xref: /netbsd-src/share/man/man9/opencrypto.9 (revision 627f7eb200a4419d89b531d55fccd2ee3ffdcde0)
1.\"	$OpenBSD: crypto.9,v 1.25 2003/07/11 13:47:41 jmc Exp $
2.\"	$NetBSD: opencrypto.9,v 1.17 2017/07/03 21:28:48 wiz Exp $
3.\"
4.\" The author of this man page is Angelos D. Keromytis (angelos@cis.upenn.edu)
5.\"
6.\" Copyright (c) 2000, 2001 Angelos D. Keromytis
7.\"
8.\" Permission to use, copy, and modify this software with or without fee
9.\" is hereby granted, provided that this entire notice is included in
10.\" all source code copies of any software which is or includes a copy or
11.\" modification of this software.
12.\"
13.\" THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
14.\" IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
15.\" REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
16.\" MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
17.\" PURPOSE.
18.\"
19.Dd May 26, 2017
20.Dt OPENCRYPTO 9
21.Os
22.Sh NAME
23.Nm opencrypto ,
24.Nm crypto_get_driverid ,
25.Nm crypto_register ,
26.Nm crypto_kregister ,
27.Nm crypto_unregister ,
28.Nm crypto_unregister_all ,
29.Nm crypto_done ,
30.Nm crypto_kdone ,
31.Nm crypto_newsession ,
32.Nm crypto_freesession ,
33.Nm crypto_dispatch ,
34.Nm crypto_kdispatch ,
35.Nm crypto_getreq ,
36.Nm crypto_freereq
37.Nm crypto_kgetreq ,
38.Nm crypto_kfreereq
39.Nd API for cryptographic services in the kernel
40.Sh SYNOPSIS
41.In opencrypto/cryptodev.h
42.Ft int32_t
43.Fn crypto_get_driverid "u_int32_t"
44.Ft int
45.Fn crypto_register "u_int32_t" "int" "u_int16_t" "u_int32_t" "int (*)(void *, u_int32_t *, struct cryptoini *)" "int (*)(void *, u_int32_t *)" "int (*)(u_int64_t)" "int (*)(struct cryptop *)" "void *"
46.Ft int
47.Fn crypto_kregister "u_int32_t" "int" "u_int32_t" "int (*)(void *, struct cryptkop *, int)" "void *"
48.Ft int
49.Fn crypto_unregister "u_int32_t" "int"
50.Ft int
51.Fn crypto_unregister_all "u_int32_t"
52.Ft void
53.Fn crypto_done "struct cryptop *"
54.Ft void
55.Fn crypto_kdone "struct cryptkop *"
56.Ft int
57.Fn crypto_newsession "u_int64_t *" "struct cryptoini *" "int"
58.Ft int
59.Fn crypto_freesession "u_int64_t"
60.Ft int
61.Fn crypto_dispatch "struct cryptop *"
62.Ft int
63.Fn crypto_kdispatch "struct cryptkop *"
64.Ft struct cryptop *
65.Fn crypto_getreq "int"
66.Ft void
67.Fn crypto_freereq "struct cryptop *"
68.Ft struct cryptop *
69.Fn crypto_kgetreq "int" "int"
70.Ft void
71.Fn crypto_kfreereq "struct cryptop *"
72.Bd -literal
73
74#define EALG_MAX_BLOCK_LEN      16
75
76struct cryptoini {
77	int                cri_alg;
78	int                cri_klen;
79	int                cri_rnd;
80	void            *cri_key;
81	u_int8_t           cri_iv[EALG_MAX_BLOCK_LEN];
82	struct cryptoini  *cri_next;
83};
84
85struct cryptodesc {
86	int                crd_skip;
87	int                crd_len;
88	int                crd_inject;
89	int                crd_flags;
90	struct cryptoini   CRD_INI;
91	struct cryptodesc *crd_next;
92};
93
94struct cryptop {
95	TAILQ_ENTRY(cryptop) crp_next;
96	u_int64_t          crp_sid;
97	int                crp_ilen;
98	int                crp_olen;
99	int                crp_etype;
100	int                crp_flags;
101	void            *crp_buf;
102	void            *crp_opaque;
103	struct cryptodesc *crp_desc;
104	int              (*crp_callback)(struct cryptop *);
105	void            *crp_mac;
106};
107
108struct crparam {
109        void         *crp_p;
110        u_int           crp_nbits;
111};
112
113#define CRK_MAXPARAM    8
114
115struct cryptkop {
116	TAILQ_ENTRY(cryptkop) krp_next;
117        u_int              krp_op;         /* i.e. CRK_MOD_EXP or other */
118        u_int              krp_status;     /* return status */
119        u_short            krp_iparams;    /* # of input parameters */
120        u_short            krp_oparams;    /* # of output parameters */
121	u_int32_t	   krp_hid;
122        struct crparam     krp_param[CRK_MAXPARAM];	  /* kvm */
123        int               (*krp_callback)(struct cryptkop *);
124};
125.Ed
126.Sh DESCRIPTION
127.Nm
128is a framework for drivers of cryptographic hardware to register with
129the kernel so
130.Dq consumers
131(other kernel subsystems, and eventually
132users through an appropriate device) are able to make use of it.
