.42 ns/B     394.2 MiB/s      3.96 c/B      1638
 GCM enc |      5.42 ns/B     176.0 MiB/s     10.27 c/B      1895
 GCM dec |      5.42 ns/B     176.1 MiB/s     10.27 c/B      1895
GCM auth |      3.33 ns/B     286.2 MiB/s      6.32 c/B      1895
 OCB enc |      2.10 ns/B     454.7 MiB/s      3.98 c/B      1895
 OCB dec |      2.11 ns/B     452.8 MiB/s      3.99 c/B      1895
OCB auth |      2.10 ns/B     453.6 MiB/s      3.98 c/B      1895

Fixes T4529

GCM is slow because of lack of CPU support.

v2: changelog, GNU coding standards

2019-07-09  Shawn Landden  <shawn.git.icu>

	* cipher/Makefile.am: Build cryptogams AES code.
	* cipher/ppc-xlate.pl: Renamed to...
	* asm-common-ppc.pl
	* cipher/aesp8-ppc.pl: Renamed to...
	* cipher/rijndael-ppc8.pl: ...and modified to libgcrypt's ctx structure.
	* cipher/rijndael-ppc8.S: Regenerated.
	* cipher/rijndael-ppc832.S: Regenerated.
	* cipher/rijndael-ppc8be.S: Regenerated.
	* cipher/rijndael.c: Wrapped new functionality.
	* cipher/rijndael-internal.h: Hardware detection glue.
	* configure.ac: Link cryptogams code based on target.
	* src/Makefile.am: Hardware detection.
	* src/g10lib.h: Likewise.
	* src/hwf-common.h: Likewise.
	* src/hwf-ppc.c: Likewise.
	* src/hwfeatures.c: Likewise.
---
 cipher/Makefile.am                         |   4 +
 cipher/{ppc-xlate.pl => asm-common-ppc.pl} |  29 +--
 cipher/rijndael-internal.h                 |  10 +
 cipher/rijndael-ppc8.S                     |  11 +-
 cipher/{aesp8-ppc.pl => rijndael-ppc8.pl}  |  16 +-
 cipher/rijndael-ppc832.S                   |  11 +-
 cipher/rijndael-ppc8be.S                   |  11 +-
 cipher/rijndael.c                          |  80 ++++++-
 configure.ac                               |  40 +++-
 src/Makefile.am                            |   2 +-
 src/g10lib.h                               |   3 +-
 src/hwf-common.h                           |   2 +-
 src/hwf-ppc.c                              | 231 +++++++++++++++++++++
 src/hwfeatures.c                           |  17 +-
 14 files changed, 410 insertions(+), 57 deletions(-)
 rename cipher/{ppc-xlate.pl => asm-common-ppc.pl} (93%)
 mode change 100755 => 100644
 rename cipher/{aesp8-ppc.pl => rijndael-ppc8.pl} (99%)
 create mode 100644 src/hwf-ppc.c

diff --git a/cipher/Makefile.am b/cipher/Makefile.am
index 0a031f4b..495b2f6d 100644
--- a/cipher/Makefile.am
+++ b/cipher/Makefile.am
@@ -94,10 +94,14 @@ EXTRA_libcipher_la_SOURCES = \
 	rijndael-aesni.c rijndael-padlock.c                \
 	rijndael-amd64.S rijndael-arm.S                    \
 	rijndael-ssse3-amd64.c rijndael-ssse3-amd64-asm.S  \
 	rijndael-armv8-ce.c rijndael-armv8-aarch32-ce.S    \
 	rijndael-armv8-aarch64-ce.S rijndael-aarch64.S     \
+	rijndael-ppc8.pl \
+	rijndael-ppc8.S	\
+	rijndael-ppc8be.S \
+	rijndael-ppc832.S \
 	rmd160.c \
 	rsa.c \
 	salsa20.c salsa20-amd64.S salsa20-armv7-neon.S \
 	scrypt.c \
 	seed.c \
diff --git a/cipher/ppc-xlate.pl b/cipher/asm-common-ppc.pl
old mode 100755
new mode 100644
similarity index 93%
rename from cipher/ppc-xlate.pl
rename to cipher/asm-common-ppc.pl
index 4c6e90c2..00b955cc
--- a/cipher/ppc-xlate.pl
+++ b/cipher/asm-common-ppc.pl
@@ -1,14 +1,18 @@
-#! /usr/bin/env perl
-# SPDX-License-Identifier: BSD-3-Clause
+#!/usr/bin/env perl
 
-# ====================================================================
-# Written by Andy Polyakov <appro at openssl.org> for the OpenSSL
-# project. The module is, however, dual licensed under OpenSSL and
-# CRYPTOGAMS licenses depending on where you obtain it. For further
-# details see http://www.openssl.org/~appro/cryptogams/.
-# ====================================================================
+# PowerPC assembler distiller by \@dot-asm.
+
+################################################################
+# Recognized "flavour"-s are:
+#
+# linux{32|64}[le]  GNU assembler and ELF symbol decorations,
+#                   with little-endian option
+# linux64v2         GNU asssembler and big-endian instantiation
+#                   of latest ELF specification
+# aix{32|64}        AIX assembler and symbol decorations
+# osx{32|64}        Mac OS X assembler and symbol decoratons
 
 my $flavour = shift;
 my $output = shift;
 open STDOUT,">$output" || die "can't open $output: $!";
 
@@ -49,11 +53,11 @@ my $globl = sub {
 				last;
 			      };
 	/osx/		&& do { $name = "_$name";
 				last;
 			      };
-	/linux.*(32|64le)/
+	/linux.*(32|64(le|v2))/
 			&& do {	$ret .= ".globl	$name";
 				if (!$$type) {
 				    $ret .= "\n.type	$name,\@function";
 				    $$type = "\@function";
 				}
@@ -80,11 +84,11 @@ my $globl = sub {
     $$global = $name;
     $ret;
 };
 my $text = sub {
     my $ret = ($flavour =~ /aix/) ? ".csect\t.text[PR],7" : ".text";
-    $ret = ".abiversion	2\n".$ret	if ($flavour =~ /linux.*64le/);
+    $ret = ".abiversion	2\n".$ret	if ($flavour =~ /linux.*64(le|v2)/);
     $ret;
 };
 my $machine = sub {
     my $junk = shift;
     my $arch = shift;
@@ -186,11 +190,11 @@ my $vmr = sub {
     "	vor	$vx,$vy,$vy";
 };
 
