tech-crypto archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: VIA ACE patch



Hi Pawel,

On Fri, 12 Jan 2007, Pawel Jakub Dawidek wrote:
        http://people.freebsd.org/~pjd/patches/eng_cryptodev.c.patch

I'm not sure if this version of the patch works. The previous one which
only added AES-192-CBC and AES-256-CBC worked for sure.

Yesterday, I tested your patch with OpenSSL in NetBSD 3.1 to do some aes-256-cbc benchmarks, worked great for me. Any ideas why aes-192-cbc and aes-256-cbc are not supported by upstream cryptodev?

BTW. You can look at FreeBSD version of padlock driver. I added also
SHA1 and SHA256 handling, so it can be used by opencrypto.

That's a useful extension, unfortunately I don't have the hardware to test it at the moment.

My version also registers other hash algorithms, so it can be used with
FAST_IPSEC. If it only implement symmetric cryptography, it won't be
usable by FAST_IPSEC (or at least FreeBSD's version).

Yeah, opencrypto first tries to select the driver that supports all algorithm first. If no hardware algorithm does, cryptosoft will. So, I added all hashes that cryptosoft also supports, and used cryptosoft to handle them. I just looked at the FreeBSD padlock.c sources, and it seems to register the same hashes as my patch.

There are probably also other things to fix first. I did a lot of fixes
in the opencrypto framework to be able to use it with geli(8)'s data
authentication.

Thanks for all the useful feedback! Your OpenSSL patch was very handy to test with keys larger than 128-bits :). I'll look at FreeBSD opencrypto diffs to see if there are any bugs that we haven't fixed yet.

-- Daniel



Home | Main Index | Thread Index | Old Index