133Drivers register with the framework the algorithms they support,
134and provide entry points (functions) the framework may call to
135establish, use, and tear down sessions.
136Sessions are used to cache cryptographic information in a particular driver
137(or associated hardware), so initialization is not needed with every request.
138Consumers of cryptographic services pass a set of
139descriptors that instruct the framework (and the drivers registered
140with it) of the operations that should be applied on the data (more
141than one cryptographic operation can be requested).
142.Pp
143Keying operations are supported as well.
144Unlike the symmetric operators described above,
145these sessionless commands perform mathematical operations using
146input and output parameters.
147.Pp
148Since the consumers may not be associated with a process, drivers may
149not use condition variables:
150.Xr condvar 9 .
151The same holds for the framework.
152Thus, a callback mechanism is used
153to notify a consumer that a request has been completed (the
154callback is specified by the consumer on an per-request basis).
155The callback is invoked by the framework whether the request was
156successfully completed or not.
157An error indication is provided in the latter case.
158A specific error code,
159.Er EAGAIN ,
160is used to indicate that a session number has changed and that the
161request may be re-submitted immediately with the new session number.
162Errors are only returned to the invoking function if not
163enough information to call the callback is available (meaning, there
164was a fatal error in verifying the arguments).
165No callback mechanism is used for session initialization and teardown.
166.Pp
167The
168.Fn crypto_newsession
169routine is called by consumers of cryptographic services (such as the
170.Xr ipsec 4
171stack) that wish to establish a new session with the framework.
172On success, the first argument will contain the Session Identifier (SID).
173The second argument contains all the necessary information for
174the driver to establish the session.
175The third argument indicates whether a
176hardware driver should be used (1) or not (0).
177The various fields in the
178.Fa cryptoini
179structure are:
180.Bl -tag -width foobarmoocow
181.It Fa cri_alg
182Contains an algorithm identifier.
183Currently supported algorithms are:
184.Bd -literal
185CRYPTO_DES_CBC
186CRYPTO_3DES_CBC
187CRYPTO_BLF_CBC
188CRYPTO_CAST_CBC
189CRYPTO_CAMELLIA_CBC
190CRYPTO_SKIPJACK_CBC
191CRYPTO_ARC4
192CRYPTO_AES_CBC
193CRYPTO_AES_CTR
194CRYPTO_AES_GCM_16
195CRYPTO_AES_GMAC
196CRYPTO_AES_128_GMAC
197CRYPTO_AES_192_GMAC
198CRYPTO_AES_256_GMAC
199CRYPTO_AES_XCBC_MAC_96
200CRYPTO_MD5
201CRYPTO_MD5_HMAC
202CRYPTO_MD5_HMAC_96
203CRYPTO_MD5_KPDK
204CRYPTO_NULL_CBC
205CRYPTO_NULL_HMAC
206CRYPTO_SHA1
207CRYPTO_SHA1_HMAC
208CRYPTO_SHA1_HMAC_96
209CRYPTO_SHA1_KPDK
210CRYPTO_SHA2_256_HMAC
211CRYPTO_SHA2_384_HMAC
212CRYPTO_SHA2_512_HMAC
213CRYPTO_RIPEMD160_HMAC
214CRYPTO_RIPEMD160_HMAC_96
215CRYPTO_DEFLATE_COMP
216CRYPTO_DEFLATE_COMP_NOGROW
217CRYPTO_GZIP_COMP
218.Ed
219.Pp
220.It Fa cri_klen
221Specifies the length of the key in bits, for variable-size key
222algorithms.
223.It Fa cri_rnd
224Specifies the number of rounds to be used with the algorithm, for
225variable-round algorithms.
226.It Fa cri_key
227Contains the key to be used with the algorithm.
228.It Fa cri_iv
229Contains an explicit initialization vector (IV), if it does not prefix
230the data.
231This field is ignored during initialization.
232If no IV is explicitly passed (see below on details), a random IV is used
233by the device driver processing the request.
234.It Fa cri_next
235Contains a pointer to another
236.Fa cryptoini
237structure.