 # Some ABIs specify vrsave, special-purpose register #256, as reserved
 # for system use.
-my $no_vrsave = ($flavour =~ /aix|linux64le/);
+my $no_vrsave = ($flavour =~ /aix|linux64(le|v2)/);
 my $mtspr = sub {
     my ($f,$idx,$ra) = @_;
     if ($idx == 256 && $no_vrsave) {
 	"	or	$ra,$ra,$ra";
     } else {
@@ -320,11 +324,11 @@ while($line=<>) {
 	$line =~ s|(^[\.\w]+)\:\s*||;
 	my $label = $1;
 	if ($label) {
 	    my $xlated = ($GLOBALS{$label} or $label);
 	    print "$xlated:";
-	    if ($flavour =~ /linux.*64le/) {
+	    if ($flavour =~ /linux.*64(le|v2)/) {
 		if ($TYPES{$label} =~ /function/) {
 		    printf "\n.localentry	%s,0\n",$xlated;
 		}
 	    }
 	}
@@ -344,5 +348,6 @@ while($line=<>) {
     print $line if ($line);
     print "\n";
 }
 
 close STDOUT;
+
diff --git a/cipher/rijndael-internal.h b/cipher/rijndael-internal.h
index 78b08e8f..c573ed36 100644
--- a/cipher/rijndael-internal.h
+++ b/cipher/rijndael-internal.h
@@ -102,10 +102,17 @@
        && defined(HAVE_GCC_INLINE_ASM_AARCH64_CRYPTO)
 #  define USE_ARM_CE 1
 # endif
 #endif /* ENABLE_ARM_CRYPTO_SUPPORT */
 
+#undef USE_PPC_ASM
+#ifdef ENABLE_PPC_CRYPTO_SUPPORT
+# if defined(__powerpc64__) || defined(__powerpc__)
+#   define USE_PPC_ASM 1
+# endif
+#endif
+
 struct RIJNDAEL_context_s;
 
 typedef unsigned int (*rijndael_cryptfn_t)(const struct RIJNDAEL_context_s *ctx,
                                            unsigned char *bx,
                                            const unsigned char *ax);
@@ -152,10 +159,13 @@ typedef struct RIJNDAEL_context_s
   unsigned int use_ssse3:1;           /* SSSE3 shall be used.  */
 #endif /*USE_SSSE3*/
 #ifdef USE_ARM_CE
   unsigned int use_arm_ce:1;          /* ARMv8 CE shall be used.  */
 #endif /*USE_ARM_CE*/
+#ifdef USE_PPC_ASM
+  unsigned int use_ppc_asm:1;          /* PowerISA 2.07 crypto shall be used.  */
+#endif
   rijndael_cryptfn_t encrypt_fn;
   rijndael_cryptfn_t decrypt_fn;
   rijndael_prefetchfn_t prefetch_enc_fn;
   rijndael_prefetchfn_t prefetch_dec_fn;
 } RIJNDAEL_context ATTR_ALIGNED_16;
diff --git a/cipher/rijndael-ppc8.S b/cipher/rijndael-ppc8.S
index f03f7360..49db6f95 100644
--- a/cipher/rijndael-ppc8.S
+++ b/cipher/rijndael-ppc8.S
@@ -276,11 +276,10 @@ aes_p8_set_encrypt_key:
 	lvx	2,0,3
 	vsel	2,10,2,9
 	stvx	2,0,3
 	li	6,0
 	or	12,12,12
-	stw	8,0(5)
 
 .Lenc_key_abort:
 	mr	3,6
 	blr	
 .long	0
@@ -342,11 +341,11 @@ aes_p8_set_decrypt_key:
 .type	aes_p8_encrypt, at function
 .align	5
 aes_p8_encrypt:
 .localentry	aes_p8_encrypt,0
 
-	lwz	6,240(5)
+	lwz	6,480(5)
 	lis	0,0xfc00
 	li	12,-1
 	li	7,15
 	or	0,0,0
 
@@ -502,11 +501,11 @@ aes_p8_cbc_encrypt:
 	vxor	6,6,3
 	vperm	4,4,5,6
 
 	neg	11,3
 	lvsr	10,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 
 	lvsr	6,0,11
 	lvx	5,0,3
 	addi	3,3,15
 	vxor	6,6,3
@@ -1241,11 +1240,11 @@ aes_p8_ctr32_encrypt_blocks:
 	vperm	4,4,5,6
 	vsldoi	11,0,11,1
 
 	neg	11,3
 	lvsr	10,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 
 	lvsr	6,0,11
 	lvx	5,0,3
 	addi	3,3,15
 	vxor	6,6,3
@@ -1882,11 +1881,11 @@ aes_p8_xts_encrypt:
 
 	cmpldi	7,0
 	beq	.Lxts_enc_no_key2
 
 	lvsr	7,0,7
-	lwz	9,240(7)
+	lwz	9,480(7)
 	srwi	9,9,1
 	subi	9,9,1
 	li	3,16
 
 	lvx	0,0,7
@@ -1926,11 +1925,11 @@ aes_p8_xts_encrypt:
 .Lxts_enc:
 	lvx	4,0,10
 	addi	10,10,16
 
 	lvsr	7,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 	srwi	9,9,1
 	subi	9,9,1
 	li	3,16
 
 	vslb	10,9,9
diff --git a/cipher/aesp8-ppc.pl b/cipher/rijndael-ppc8.pl
similarity index 99%
rename from cipher/aesp8-ppc.pl
rename to cipher/rijndael-ppc8.pl
index 8397a8c7..00bf30d9 100755
--- a/cipher/aesp8-ppc.pl
+++ b/cipher/rijndael-ppc8.pl
@@ -1,8 +1,11 @@
 #! /usr/bin/env perl
 # SPDX-License-Identifier: BSD-3-Clause
 #
+# Changes: adjust struct offsets to work with libgcrypt ctx
+#          rename ppc-xlate.pl
+#
 # ====================================================================
 # Written by Andy Polyakov <appro at openssl.org> for the OpenSSL
 # project. The module is, however, dual licensed under OpenSSL and
 # CRYPTOGAMS licenses depending on where you obtain it. For further
 # details see http://www.openssl.org/~appro/cryptogams/.
@@ -58,10 +61,11 @@ if ($flavour =~ /64/) {
 } else { die "nonsense $flavour"; }
 
