crypto_request.9 (c03414326909ed7a740be3ba63fbbef01fe513a8) crypto_request.9 (29fe41ddd714bae92a09fd4098fad614945bedf5)
1.\" Copyright (c) 2020, Chelsio Inc
2.\"
3.\" Redistribution and use in source and binary forms, with or without
4.\" modification, are permitted provided that the following conditions are met:
5.\"
6.\" 1. Redistributions of source code must retain the above copyright notice,
7.\" this list of conditions and the following disclaimer.
8.\"

--- 16 unchanged lines hidden (view full) ---

25.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
26.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27.\" POSSIBILITY OF SUCH DAMAGE.
28.\"
29.\" * Other names and brands may be claimed as the property of others.
30.\"
31.\" $FreeBSD$
32.\"
1.\" Copyright (c) 2020, Chelsio Inc
2.\"
3.\" Redistribution and use in source and binary forms, with or without
4.\" modification, are permitted provided that the following conditions are met:
5.\"
6.\" 1. Redistributions of source code must retain the above copyright notice,
7.\" this list of conditions and the following disclaimer.
8.\"

--- 16 unchanged lines hidden (view full) ---

25.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
26.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27.\" POSSIBILITY OF SUCH DAMAGE.
28.\"
29.\" * Other names and brands may be claimed as the property of others.
30.\"
31.\" $FreeBSD$
32.\"
33.Dd March 27, 2020
33.Dd April 20, 2020
34.Dt CRYPTO_REQUEST 9
35.Os
36.Sh NAME
37.Nm crypto_request
38.Nd symmetric cryptographic operations
39.Sh SYNOPSIS
40.In opencrypto/cryptodev.h
41.Ft int

--- 179 unchanged lines hidden (view full) ---

221.Fa crp_iv ,
222.Dv CRYPTO_F_IV_SEPARATE
223should be set in
224.Fa crp_flags
225and
226.Fa crp_digest_start
227should be left as zero.
228.Pp
34.Dt CRYPTO_REQUEST 9
35.Os
36.Sh NAME
37.Nm crypto_request
38.Nd symmetric cryptographic operations
39.Sh SYNOPSIS
40.In opencrypto/cryptodev.h
41.Ft int

--- 179 unchanged lines hidden (view full) ---

221.Fa crp_iv ,
222.Dv CRYPTO_F_IV_SEPARATE
223should be set in
224.Fa crp_flags
225and
226.Fa crp_digest_start
227should be left as zero.
228.Pp
229An encryption request using an IV stored in the IV region may set
230.Dv CRYPTO_F_IV_GENERATE
231in
232.Fa crp_flags
233to request that the driver generate a random IV.
234Note that
235.Dv CRYPTO_F_IV_GENERATE
236cannot be used with decryption operations or in combination with
237.Dv CRYPTO_F_IV_SEPARATE .
238.Pp
239Requests that store part, but not all, of the IV in the data buffer should
240store the partial IV in the data buffer and pass the full IV separately in
241.Fa crp_iv .
242.Ss Request and Callback Scheduling
243The crypto framework provides multiple methods of scheduling the dispatch
244of requests to drivers along with the processing of driver callbacks.
245Requests use flags in
246.Fa crp_flags

--- 173 unchanged lines hidden ---
229Requests that store part, but not all, of the IV in the data buffer should
230store the partial IV in the data buffer and pass the full IV separately in
231.Fa crp_iv .
232.Ss Request and Callback Scheduling
233The crypto framework provides multiple methods of scheduling the dispatch
234of requests to drivers along with the processing of driver callbacks.
235Requests use flags in
236.Fa crp_flags

--- 173 unchanged lines hidden ---