Hi, On Tue, Nov 24, 2015 at 12:20:00PM +0100, Hannes Frederic Sowa wrote: > Stephan Mueller <smueller@xxxxxxxxxx> writes: > > > Am Dienstag, 24. November 2015, 18:34:55 schrieb Herbert Xu: > > > > Hi Herbert, > > > >>On Mon, Nov 23, 2015 at 09:43:02AM -0800, Dave Watson wrote: > >>> Userspace crypto interface for TLS. Currently supports gcm(aes) 128bit > >>> only, however the interface is the same as the rest of the SOCK_ALG > >>> interface, so it should be possible to add more without any user interface > >>> changes. > >> > >>SOCK_ALG exists to export crypto algorithms to user-space. So if > >>we decided to support TLS as an algorithm then I guess this makes > >>sense. > >> > >>However, I must say that it wouldn't have been my first pick. I'd > >>imagine a TLS socket to look more like a TCP socket, or perhaps a > >>KCM socket as proposed by Tom. > > > > If I may ask: what is the benefit of having TLS in kernel space? I do not see > > any reason why higher-level protocols should be in the kernel as they do not > > relate to accessing hardware. > > There are some crypto acclerators out there so that putting tls into the > kernel would give a net benefit, because otherwise user space has to > copy data into the kernel for device access and back to user space until > it can finally be send out on the wire. > > Since processors provide aesni and other crypto extensions as part of > their instruction set architecture, this, of course, does not make sense > any more. There "still" are dedicated crypto engines out there which need a driver to be accessed, so using them from userspace is not as simple as with padlock or AESNI. This was the reasoning behind the various cryptodev implementations and af_alg. Using those to establish a TLS connection with OpenSSL means to fetch encrypted data to userspace first and then feed it to the kernel again for decryption. Using cryptodev-linux, this will be zero-copy, but still there's an additional context switch involved which the approach here avoids. Cheers, Phil -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html