 $LITTLE_ENDIAN = ($flavour=~/le$/) ? $SIZE_T : 0;
 
 $0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
+( $xlate="${dir}asm-common-ppc.pl" and -f $xlate ) or
 ( $xlate="${dir}ppc-xlate.pl" and -f $xlate ) or
 ( $xlate="${dir}../../perlasm/ppc-xlate.pl" and -f $xlate) or
 die "can't locate ppc-xlate.pl";
 
 open STDOUT,"| $^X $xlate $flavour ".shift || die "can't call $xlate: $!";
@@ -351,11 +355,10 @@ Ldone:
 	lvx		$in1,0,$inp		# redundant in aligned case
 	vsel		$in1,$outhead,$in1,$outmask
 	stvx		$in1,0,$inp
 	li		$ptr,0
 	mtspr		256,$vrsave
-	stw		$rounds,0($out)
 
 Lenc_key_abort:
 	mr		r3,$ptr
 	blr
 	.long		0
@@ -415,17 +418,18 @@ ___
 #########################################################################
 {{{	# Single block en- and decrypt procedures			#
 sub gen_block () {
 my $dir = shift;
 my $n   = $dir eq "de" ? "n" : "";
+my $rounds_off = $dir eq "de" ? "240" : "480";
 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7));
 
 $code.=<<___;
 .globl	.${prefix}_${dir}crypt
 .align	5
 .${prefix}_${dir}crypt:
-	lwz		$rounds,240($key)
+	lwz		$rounds,$rounds_off($key)
 	lis		r0,0xfc00
 	mfspr		$vrsave,256
 	li		$idx,15			# 15 is not typo
 	mtspr		256,r0
 
@@ -520,11 +524,11 @@ $code.=<<___;
 	le?vxor		$inpperm,$inpperm,$tmp
 	vperm		$ivec,$ivec,$inptail,$inpperm
 
 	neg		r11,$inp
 	?lvsl		$keyperm,0,$key		# prepare for unaligned key
-	lwz		$rounds,240($key)
+	lwz		$rounds,480($key)
 
 	lvsr		$inpperm,0,r11		# prepare for unaligned load
 	lvx		$inptail,0,$inp
 	addi		$inp,$inp,15		# 15 is not typo
 	le?vxor		$inpperm,$inpperm,$tmp
@@ -1281,11 +1285,11 @@ $code.=<<___;
 	vperm		$ivec,$ivec,$inptail,$inpperm
 	 vsldoi		$one,$rndkey0,$one,1
 
 	neg		r11,$inp
 	?lvsl		$keyperm,0,$key		# prepare for unaligned key
-	lwz		$rounds,240($key)
+	lwz		$rounds,480($key)
 
 	lvsr		$inpperm,0,r11		# prepare for unaligned load
 	lvx		$inptail,0,$inp
 	addi		$inp,$inp,15		# 15 is not typo
 	le?vxor		$inpperm,$inpperm,$tmp
@@ -1956,11 +1960,11 @@ $code.=<<___;
 
 	${UCMP}i	$key2,0				# key2==NULL?
 	beq		Lxts_enc_no_key2
 
 	?lvsl		$keyperm,0,$key2		# prepare for unaligned key
-	lwz		$rounds,240($key2)
+	lwz		$rounds,480($key2)
 	srwi		$rounds,$rounds,1
 	subi		$rounds,$rounds,1
 	li		$idx,16
 
 	lvx		$rndkey0,0,$key2
@@ -2000,11 +2004,11 @@ Lxts_enc_no_key2:
 Lxts_enc:
 	lvx		$inptail,0,$inp
 	addi		$inp,$inp,16
 
 	?lvsl		$keyperm,0,$key1		# prepare for unaligned key
-	lwz		$rounds,240($key1)
+	lwz		$rounds,480($key1)
 	srwi		$rounds,$rounds,1
 	subi		$rounds,$rounds,1
 	li		$idx,16
 
 	vslb		$eighty7,$seven,$seven		# 0x808080..80
diff --git a/cipher/rijndael-ppc832.S b/cipher/rijndael-ppc832.S
index c297e398..838083e7 100644
--- a/cipher/rijndael-ppc832.S
+++ b/cipher/rijndael-ppc832.S
@@ -273,11 +273,10 @@ aes_p8_set_encrypt_key:
 	lvx	2,0,3
 	vsel	2,10,2,9
 	stvx	2,0,3
 	li	6,0
 	mtspr	256,12
-	stw	8,0(5)
 
 .Lenc_key_abort:
 	mr	3,6
 	blr	
 .long	0
@@ -335,11 +334,11 @@ aes_p8_set_decrypt_key:
 .size	aes_p8_set_decrypt_key,.-aes_p8_set_decrypt_key
 .globl	aes_p8_encrypt
 .type	aes_p8_encrypt, at function
 .align	5
 aes_p8_encrypt:
-	lwz	6,240(5)
+	lwz	6,480(5)
 	lis	0,0xfc00
 	mfspr	12,256
 	li	7,15
 	mtspr	256,0
 
