On Mon, 2014-08-11 at 10:09 +0300, Cristian Stoica wrote:

> >> I've tested this patch with AES-CBC-HMAC-SHA1 using the tls module that
> >> I've sent recently on Linux mailing list. That module needs rework for
> >> Lucky 13 and is a software alternative to the caam driver that does the
> >> same thing in hardware.
> >> http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg11665.html
> > 
> > Is that supposed to be used with COP_FLAG_AEAD_TLS_TYPE? I believe I had
> > added that flag to do exactly the same thing. The implementation is
> > pretty old though, and should have the same issue with the cbc padding
> > attacks.
> 
> Yes, that kernel patch is used with COP_FLAG_AEAD_TLS_TYPE but there is
> a difference from the cryptodev implementation (which I used for
> inspiration) in that it registers an algorithm to do the same work. The
> reason is that our HW supports AES-CBC-HMAC-SHA1 as a primitive
> operation and needs that tls(...) algorithm to advertise the capability.

That makes sense. What I realized after introducing this API, is when
speeding that part, the bottleneck becomes the context switches in
read()->decrypt() (and encrypt->write). An API that would combine these
operations would have provided a significant boost.

regards,
Nikos



_______________________________________________
Cryptodev-linux-devel mailing list
Cryptodev-linux-devel@gna.org
https://mail.gna.org/listinfo/cryptodev-linux-devel

Reply via email to