ff2038a9bf
Right now, aesni_cipher_alloc does a bit of special-casing for CRYPTO_F_IOV, to not do any allocation if the first uio is large enough for the requested size. While working on ZFS crypto port, I ran into horrible performance because the code uses scatter-gather, and many of the times the data to encrypt was in the second entry. This code looks through the list, and tries to see if there is a single uio that can contain the requested data, and, if so, uses that. This has a slight impact on the current consumers, in that the check is a little more complicated for the ones that use CRYPTO_F_IOV -- but none of them meet the criteria for testing more than one. Submitted by: sef at ixsystems.com Reviewed by: cem@ MFC after: 3 days Sponsored by: iX Systems Differential Revision: https://reviews.freebsd.org/D18522 |
||
---|---|---|
.. | ||
aesencdec.h | ||
aeskeys_amd64.S | ||
aeskeys_i386.S | ||
aesni_ghash.c | ||
aesni_os.h | ||
aesni_wrap.c | ||
aesni.c | ||
aesni.h | ||
intel_sha1.c | ||
intel_sha256.c | ||
sha_sse.h |