238Multiple such structures may be linked to establish multi-algorithm sessions
239.Pf ( Xr ipsec 4
240is an example consumer of such a feature).
241.El
242.Pp
243The
244.Fa cryptoini
245structure and its contents will not be modified by the framework (or
246the drivers used).
247Subsequent requests for processing that use the
248SID returned will avoid the cost of re-initializing the hardware (in
249essence, SID acts as an index in the session cache of the driver).
250.Pp
251.Fn crypto_freesession
252is called with the SID returned by
253.Fn crypto_newsession
254to disestablish the session.
255.Pp
256.Fn crypto_dispatch
257is called to process a request.
258The various fields in the
259.Fa cryptop
260structure are:
261.Bl -tag -width crp_callback
262.It Fa crp_sid
263Contains the SID.
264.It Fa crp_ilen
265Indicates the total length in bytes of the buffer to be processed.
266.It Fa crp_olen
267On return, contains the length of the result, not including
268.Fa crd_skip .
269For symmetric crypto operations, this will be the same as the input length.
270.It Fa crp_alloctype
271Indicates the type of buffer, as used in the kernel
272.Xr malloc 9
273routine.
274This will be used if the framework needs to allocate a new
275buffer for the result (or for re-formatting the input).
276.It Fa crp_callback
277This routine is invoked upon completion of the request, whether
278successful or not.
279It is invoked through the
280.Fn crypto_done
281routine.
282If the request was not successful, an error code is set in the
283.Fa crp_etype
284field.
285It is the responsibility of the callback routine to set the appropriate
286.Xr spl 9
287level.
288.It Fa crp_etype
289Contains the error type, if any errors were encountered, or zero if
290the request was successfully processed.
291If the
292.Er EAGAIN
293error code is returned, the SID has changed (and has been recorded in the
294.Fa crp_sid
295field).
296The consumer should record the new SID and use it in all subsequent requests.
297In this case, the request may be re-submitted immediately.
298This mechanism is used by the framework to perform
299session migration (move a session from one driver to another, because
300of availability, performance, or other considerations).
301.Pp
302Note that this field only makes sense when examined by
303the callback routine specified in
304.Fa crp_callback .
305Errors are returned to the invoker of
306.Fn crypto_process
307only when enough information is not present to call the callback
308routine (i.e., if the pointer passed is
309.Dv NULL
310or if no callback routine was specified).
311.It Fa crp_flags
312Is a bitmask of flags associated with this request.
313Currently defined flags are:
314.Bl -tag -width CRYPTO_F_IMBUF
315.It Dv CRYPTO_F_IMBUF
316The buffer pointed to by
317.Fa crp_buf
318is an mbuf chain.
319.El
320.Pp
321.It Fa crp_buf
322Points to the input buffer.
323On return (when the callback is invoked),
324it contains the result of the request.
325The input buffer may be an mbuf
326chain or a contiguous buffer (of a type identified by
327.Fa crp_alloctype ) ,
328depending on
329.Fa crp_flags .
330.It Fa crp_opaque
331This is passed through the crypto framework untouched and is
332intended for the invoking application's use.
333.It Fa crp_desc
334This is a linked list of descriptors.
335Each descriptor provides
336information about what type of cryptographic operation should be done
337on the input buffer.
338The various fields are:
339.Bl -tag -width ".Fa crd_inject"
340.It Fa crd_skip
341The offset in the input buffer where processing should start.
342.It Fa crd_len
343How many bytes, after
344.Fa crd_skip ,
345should be processed.
346.It Fa crd_inject
347Offset from the beginning of the buffer to insert any results.
348For encryption algorithms, this is where the initialization vector
349(IV) will be inserted when encrypting or where it can be found when
350decrypting (subject to
351.Fa crd_flags ) .
352For MAC algorithms, this is where the result of the keyed hash will be
353inserted.
354.It Fa crd_flags
355For adjusting general operation from userland,
356the following flags are defined:
357.Bl -tag -width CRD_F_IV_EXPLICIT
358.It Dv CRD_F_ENCRYPT
359For encryption algorithms, this bit is set when encryption is required
360(when not set, decryption is performed).
361.It Dv CRD_F_IV_PRESENT
362For encryption algorithms, this bit is set when the IV already
363precedes the data, so the
364.Fa crd_inject
365value will be ignored and no IV will be written in the buffer.
366Otherwise, the IV used to encrypt the packet will be written
367at the location pointed to by
368.Fa crd_inject .
369Some applications that do special
370.Dq IV cooking ,
371such as the half-IV mode in
372.Xr ipsec 4 ,
373can use this flag to indicate that the IV should not be written on the packet.