@@ -491,11 +490,11 @@ aes_p8_cbc_encrypt:
 
 	vperm	4,4,5,6
 
 	neg	11,3
 	lvsl	10,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 
 	lvsr	6,0,11
 	lvx	5,0,3
 	addi	3,3,15
 
@@ -1228,11 +1227,11 @@ aes_p8_ctr32_encrypt_blocks:
 	vperm	4,4,5,6
 	vsldoi	11,0,11,1
 
 	neg	11,3
 	lvsl	10,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 
 	lvsr	6,0,11
 	lvx	5,0,3
 	addi	3,3,15
 
@@ -1867,11 +1866,11 @@ aes_p8_xts_encrypt:
 
 	cmplwi	7,0
 	beq	.Lxts_enc_no_key2
 
 	lvsl	7,0,7
-	lwz	9,240(7)
+	lwz	9,480(7)
 	srwi	9,9,1
 	subi	9,9,1
 	li	3,16
 
 	lvx	0,0,7
@@ -1911,11 +1910,11 @@ aes_p8_xts_encrypt:
 .Lxts_enc:
 	lvx	4,0,10
 	addi	10,10,16
 
 	lvsl	7,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 	srwi	9,9,1
 	subi	9,9,1
 	li	3,16
 
 	vslb	10,9,9
diff --git a/cipher/rijndael-ppc8be.S b/cipher/rijndael-ppc8be.S
index 11001a46..4fd21131 100644
--- a/cipher/rijndael-ppc8be.S
+++ b/cipher/rijndael-ppc8be.S
@@ -278,11 +278,10 @@ aes_p8_set_encrypt_key:
 	lvx	2,0,3
 	vsel	2,10,2,9
 	stvx	2,0,3
 	li	6,0
 	mtspr	256,12
-	stw	8,0(5)
 
 .Lenc_key_abort:
 	mr	3,6
 	blr	
 .long	0
@@ -352,11 +351,11 @@ aes_p8_set_decrypt_key:
 aes_p8_encrypt:
 .quad	.aes_p8_encrypt,.TOC. at tocbase,0
 .previous
 .align	5
 .aes_p8_encrypt:
-	lwz	6,240(5)
+	lwz	6,480(5)
 	lis	0,0xfc00
 	mfspr	12,256
 	li	7,15
 	mtspr	256,0
 
@@ -520,11 +519,11 @@ aes_p8_cbc_encrypt:
 
 	vperm	4,4,5,6
 
 	neg	11,3
 	lvsl	10,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 
 	lvsr	6,0,11
 	lvx	5,0,3
 	addi	3,3,15
 
@@ -1263,11 +1262,11 @@ aes_p8_ctr32_encrypt_blocks:
 	vperm	4,4,5,6
 	vsldoi	11,0,11,1
 
 	neg	11,3
 	lvsl	10,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 
 	lvsr	6,0,11
 	lvx	5,0,3
 	addi	3,3,15
 
@@ -1908,11 +1907,11 @@ aes_p8_xts_encrypt:
 
 	cmpldi	7,0
 	beq	.Lxts_enc_no_key2
 
 	lvsl	7,0,7
-	lwz	9,240(7)
+	lwz	9,480(7)
 	srwi	9,9,1
 	subi	9,9,1
 	li	3,16
 
 	lvx	0,0,7
@@ -1952,11 +1951,11 @@ aes_p8_xts_encrypt:
 .Lxts_enc:
 	lvx	4,0,10
 	addi	10,10,16
 
 	lvsl	7,0,6
-	lwz	9,240(6)
+	lwz	9,480(6)
 	srwi	9,9,1
 	subi	9,9,1
 	li	3,16
 
 	vslb	10,9,9
diff --git a/cipher/rijndael.c b/cipher/rijndael.c
index 2c9aa673..e6e53b4f 100644
--- a/cipher/rijndael.c
+++ b/cipher/rijndael.c
@@ -197,10 +197,41 @@ extern void _gcry_aes_armv8_ce_xts_crypt (void *context, unsigned char *tweak,
                                           void *outbuf_arg,
                                           const void *inbuf_arg,
                                           size_t nblocks, int encrypt);
 #endif /*USE_ARM_ASM*/
 
+#ifdef USE_PPC_ASM
+/* POWER 8 AES extensions */
+extern void aes_p8_encrypt (const unsigned char *in,
+                            unsigned char *out,
+                            const RIJNDAEL_context *ctx);
+static unsigned int _gcry_aes_ppc8_encrypt (const RIJNDAEL_context *ctx,
+                                            unsigned char *out,
+                                            const unsigned char *in)
+{
+  /* When I tried to switch these registers in the assembly it broke. */
+  aes_p8_encrypt (in, out, ctx);
+  return 0; /* does not use stack */
+}
+                                  /* this is the decryption key part of context */
+extern void aes_p8_decrypt (const unsigned char *in,
+                            unsigned char *out,
+                            const void *sboxes);
+static unsigned int _gcry_aes_ppc8_decrypt (const RIJNDAEL_context *ctx,
+                                            unsigned char *out,
+                                            const unsigned char *in)
+{
+  aes_p8_decrypt (in, out, &ctx->u2);
+  return 0; /* does not use stack */
+}
+extern int aes_p8_set_encrypt_key (const unsigned char *userKey, const int bits,
+                                   RIJNDAEL_context *key);
+extern int aes_p8_set_decrypt_key (const unsigned char *userKey, const int bits,
+                                   /* this is the decryption key part of context */
+                                   const unsigned (*)[15][4]);
+#endif /*USE_PPC_ASM*/
+
 static unsigned int do_encrypt (const RIJNDAEL_context *ctx, unsigned char *bx,
                                 const unsigned char *ax);
 static unsigned int do_decrypt (const RIJNDAEL_context *ctx, unsigned char *bx,
                                 const unsigned char *ax);
 
