Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Sep 1997 19:12:50 +0000 (GMT)
From:      Terry Lambert <tlambert@primenet.com>
To:        Shimon@i-Connect.Net (Simon Shapiro)
Cc:        julian@whistle.com, FreeBSD-Hackers@FreeBSD.ORG
Subject:   Re: Fast Encryption (in kernel) seeked
Message-ID:  <199709171912.MAA06140@usr02.primenet.com>
In-Reply-To: <XFMail.970916010656.Shimon@i-Connect.Net> from "Simon Shapiro" at Sep 16, 97 01:06:56 am

next in thread | previous in thread | raw e-mail | index | archive | help
> >  can you guarentee that  each pointer given out will be 'returned'?
> 
> Not at all.  I can guarantee that until it is returned, the pointer will be
> dormant.
> 
> >  will it be returned only once?
> 
> Yup.
> 
> >  what if a process dies while owning a pointer?
> 
> Then eventually the pointer goes away.
> 
> >  when does the buffer become free?
> 
> very soon after the pointer comes back home.

This is what he was asking, really: is there a 1:1 correspondance between
cookies returned and cookied given out.  The answer seems to be "yes".

> I want to guarantee that the cookie the kernel requestor sleeps on is
> unique within the kernel address space and genuine.  To do so, I need to:
> 
> a.  Validate that it is genuine.

See previous posting.

> b.  Find, QUICKLY, the original bucket that holds the request; this is
>     where the request and all its atndant pieces are.

Use a hash.


					Terry Lambert
					terry@lambert.org
---
Any opinions in this posting are my own and not those of my present
or previous employers.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199709171912.MAA06140>