Am 26.11.20 um 01:46 schrieb Tony He:
>>OpenSSL directly talks to the crypto engine via a proprietary interface
>>that the FW/driver exposes to userspace. The *data* flow does not cross
>>the linux kernel crypto API
> 
> No, OpenSSL doesn't directly talk to the  crypto engine via a
> proprietary interface that the FW/driver exposes to userspace.
> "cryptodev engine" is NOT the "HW engine" chip vendor provides. It's a
> common interface and its source is not from


To be honest. We currently aim to feature current state of the art
support. And with supporting only the AEAD algorithm we support all
clients of 2.4 and later.

Since the original thread was not on the mailing list I am missing your
goal but if your crypto acelator already works with OpenSSL, then it
will also work with the "normal" OpenVPN.

If you look over the fence at IPSec accleration in Intel NIC hardware,
you will find that those also only support AES-GCM. And that with even
hardware that came out almost 10 years ago.

Or look at TLS 1.3. De facto there is only AES-GCM and Chacha20-Poly1305
left as standard. TLS1_3_RFC_AES_128_CCM_8_SHA256 is specified but you
need to specifically configure your TLS library to support this. This
inclusion of AES-CCM is specifically to cater for use use cases like yours.

Since AES-CCM is an AEAD cipher supporting that makes more sense and
might very straightforword if it is supported by the AEAD APIs we
already use.

Arne


_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to