@@ -278,11 +309,11 @@ do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen,
   static const char *selftest_failed = 0;
   int rounds;
   int i,j, r, t, rconpointer = 0;
   int KC;
 #if defined(USE_AESNI) || defined(USE_PADLOCK) || defined(USE_SSSE3) \
-    || defined(USE_ARM_CE)
+    || defined(USE_ARM_CE) || defined(USE_PPC_ASM)
   unsigned int hwfeatures;
 #endif
 
   (void)hd;
 
@@ -322,11 +353,11 @@ do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen,
     return GPG_ERR_INV_KEYLEN;
 
   ctx->rounds = rounds;
 
 #if defined(USE_AESNI) || defined(USE_PADLOCK) || defined(USE_SSSE3) \
-    || defined(USE_ARM_CE)
+    || defined(USE_ARM_CE) || defined(USE_PPC_ASM)
   hwfeatures = _gcry_get_hw_features ();
 #endif
 
   ctx->decryption_prepared = 0;
 #ifdef USE_PADLOCK
@@ -339,10 +370,13 @@ do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen,
   ctx->use_ssse3 = 0;
 #endif
 #ifdef USE_ARM_CE
   ctx->use_arm_ce = 0;
 #endif
+#ifdef USE_PPC_ASM
+  ctx->use_ppc_asm = 0;
+#endif
 
   if (0)
     {
       ;
     }
@@ -418,10 +452,20 @@ do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen,
           hd->bulk.ocb_crypt = _gcry_aes_armv8_ce_ocb_crypt;
           hd->bulk.ocb_auth = _gcry_aes_armv8_ce_ocb_auth;
           hd->bulk.xts_crypt = _gcry_aes_armv8_ce_xts_crypt;
         }
     }
+#endif
+#ifdef USE_PPC_ASM
+  else if (hwfeatures & HWF_PPC_VCRYPTO)
+    {
+      ctx->encrypt_fn = _gcry_aes_ppc8_encrypt;
+      ctx->decrypt_fn = _gcry_aes_ppc8_decrypt;
+      ctx->prefetch_enc_fn = NULL;
+      ctx->prefetch_dec_fn = NULL;
+      ctx->use_ppc_asm = 1;
+    }
 #endif
   else
     {
       ctx->encrypt_fn = do_encrypt;
       ctx->decrypt_fn = do_decrypt;
@@ -444,10 +488,19 @@ do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen,
     _gcry_aes_ssse3_do_setkey (ctx, key);
 #endif
 #ifdef USE_ARM_CE
   else if (ctx->use_arm_ce)
     _gcry_aes_armv8_ce_setkey (ctx, key);
+#endif
+#ifdef USE_PPC_ASM
+  else if (ctx->use_ppc_asm)
+    {
+      /* These are both done here to avoid having to store the key.
+       * Does not require in-memory S-boxes. */
+      aes_p8_set_encrypt_key (key, keylen * 8, ctx);
+      aes_p8_set_decrypt_key (key, keylen * 8, &ctx->keyschdec32);
+    }
 #endif
   else
     {
       const byte *sbox = ((const byte *)encT) + 1;
       union
@@ -589,10 +642,17 @@ prepare_decryption( RIJNDAEL_context *ctx )
   else if (ctx->use_padlock)
     {
       /* Padlock does not need decryption subkeys. */
     }
 #endif /*USE_PADLOCK*/
+#ifdef USE_PPC_ASM
+  else if (ctx->use_ppc_asm)
+    {
+      /* done during encryption key setup, as then we have the actual
+       * key available */
+    }
+#endif /*USE_PPC_ASM*/
   else
     {
       const byte *sbox = ((const byte *)encT) + 1;
 
       prefetch_enc();
@@ -864,11 +924,10 @@ _gcry_aes_cfb_enc (void *context, unsigned char *iv,
 
   if (burn_depth)
     _gcry_burn_stack (burn_depth + 4 * sizeof(void *));
 }
 
-
 /* Bulk encryption of complete blocks in CBC mode.  Caller needs to
    make sure that IV is aligned on an unsigned long boundary.  This
    function is only intended for the bulk encryption feature of
    cipher.c. */
 void
@@ -1148,11 +1207,11 @@ do_decrypt (const RIJNDAEL_context *ctx, unsigned char *bx,
 #elif defined(USE_ARM_ASM)
   return _gcry_aes_arm_decrypt_block(ctx->keyschdec, bx, ax, ctx->rounds,
 				     dec_tables.T);
 #else
   return do_decrypt_fn (ctx, bx, ax);
-#endif /*!USE_ARM_ASM && !USE_AMD64_ASM*/
+#endif
 }
 
 
 static inline void
 check_decryption_preparation (RIJNDAEL_context *ctx)
@@ -1586,18 +1645,25 @@ selftest_basic_128 (void)
     };
   static const unsigned char key_128[16] =
     {
       0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,
       0x08,0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f
-      /* 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, */
-      /* 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c */
     };
   static const unsigned char ciphertext_128[16] =
     {
       0x69,0xc4,0xe0,0xd8,0x6a,0x7b,0x04,0x30,
       0xd8,0xcd,0xb7,0x80,0x70,0xb4,0xc5,0x5a
     };
+
+  static const unsigned char key_test_expansion_128[16] =
+    {
+      0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
+      0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c
+    };
+
+  RIJNDAEL_context exp_ctx;
+  rijndael_setkey (&exp_ctx, key_test_expansion_128, sizeof (key_128), NULL);
 #endif
 
   /* Because gcc/ld can only align the CTX struct on 8 bytes on the
      stack, we need to allocate that context on the heap.  */
   ctx = _gcry_cipher_selftest_alloc_ctx (sizeof *ctx, &ctxmem);
@@ -1609,11 +1675,11 @@ selftest_basic_128 (void)
   if (memcmp (scratch, ciphertext_128, sizeof (ciphertext_128)))
     {
       xfree (ctxmem);
       return "AES-128 test encryption failed.";
     }
-  rijndael_decrypt (ctx, scratch, scratch);
+  rijndael_decrypt (ctx, scratch, ciphertext_128);
   xfree (ctxmem);
   if (memcmp (scratch, plaintext_128, sizeof (plaintext_128)))
     return "AES-128 test decryption failed.";
 
   return NULL;
diff --git a/configure.ac b/configure.ac
index 3ac5897b..e65ce280 100644
--- a/configure.ac
+++ b/configure.ac
@@ -679,10 +679,18 @@ AC_ARG_ENABLE(arm-crypto-support,
               AC_HELP_STRING([--disable-arm-crypto-support],
                  [Disable support for the ARMv8 Crypto Extension instructions]),
 	      armcryptosupport=$enableval,armcryptosupport=yes)
 AC_MSG_RESULT($armcryptosupport)
 
