Searched hist:"9 b774dc0c586235e3f742dd487fd79e9fa90eedb" (Results 1 – 6 of 6) sorted by relevance
/freebsd/share/man/man9/ |
H A D | crypto_session.9 | diff 9b774dc0c586235e3f742dd487fd79e9fa90eedb Tue Jun 23 01:20:43 CEST 2020 John Baldwin <jhb@FreeBSD.org> Add support to the crypto framework for separate AAD buffers.
This permits requests to provide the AAD in a separate side buffer instead of as a region in the crypto request input buffer. This is useful when the main data buffer might not contain the full AAD (e.g. for TLS or IPsec with ESN).
Unlike separate IVs which are constrained in size and stored in an array in struct cryptop, separate AAD is provided by the caller setting a new crp_aad pointer to the buffer. The caller must ensure the pointer remains valid and the buffer contents static until the request is completed (e.g. when the callback routine is invoked).
As with separate output buffers, not all drivers support this feature. Consumers must request use of this feature via a new session flag.
To aid in driver testing, kern.crypto.cryptodev_separate_aad can be set to force /dev/crypto requests to use a separate AAD buffer.
Discussed with: cem Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D25288
|
H A D | crypto_request.9 | diff 9b774dc0c586235e3f742dd487fd79e9fa90eedb Tue Jun 23 01:20:43 CEST 2020 John Baldwin <jhb@FreeBSD.org> Add support to the crypto framework for separate AAD buffers.
This permits requests to provide the AAD in a separate side buffer instead of as a region in the crypto request input buffer. This is useful when the main data buffer might not contain the full AAD (e.g. for TLS or IPsec with ESN).
Unlike separate IVs which are constrained in size and stored in an array in struct cryptop, separate AAD is provided by the caller setting a new crp_aad pointer to the buffer. The caller must ensure the pointer remains valid and the buffer contents static until the request is completed (e.g. when the callback routine is invoked).
As with separate output buffers, not all drivers support this feature. Consumers must request use of this feature via a new session flag.
To aid in driver testing, kern.crypto.cryptodev_separate_aad can be set to force /dev/crypto requests to use a separate AAD buffer.
Discussed with: cem Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D25288
|
/freebsd/sys/opencrypto/ |
H A D | cryptodev.h | diff 9b774dc0c586235e3f742dd487fd79e9fa90eedb Tue Jun 23 01:20:43 CEST 2020 John Baldwin <jhb@FreeBSD.org> Add support to the crypto framework for separate AAD buffers.
This permits requests to provide the AAD in a separate side buffer instead of as a region in the crypto request input buffer. This is useful when the main data buffer might not contain the full AAD (e.g. for TLS or IPsec with ESN).
Unlike separate IVs which are constrained in size and stored in an array in struct cryptop, separate AAD is provided by the caller setting a new crp_aad pointer to the buffer. The caller must ensure the pointer remains valid and the buffer contents static until the request is completed (e.g. when the callback routine is invoked).
As with separate output buffers, not all drivers support this feature. Consumers must request use of this feature via a new session flag.
To aid in driver testing, kern.crypto.cryptodev_separate_aad can be set to force /dev/crypto requests to use a separate AAD buffer.
Discussed with: cem Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D25288
|
H A D | cryptosoft.c | diff 9b774dc0c586235e3f742dd487fd79e9fa90eedb Tue Jun 23 01:20:43 CEST 2020 John Baldwin <jhb@FreeBSD.org> Add support to the crypto framework for separate AAD buffers.
This permits requests to provide the AAD in a separate side buffer instead of as a region in the crypto request input buffer. This is useful when the main data buffer might not contain the full AAD (e.g. for TLS or IPsec with ESN).
Unlike separate IVs which are constrained in size and stored in an array in struct cryptop, separate AAD is provided by the caller setting a new crp_aad pointer to the buffer. The caller must ensure the pointer remains valid and the buffer contents static until the request is completed (e.g. when the callback routine is invoked).
As with separate output buffers, not all drivers support this feature. Consumers must request use of this feature via a new session flag.
To aid in driver testing, kern.crypto.cryptodev_separate_aad can be set to force /dev/crypto requests to use a separate AAD buffer.
Discussed with: cem Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D25288
|
H A D | crypto.c | diff 9b774dc0c586235e3f742dd487fd79e9fa90eedb Tue Jun 23 01:20:43 CEST 2020 John Baldwin <jhb@FreeBSD.org> Add support to the crypto framework for separate AAD buffers.
This permits requests to provide the AAD in a separate side buffer instead of as a region in the crypto request input buffer. This is useful when the main data buffer might not contain the full AAD (e.g. for TLS or IPsec with ESN).
Unlike separate IVs which are constrained in size and stored in an array in struct cryptop, separate AAD is provided by the caller setting a new crp_aad pointer to the buffer. The caller must ensure the pointer remains valid and the buffer contents static until the request is completed (e.g. when the callback routine is invoked).
As with separate output buffers, not all drivers support this feature. Consumers must request use of this feature via a new session flag.
To aid in driver testing, kern.crypto.cryptodev_separate_aad can be set to force /dev/crypto requests to use a separate AAD buffer.
Discussed with: cem Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D25288
|
H A D | cryptodev.c | diff 9b774dc0c586235e3f742dd487fd79e9fa90eedb Tue Jun 23 01:20:43 CEST 2020 John Baldwin <jhb@FreeBSD.org> Add support to the crypto framework for separate AAD buffers.
This permits requests to provide the AAD in a separate side buffer instead of as a region in the crypto request input buffer. This is useful when the main data buffer might not contain the full AAD (e.g. for TLS or IPsec with ESN).
Unlike separate IVs which are constrained in size and stored in an array in struct cryptop, separate AAD is provided by the caller setting a new crp_aad pointer to the buffer. The caller must ensure the pointer remains valid and the buffer contents static until the request is completed (e.g. when the callback routine is invoked).
As with separate output buffers, not all drivers support this feature. Consumers must request use of this feature via a new session flag.
To aid in driver testing, kern.crypto.cryptodev_separate_aad can be set to force /dev/crypto requests to use a separate AAD buffer.
Discussed with: cem Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D25288
|