From owner-freebsd-arch@freebsd.org Tue Nov 26 16:55:22 2019 Return-Path: Delivered-To: freebsd-arch@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 173691BB94C for ; Tue, 26 Nov 2019 16:55:22 +0000 (UTC) (envelope-from kaduk@mit.edu) Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 47MqlX3yNhz427Z; Tue, 26 Nov 2019 16:55:19 +0000 (UTC) (envelope-from kaduk@mit.edu) Received: from mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id xAQGtFYM031616 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 26 Nov 2019 11:55:18 -0500 Date: Tue, 26 Nov 2019 08:55:14 -0800 From: Benjamin Kaduk To: John Baldwin Cc: "freebsd-arch@freebsd.org" Subject: Re: CFT: Open Crypto Framework Changes: Round 1 Message-ID: <20191126165514.GX32847@mit.edu> References: <921919dd-6291-61af-2dc6-768bcdbd5cff@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <921919dd-6291-61af-2dc6-768bcdbd5cff@FreeBSD.org> User-Agent: Mutt/1.12.1 (2019-06-15) X-Rspamd-Queue-Id: 47MqlX3yNhz427Z X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of kaduk@mit.edu designates 18.9.28.11 as permitted sender) smtp.mailfrom=kaduk@mit.edu X-Spamd-Result: default: False [-5.36 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:18.9.28.0/24]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[mit.edu]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE(-2.86)[ip: (-9.59), ipnet: 18.9.0.0/16(-4.66), asn: 3(0.01), country: US(-0.05)]; RCVD_IN_DNSWL_MED(-0.20)[11.28.9.18.list.dnswl.org : 127.0.11.2]; RCPT_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:3, ipnet:18.9.0.0/16, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-arch@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion related to FreeBSD architecture List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Nov 2019 16:55:22 -0000 On Thu, Nov 21, 2019 at 11:40:48AM -0800, John Baldwin wrote: > > Some of these drivers had some dubious behavior (e.g. trying to carry > over IVs across requests within a session), though they may have worked > for at least some IPsec use cases before. I have a sneaking suspicion that this behavior (while dubious) is enshrined in some protocol/cipher specifications. I will try to ask around and find examples... -Ben