From patchwork Wed Jun 1 04:58:07 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "\(Exiting\) Baolin Wang" X-Patchwork-Id: 68959 Delivered-To: patch@linaro.org Received: by 10.140.92.199 with SMTP id b65csp2330719qge; Tue, 31 May 2016 21:59:22 -0700 (PDT) X-Received: by 10.98.61.89 with SMTP id k86mr4291563pfa.23.1464757161529; Tue, 31 May 2016 21:59:21 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n188si3836833pfn.2.2016.05.31.21.59.21; Tue, 31 May 2016 21:59:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932394AbcFAE7M (ORCPT + 30 others); Wed, 1 Jun 2016 00:59:12 -0400 Received: from mail-pf0-f169.google.com ([209.85.192.169]:32845 "EHLO mail-pf0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757305AbcFAE7I (ORCPT ); Wed, 1 Jun 2016 00:59:08 -0400 Received: by mail-pf0-f169.google.com with SMTP id b124so7209458pfb.0 for ; Tue, 31 May 2016 21:59:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :in-reply-to:references; bh=Vl90fhDP1oN/95ggGPrdiI5tmS9g+QTqmrAhR2MvBxQ=; b=LMj88xr2+RRBAkPryTTJW1CVJyfB9rkgyEfo3pkpcwmOFbhjGw30sY4sOHGLTzto6i j8NzMDdFQAOz46TVZx3NQTKHSawSSirrFOrfcYwl8c23WUuUdCssFSFAFV7NvNl19OH/ LV+BURRKoofe8SctiPYKjPwajmzXA6O1Wcm2Q= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:in-reply-to:references; bh=Vl90fhDP1oN/95ggGPrdiI5tmS9g+QTqmrAhR2MvBxQ=; b=NVGcxiWRxDD6H+1N5QJ4p3pDHBSbxx5b9FzMNh+eWbTowIsIsyL5WdiviiAvdSEQiM uhIotUINM7OoPNtcIJkQG8IIKoFPtEiD7RpWPs5zwrrB5uY1dZOjEFMfRsxWOtMi1bf9 qN6y0KRYok5gh9OVdru0pnXQZm8+HXhgCxOR5NB3YPC33wJ30vNY3sBQgKVS9fCNon/S s1t3VeNvpNWa8yu8RDu3NkWiNTnEqkOmosj4XKRGEUC1nzMFH1Y4qVzf7RS7+UvBHp+f EyY/RENAOlsJVgCWMluGy2FXxf83ORZP3/SuaTfBlNFPrpxiI8RkqaRHFc3FBpw+tzZR kd3Q== X-Gm-Message-State: ALyK8tKZFtq2I5uAEj21e7hLaAZFzj/zUd40jflrtcGYEbIZU+sMB24nZNhvOdDlW7qUMsyr X-Received: by 10.98.5.196 with SMTP id 187mr4265809pff.133.1464757147520; Tue, 31 May 2016 21:59:07 -0700 (PDT) Received: from baolinwangubtpc.spreadtrum.com ([175.111.195.49]) by smtp.gmail.com with ESMTPSA id d71sm42764420pfd.80.2016.05.31.21.59.00 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 31 May 2016 21:59:07 -0700 (PDT) From: Baolin Wang To: axboe@kernel.dk, agk@redhat.com, snitzer@redhat.com, dm-devel@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net Cc: ebiggers3@gmail.com, js1304@gmail.com, tadeusz.struk@intel.com, smueller@chronox.de, standby24x7@gmail.com, shli@kernel.org, dan.j.williams@intel.com, martin.petersen@oracle.com, sagig@mellanox.com, kent.overstreet@gmail.com, keith.busch@intel.com, tj@kernel.org, ming.lei@canonical.com, broonie@kernel.org, arnd@arndb.de, linux-crypto@vger.kernel.org, linux-block@vger.kernel.org, linux-raid@vger.kernel.org, linux-kernel@vger.kernel.org, baolin.wang@linaro.org Subject: [RFC v3 4/4] crypto: Add the CRYPTO_ALG_BULK flag for ecb(aes) cipher Date: Wed, 1 Jun 2016 12:58:07 +0800 Message-Id: <957907cb21cf096815c1defc4c95d88471eba1b2.1464756501.git.baolin.wang@linaro.org> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since the ecb(aes) cipher does not need to handle the IV things for encryption or decryption, that means it can support for bulk block when handling data. Thus this patch adds the CRYPTO_ALG_BULK flag for ecb(aes) cipher to improve the hardware aes engine's efficiency. Signed-off-by: Baolin Wang --- drivers/crypto/omap-aes.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- 1.7.9.5 diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c index ce174d3..ab09429 100644 --- a/drivers/crypto/omap-aes.c +++ b/drivers/crypto/omap-aes.c @@ -804,7 +804,7 @@ static struct crypto_alg algs_ecb_cbc[] = { .cra_priority = 300, .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_KERN_DRIVER_ONLY | - CRYPTO_ALG_ASYNC, + CRYPTO_ALG_ASYNC | CRYPTO_ALG_BULK, .cra_blocksize = AES_BLOCK_SIZE, .cra_ctxsize = sizeof(struct omap_aes_ctx), .cra_alignmask = 0,