+# Implementation of the --disable-ppc-crypto-support switch.
+AC_MSG_CHECKING([whether PPC crypto support is requested])
+AC_ARG_ENABLE(ppc-crypto-support,
+              AC_HELP_STRING([--disable-ppc-crypto-support],
+                 [Disable support for the PPC crypto instructions introduced in POWER 8 (PowerISA 2.07)]),
+              ppccryptosupport=$enableval,ppccryptosupport=yes)
+AC_MSG_RESULT($ppccryptosupport)
+
 # Implementation of the --disable-O-flag-munging switch.
 AC_MSG_CHECKING([whether a -O flag munging is requested])
 AC_ARG_ENABLE([O-flag-munging],
               AC_HELP_STRING([--disable-O-flag-munging],
                  [Disable modification of the cc -O flag]),
@@ -1270,18 +1278,18 @@ if test "$mpi_cpu_arch" != "x86" ; then
    padlocksupport="n/a"
    jentsupport="n/a"
    drngsupport="n/a"
 fi
 
-if test "$mpi_cpu_arch" != "arm" ; then
-   if test "$mpi_cpu_arch" != "aarch64" ; then
-     neonsupport="n/a"
-     armcryptosupport="n/a"
-   fi
+if test "$mpi_cpu_arch" != "arm" && test "$mpi_cpu_arch" != "aarch64"; then
+   neonsupport="n/a"
+   armcryptosupport="n/a"
 fi
 
-
+if test "$mpi_cpu_arch" != "ppc"; then
+   ppccryptosupport="n/a"
+fi
 #############################################
 ####                                     ####
 #### Platform specific compiler checks.  ####
 ####                                     ####
 #############################################
@@ -2117,10 +2125,14 @@ if test x"$neonsupport" = xyes ; then
 fi
 if test x"$armcryptosupport" = xyes ; then
   AC_DEFINE(ENABLE_ARM_CRYPTO_SUPPORT,1,
             [Enable support for ARMv8 Crypto Extension instructions.])
 fi
+if test x"$ppccryptosupport" = xyes ; then
+  AC_DEFINE(ENABLE_PPC_CRYPTO_SUPPORT,1,
+            [Enable support for POWER 8 (PowerISA 2.07) crypto extension.])
+fi
 if test x"$jentsupport" = xyes ; then
   AC_DEFINE(ENABLE_JENT_SUPPORT, 1,
             [Enable support for the jitter entropy collector.])
 fi
 if test x"$padlocksupport" = xyes ; then
@@ -2224,10 +2236,24 @@ if test "$found" = "1" ; then
 
          # Build with the ARMv8/AArch64 CE implementation
          GCRYPT_CIPHERS="$GCRYPT_CIPHERS rijndael-armv8-ce.lo"
          GCRYPT_CIPHERS="$GCRYPT_CIPHERS rijndael-armv8-aarch64-ce.lo"
       ;;
+      powerpc64le-*-*)
+         # Build with the crypto extension implementation
+         GCRYPT_CIPHERS="$GCRYPT_CIPHERS rijndael-ppc8.lo"
+      ;;
+      powerpc64-*-*)
+         # Big-Endian.
+         # Build with the crypto extension implementation
+         GCRYPT_CIPHERS="$GCRYPT_CIPHERS rijndael-ppc8be.lo"
+      ;;
+      powerpc-*-*)
+         # Big-Endian.
+         # Build with the crypto extension implementation
+         GCRYPT_CIPHERS="$GCRYPT_CIPHERS rijndael-ppc832.lo"
+      ;;
    esac
 
    case "$mpi_cpu_arch" in
      x86)
          # Build with the AES-NI implementation
@@ -2697,10 +2723,11 @@ case "$mpi_cpu_arch" in
      m68k)
         AC_DEFINE(HAVE_CPU_ARCH_M68K, 1,  [Defined for M68k platforms])
         ;;
      ppc)
         AC_DEFINE(HAVE_CPU_ARCH_PPC, 1,   [Defined for PPC platforms])
+        GCRYPT_HWF_MODULES="libgcrypt_la-hwf-ppc.lo"
         ;;
      arm)
         AC_DEFINE(HAVE_CPU_ARCH_ARM, 1,   [Defined for ARM platforms])
         GCRYPT_HWF_MODULES="libgcrypt_la-hwf-arm.lo"
         ;;
@@ -2798,10 +2825,11 @@ GCRY_MSG_SHOW([Try using Intel SSE4.1:   ],[$sse41support])
 GCRY_MSG_SHOW([Try using DRNG (RDRAND):  ],[$drngsupport])
 GCRY_MSG_SHOW([Try using Intel AVX:      ],[$avxsupport])
 GCRY_MSG_SHOW([Try using Intel AVX2:     ],[$avx2support])
 GCRY_MSG_SHOW([Try using ARM NEON:       ],[$neonsupport])
 GCRY_MSG_SHOW([Try using ARMv8 crypto:   ],[$armcryptosupport])
+GCRY_MSG_SHOW([Try using PPC crypto:     ],[$ppccryptosupport])
 GCRY_MSG_SHOW([],[])
 
 if test "x${gpg_config_script_warn}" != x; then
 cat <<G10EOF
         Mismatches between the target platform and the to
diff --git a/src/Makefile.am b/src/Makefile.am
index 82d6e8a0..5d347a2a 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -64,11 +64,11 @@ libgcrypt_la_SOURCES = \
 	stdmem.c stdmem.h secmem.c secmem.h \
 	mpi.h missing-string.c fips.c \
 	hmac256.c hmac256.h context.c context.h \
 	ec-context.h
 
