Lines Matching +full:4 +full:- +full:way
1 .\" $NetBSD: crypto.4,v 1.24 2014/01/27 21:23:59 pgoyette Exp $
4 .\" Copyright (c) 2014-2021 The FreeBSD Foundation
7 .\" Portions of this documentation were written by John-Mark Gurney
35 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
61 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
70 .Nd user-mode access to hardware-accelerated cryptography
81 driver gives user-mode applications access to hardware-accelerated
84 in-kernel interface.
91 User-mode applications open the special device and
95 User-mode access to
102 then user-mode sessions are only permitted to use cryptography coprocessors.
105 .Bl -enum
133 .Sh SYMMETRIC-KEY OPERATION
135 provides a context-based API
136 to traditional symmetric-key encryption (or privacy) algorithms,
137 keyed and unkeyed one-way hash (HMAC and MAC) algorithms,
138 encrypt-then-authenticate (ETA) fused operations,
141 drivers perform both a privacy algorithm and an integrity-check
143 encrypt/HMAC-generate operation, or a fused HMAC-verify/decrypt operation.
145 drivers perform either an encrypt/MAC-generate operation
146 or a MAC-verify/decrypt operation.
150 Individual requests are able to specify per-request initialization vectors
157 .Bl -tag -width CIOCGSESSION
160 .Bd -literal
169 is -1, then find the driver named
175 is not -1, return the name of the driver with
183 .Bd -literal
209 .Fa sessp-\*[Gt]ses
219 For non-zero privacy algorithms, the privacy algorithm
221 .Fa sessp-\*[Gt]cipher ,
223 .Fa sessp-\*[Gt]keylen ,
225 .Fa sessp-\*[Gt]key .
227 For keyed one-way hash algorithms, the one-way hash must be specified
229 .Fa sessp-\*[Gt]mac ,
231 .Fa sessp-\*[Gt]mackey ,
233 .Fa sessp-\*[Gt]mackeylen .
237 integrity-check algorithms depends on whether the underlying
241 stand-alone non-fused operation.
243 .Bd -literal
263 .Fa sessp-\*[Gt]crid
267 .Fa sessp-\*[Gt]ivlen
271 .Fa sessp-\*[Gt]maclen
277 .Fa sessp-\*[Gt]pad
280 .Bd -literal
295 .Fa cr_op-\*[Gt]op
299 .Fa cr_op-\*[Gt]op
303 .Fa cr_op-\*[Gt]len
305 .Fa cr_op-\*[Gt]src ,
306 .Fa cr_op-\*[Gt]dst ,
307 .Fa cr_op-\*[Gt]mac ,
308 .Fa cr_op-\*[Gt]iv
310 one-way hash, and initialization vector, respectively.
312 If a session is using either fused encrypt-then-authenticate or
320 .Bd -literal
341 .Fa cr_aead-\*[Gt]aad
348 .Xr aesni 4 ,
349 .Xr hifn 4 ,
350 .Xr ipsec 4 ,
351 .Xr padlock 4 ,
352 .Xr safe 4 ,
368 The values specified for symmetric-key key sizes to
376 .No non- Ns Dv NULL
377 algorithm, you must supply a suitably-sized buffer.