Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752823AbbKXLvB (ORCPT ); Tue, 24 Nov 2015 06:51:01 -0500 Received: from userp1040.oracle.com ([156.151.31.81]:31781 "EHLO userp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752093AbbKXLu7 (ORCPT ); Tue, 24 Nov 2015 06:50:59 -0500 Date: Tue, 24 Nov 2015 06:50:40 -0500 From: Sowmini Varadhan To: Hannes Frederic Sowa Cc: Stephan Mueller , Herbert Xu , Tom Herbert , netdev@vger.kernel.org, davem@davemloft.net, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@fb.com Subject: Re: [RFC PATCH 2/2] Crypto kernel tls socket Message-ID: <20151124115040.GK30089@oracle.com> References: <20151124103455.GB623@gondor.apana.org.au> <9662204.R2y95MbYda@tauon.atsec.com> <871tbfhcf3.fsf@stressinduktion.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <871tbfhcf3.fsf@stressinduktion.org> User-Agent: Mutt/1.5.21 (2010-09-15) X-Source-IP: userv0022.oracle.com [156.151.31.74] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 789 Lines: 20 On (11/24/15 12:20), Hannes Frederic Sowa wrote: > There are some crypto acclerators out there so that putting tls into the > kernel would give a net benefit, because otherwise user space has to > copy data into the kernel for device access and back to user space until > it can finally be send out on the wire. > > Since processors provide aesni and other crypto extensions as part of > their instruction set architecture, this, of course, does not make sense > any more. BTW, that, exactly, was what happened to Solaris kssl. --Sowmini -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/