-EXTRA_libgcrypt_la_SOURCES = hwf-x86.c hwf-arm.c
+EXTRA_libgcrypt_la_SOURCES = hwf-x86.c hwf-arm.c hwf-ppc.c
 gcrypt_hwf_modules = @GCRYPT_HWF_MODULES@
 
 
 if HAVE_W32_SYSTEM
 
diff --git a/src/g10lib.h b/src/g10lib.h
index 694c2d83..03b3967d 100644
--- a/src/g10lib.h
+++ b/src/g10lib.h
@@ -234,11 +234,12 @@ char **_gcry_strtokenize (const char *string, const char *delim);
 #define HWF_ARM_AES             (1 << 18)
 #define HWF_ARM_SHA1            (1 << 19)
 #define HWF_ARM_SHA2            (1 << 20)
 #define HWF_ARM_PMULL           (1 << 21)
 
-
+/* No problem re-using a slot from a differn't architecture */
+#define HWF_PPC_VCRYPTO       (1 << 0)
 
 gpg_err_code_t _gcry_disable_hw_feature (const char *name);
 void _gcry_detect_hw_features (void);
 unsigned int _gcry_get_hw_features (void);
 const char *_gcry_enum_hw_features (int idx, unsigned int *r_feature);
diff --git a/src/hwf-common.h b/src/hwf-common.h
index 8f156b56..76f346e9 100644
--- a/src/hwf-common.h
+++ b/src/hwf-common.h
@@ -20,8 +20,8 @@
 #ifndef HWF_COMMON_H
 #define HWF_COMMON_H
 
 unsigned int _gcry_hwf_detect_x86 (void);
 unsigned int _gcry_hwf_detect_arm (void);
-
+unsigned int _gcry_hwf_detect_ppc (void);
 
