svn commit: r345040 - in stable/11: share/man/man4 sys/conf sys/dev/cxgbe sys/dev/cxgbe/crypto sys/dev/cxgbe/firmware sys/modules/cxgbe sys/modules/cxgbe/ccr sys/powerpc/conf
John Baldwin
jhb at FreeBSD.org
Tue Mar 12 15:46:39 UTC 2019
On 3/12/19 6:32 AM, Slawa Olhovchenkov wrote:
> On Mon, Mar 11, 2019 at 11:16:10PM +0000, John Baldwin wrote:
>
>> Author: jhb
>> Date: Mon Mar 11 23:16:10 2019
>> New Revision: 345040
>> URL: https://svnweb.freebsd.org/changeset/base/345040
>>
>> Log:
>> MFC 318429,318967,319721,319723,323600,323724,328353-328361,330042,343056:
>> Add a driver for the Chelsio T6 crypto accelerator engine.
>
> Where I can find example/manual of use this engine from userspace?
It's hard to use usefully from userspace (even in 12/head). I have some
old patches for openssl 1.0.2's cryptodev engine to teach it about more
of the algorithms supported by OCF including the TLS variant of AES-GCM,
but I found that the overhead of the extra copies made it not very
compelling compared to using AES-NI in userland. (I had some extra
changes to make /dev/crypto wire the user pages to avoid the copies
and that got the /dev/crypto case down to break-even with doing AES-NI
in userland.) In the kernel I see better performance where using T6
to offload crypto for IPsec does use less CPU at higher throughput than
using CPU instructions though for AES-GCM AES-NI on the CPU is pretty
close.
--
John Baldwin
More information about the svn-src-stable-11
mailing list