Date: Wed, 17 Sep 1997 19:12:50 +0000 (GMT) From: Terry Lambert <tlambert@primenet.com> To: Shimon@i-Connect.Net (Simon Shapiro) Cc: julian@whistle.com, FreeBSD-Hackers@FreeBSD.ORG Subject: Re: Fast Encryption (in kernel) seeked Message-ID: <199709171912.MAA06140@usr02.primenet.com> In-Reply-To: <XFMail.970916010656.Shimon@i-Connect.Net> from "Simon Shapiro" at Sep 16, 97 01:06:56 am
next in thread | previous in thread | raw e-mail | index | archive | help
> > can you guarentee that each pointer given out will be 'returned'? > > Not at all. I can guarantee that until it is returned, the pointer will be > dormant. > > > will it be returned only once? > > Yup. > > > what if a process dies while owning a pointer? > > Then eventually the pointer goes away. > > > when does the buffer become free? > > very soon after the pointer comes back home. This is what he was asking, really: is there a 1:1 correspondance between cookies returned and cookied given out. The answer seems to be "yes". > I want to guarantee that the cookie the kernel requestor sleeps on is > unique within the kernel address space and genuine. To do so, I need to: > > a. Validate that it is genuine. See previous posting. > b. Find, QUICKLY, the original bucket that holds the request; this is > where the request and all its atndant pieces are. Use a hash. Terry Lambert terry@lambert.org --- Any opinions in this posting are my own and not those of my present or previous employers.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199709171912.MAA06140>