 #endif /*HWF_COMMON_H*/
diff --git a/src/hwf-ppc.c b/src/hwf-ppc.c
new file mode 100644
index 00000000..0f754e15
--- /dev/null
+++ b/src/hwf-ppc.c
@@ -0,0 +1,231 @@
+/* hwf-ppc.c - Detect hardware features - PPC part
+ * Copyright (C) 2013,2019 Jussi Kivilinna <jussi.kivilinna at iki.fi>
+ * Copyright (C) 2019 Shawn Landden <shawn at git.icu>
+ *
+ * This file is part of Libgcrypt.
+ *
+ * Libgcrypt is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as
+ * published by the Free Software Foundation; either version 2.1 of
+ * the License, or (at your option) any later version.
+ *
+ * Libgcrypt is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this program; if not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include <config.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <stdarg.h>
+#include <unistd.h>
+#include <errno.h>
+#if defined(HAVE_SYS_AUXV_H) && (defined(HAVE_GETAUXVAL) || \
+    defined(HAVE_ELF_AUX_INFO))
+#include <sys/auxv.h>
+#endif
+
+#include "g10lib.h"
+#include "hwf-common.h"
+
+#if !defined (__powerpc__) && !defined (__powerpc64__)
+# error Module build for wrong CPU.
+#endif
+
+
+#if defined(HAVE_SYS_AUXV_H) && defined(HAVE_ELF_AUX_INFO) && \
+    !defined(HAVE_GETAUXVAL) && defined(AT_HWCAP)
+#define HAVE_GETAUXVAL
+static unsigned long getauxval(unsigned long type)
+{
+  unsigned long auxval = 0;
+  int err;
+
+  /* FreeBSD provides 'elf_aux_info' function that does the same as
+   * 'getauxval' on Linux. */
+
+  err = elf_aux_info (type, &auxval, sizeof(auxval));
+  if (err)
+    {
+      errno = err;
+      auxval = 0;
+    }
+
+  return auxval;
+}
+#endif
+
+
+#undef HAS_SYS_AT_HWCAP
+#if defined(__linux__) || \
+    (defined(HAVE_SYS_AUXV_H) && defined(HAVE_GETAUXVAL))
+#define HAS_SYS_AT_HWCAP 1
+
+struct feature_map_s
+  {
+    unsigned int hwcap_flag;
+    unsigned int hwcap2_flag;
+    const char *feature_match;
+    unsigned int hwf_flag;
+  };
+
+#if defined(__powerpc__) || defined(__powerpc64__)
+
+/* Note: These macros have same values on Linux and FreeBSD. */
+#ifndef AT_HWCAP
+# define AT_HWCAP      16
+#endif
+#ifndef AT_HWCAP2
+# define AT_HWCAP2     26
+#endif
+
+#ifndef PPC_FEATURE2_VEC_CRYPTO
+# define PPC_FEATURE2_VEC_CRYPTO    0x02000000
+#endif
+
+static const struct feature_map_s ppc_features[] =
+  {
+#ifdef ENABLE_PPC_CRYPTO_SUPPORT
+    { 0, PPC_FEATURE2_VEC_CRYPTO, " crypto", HWF_PPC_VCRYPTO },
+#endif
+  };
+#endif
+
+static int
+get_hwcap(unsigned int *hwcap, unsigned int *hwcap2)
+{
+  struct { unsigned long a_type; unsigned long a_val; } auxv;
+  FILE *f;
+  int err = -1;
+  static int hwcap_initialized = 0;
+  static unsigned int stored_hwcap = 0;
+  static unsigned int stored_hwcap2 = 0;
+
+  if (hwcap_initialized)
+    {
+      *hwcap = stored_hwcap;
+      *hwcap2 = stored_hwcap2;
+      return 0;
+    }
+
+#if defined(__GLIBC__) && defined(__GNUC__)
+#if __GNUC__ >= 6
+  /* Returns 0 if glibc support doesn't exist, so we can
+   * only trust positive results. This function will need updating
+   * if we ever need more than one cpu feature.
+   */
+  if (sizeof(ppc_features)/sizeof(ppc_features[0]) == 0) {
+    if (__builtin_cpu_supports("vcrypto")) {
+      stored_hwcap = 0;
+      stored_hwcap2 = PPC_FEATURE2_VEC_CRYPTO;
+	    hwcap_initialized = 1;
+      return 0;
+    }
+  }
+#endif
+#endif
+
+#if defined(HAVE_SYS_AUXV_H) && defined(HAVE_GETAUXVAL)
+  errno = 0;
+  auxv.a_val = getauxval (AT_HWCAP);
+  if (errno == 0)
+    {
+      stored_hwcap |= auxv.a_val;
+      hwcap_initialized = 1;
+    }
+
+  if (AT_HWCAP2 >= 0)
+    {
+      errno = 0;
+      auxv.a_val = getauxval (AT_HWCAP2);
+      if (errno == 0)
+	{
+	  stored_hwcap2 |= auxv.a_val;
+	  hwcap_initialized = 1;
+	}
+    }
+
+  if (hwcap_initialized && (stored_hwcap || stored_hwcap2))
+    {
+      *hwcap = stored_hwcap;
+      *hwcap2 = stored_hwcap2;
+      return 0;
+    }
+#endif
+
+  f = fopen("/proc/self/auxv", "r");
+  if (!f)
+    {
+      *hwcap = stored_hwcap;
+      *hwcap2 = stored_hwcap2;
+      return -1;
+    }
+
+  while (fread(&auxv, sizeof(auxv), 1, f) > 0)
+    {
+      if (auxv.a_type == AT_HWCAP)
+        {
+          stored_hwcap |= auxv.a_val;
+          hwcap_initialized = 1;
+        }
+
+      if (auxv.a_type == AT_HWCAP2)
+        {
+          stored_hwcap2 |= auxv.a_val;
+          hwcap_initialized = 1;
+        }
+    }
+
+  if (hwcap_initialized)
+      err = 0;
+
+  fclose(f);
+  *hwcap = stored_hwcap;
+  *hwcap2 = stored_hwcap2;
+  return err;
+}
+
+static unsigned int
+detect_ppc_at_hwcap(void)
+{
+  unsigned int hwcap;
+  unsigned int hwcap2;
+  unsigned int features = 0;
+  unsigned int i;
+
+  if (get_hwcap(&hwcap, &hwcap2) < 0)
+      return features;
+
+  for (i = 0; i < DIM(ppc_features); i++)
+    {
+      if (hwcap & ppc_features[i].hwcap_flag)
+        features |= ppc_features[i].hwf_flag;
+
+      if (hwcap2 & ppc_features[i].hwcap2_flag)
+        features |= ppc_features[i].hwf_flag;
+    }
+
+  return features;
+}
+
+#endif
+
+unsigned int
+_gcry_hwf_detect_ppc (void)
+{
+  unsigned int ret = 0;
+  unsigned int broken_hwfs = 0;
+
+#if defined (HAS_SYS_AT_HWCAP)
+  ret |= detect_ppc_at_hwcap ();
+#endif
+
+  ret &= ~broken_hwfs;
+
+  return ret;
+}
diff --git a/src/hwfeatures.c b/src/hwfeatures.c
index e0816694..179521ab 100644
--- a/src/hwfeatures.c
+++ b/src/hwfeatures.c
@@ -40,10 +40,11 @@ static struct
 {
   unsigned int flag;
   const char *desc;
 } hwflist[] =
   {
+#if defined(HAVE_CPU_ARCH_X86)
     { HWF_PADLOCK_RNG,         "padlock-rng" },
     { HWF_PADLOCK_AES,         "padlock-aes" },
     { HWF_PADLOCK_SHA,         "padlock-sha" },
     { HWF_PADLOCK_MMUL,        "padlock-mmul"},
     { HWF_INTEL_CPU,           "intel-cpu" },
@@ -57,15 +58,19 @@ static struct
     { HWF_INTEL_AVX,           "intel-avx" },
     { HWF_INTEL_AVX2,          "intel-avx2" },
     { HWF_INTEL_FAST_VPGATHER, "intel-fast-vpgather" },
     { HWF_INTEL_RDTSC,         "intel-rdtsc" },
     { HWF_INTEL_SHAEXT,        "intel-shaext" },
+#elif defined(HAVE_CPU_ARCH_ARM)
     { HWF_ARM_NEON,            "arm-neon" },
     { HWF_ARM_AES,             "arm-aes" },
     { HWF_ARM_SHA1,            "arm-sha1" },
     { HWF_ARM_SHA2,            "arm-sha2" },
-    { HWF_ARM_PMULL,           "arm-pmull" }
+    { HWF_ARM_PMULL,           "arm-pmull" },
+#elif defined(HAVE_CPU_ARCH_PPC)
+    { HWF_PPC_VCRYPTO,       "ppc-crypto" },
+#endif
   };
 
 /* A bit vector with the hardware features which shall not be used.
    This variable must be set prior to any initialization.  */
 static unsigned int disabled_hw_features;
@@ -206,14 +211,16 @@ _gcry_detect_hw_features (void)
 
 #if defined (HAVE_CPU_ARCH_X86)
   {
     hw_features = _gcry_hwf_detect_x86 ();
   }
-#endif /* HAVE_CPU_ARCH_X86 */
-#if defined (HAVE_CPU_ARCH_ARM)
+#elif defined (HAVE_CPU_ARCH_ARM)
   {
     hw_features = _gcry_hwf_detect_arm ();
   }
-#endif /* HAVE_CPU_ARCH_ARM */
-
+#elif defined (HAVE_CPU_ARCH_PPC)
+  {
+    hw_features = _gcry_hwf_detect_ppc ();
+  }
+#endif
   hw_features &= ~disabled_hw_features;
 }
-- 
2.20.1




More information about the Gcrypt-devel mailing list