Page MenuHomeFreeBSD

Use a counter with a random base for explicit IVs in GCM.
ClosedPublic

Authored by jhb on Oct 22 2019, 10:07 PM.
Tags
None
Referenced Files
Unknown Object (File)
Tue, Apr 7, 7:54 PM
Unknown Object (File)
Tue, Apr 7, 12:58 AM
Unknown Object (File)
Mon, Apr 6, 12:41 PM
Unknown Object (File)
Mon, Apr 6, 3:43 AM
Unknown Object (File)
Sun, Apr 5, 11:33 AM
Unknown Object (File)
Wed, Mar 18, 2:22 PM
Unknown Object (File)
Wed, Mar 18, 2:22 PM
Unknown Object (File)
Wed, Mar 18, 2:16 PM
Subscribers

Details

Summary

This permits constructing the entire TLS header in ktls_frame()
rather than ktls_seq(). This also matches the approach used by
OpenSSL which uses an incrementing nonce as the explicit IV
rather than the sequence number.

Test Plan
  • tested with ktls_ocf with both cryptosoft and ccr
  • used wireshark to verify incrementing nonces

Diff Detail

Lint
Lint Passed
Unit
No Test Coverage
Build Status
Buildable 27160
Build 25432: arc lint + arc unit

Event Timeline

Would you be able to test this with the current ISA-L module (and verify it works ok on your end)?

Works fine running on a Netflix cache.

This revision is now accepted and ready to land.Oct 23 2019, 11:08 PM