374This flag is typically used in conjunction with the
375.Dv CRD_F_IV_EXPLICIT
376flag.
377.It Dv CRD_F_IV_EXPLICIT
378For encryption algorithms, this bit is set when the IV is explicitly
379provided by the consumer in the
380.Fa crd_iv
381fields.
382Otherwise, for encryption operations the IV is provided for by
383the driver used to perform the operation, whereas for decryption
384operations it is pointed to by the
385.Fa crd_inject
386field.
387This flag is typically used when the IV is calculated
388.Dq on the fly
389by the consumer, and does not precede the data (some
390.Xr ipsec 4
391configurations, and the encrypted swap are two such examples).
392.It Dv CRD_F_COMP
393For compression algorithms, this bit is set when compression is required (when
394not set, decompression is performed).
395.El
396.It Fa CRD_INI
397This
398.Fa cryptoini
399structure will not be modified by the framework or the device drivers.
400Since this information accompanies every cryptographic
401operation request, drivers may re-initialize state on-demand
402(typically an expensive operation).
403Furthermore, the cryptographic
404framework may re-route requests as a result of full queues or hardware
405failure, as described above.
406.It Fa crd_next
407Point to the next descriptor.
408Linked operations are useful in protocols such as
409.Xr ipsec 4 ,
410where multiple cryptographic transforms may be applied on the same
411block of data.
412.El
413.El
414.Pp
415.Fn crypto_getreq
416allocates a
417.Fa cryptop
418structure with a linked list of as many
419.Fa cryptodesc
420structures as were specified in the argument passed to it.
421.Pp
422.Fn crypto_freereq
423deallocates a structure
424.Fa cryptop
425and any
426.Fa cryptodesc
427structures linked to it.
428Note that it is the responsibility of the
429callback routine to do the necessary cleanups associated with the
430opaque field in the
431.Fa cryptop
432structure.
433.Pp
434.Fn crypto_kdispatch
435is called to perform a keying operation.
436The various fields in the
437.Fa crytokop
438structure are:
439.Bl -tag -width crp_alloctype
440.It Fa krp_op
441Operation code, such as CRK_MOD_EXP.
442.It Fa krp_status
443Return code.
444This errno-style variable indicates whether there were lower level reasons
445for operation failure.
446.It Fa krp_iparams
447Number of input parameters to the specified operation.
448Note that each operation has a (typically hardwired) number of such parameters.
449.It Fa krp_oparams
450Number of output parameters from the specified operation.
451Note that each operation has a (typically hardwired) number of such parameters.
452.It Fa krp_kvp
453An array of kernel memory blocks containing the parameters.
454.It Fa krp_hid
455Identifier specifying which low-level driver is being used.
456.It Fa krp_callback
457Callback called on completion of a keying operation.
458.El
459.Pp
460.Fn crypto_kgetreq
461allocates a
462.Fa cryptkop
463structure.
464The first argument means the same as
465.Fn crypto_getreq .
466The second argument means flags passed to
467.Fn pool_get .
468.Pp
469.Fn crypto_kfreereq
470deallocates a structure
471.Fa cryptkop
472structure.
473.Pp
474The following sysctl entries exist to adjust
475the behaviour of the system from userland:
476.Bl -tag -width opencrypto.crypto_ret_kq.maxlen
477.It kern.usercrypto
478Allow (1) or forbid (0) userland access to
479.Pa /dev/crypto .
480.It kern.userasymcrypto
481Allow (1) or forbid (0) userland access to
482do asymmetric crypto requests.
483.It kern.cryptodevallowsoft
484Enable/disable access to hardware versus software operations:
485.Bl -tag -width xxx
486.It < 0
487Force userlevel requests to use software operations, always.
488.It = 0
489Use hardware if present, grant userlevel requests for non-accelerated
490operations (handling the latter in software).
491.It > 0
492Allow user requests only for operations which are hardware-accelerated.
493.El
494.It opencrypto.crypto_ret_q.maxlen
495Limit the length of queue(crypto_ret_q) which mediates between
496crypto driver's completion and calling
497.Fa cryptop
498callback.
499When the queue exceeds this limit,
500.Fn crypto_getreq
501fails.
502.Bl -tag -width xxxx
503.It <= 0
504means unlimited.
505.El
506.It opencrypto.crypto_ret_kq.maxlen
507Limit the length of queue(crypto_ret_kq) which mediates between
508crypto driver's completion and calling
509.Fa cryptkop
510callback.
511When the queue exceeds this limit,
512.Fn crypto_kgetreq
513fails.
514.Bl -tag -width xxxx
515.It <= 0
516means unlimited.
517.El
518.El
519.Pp
520.Bl -tag -width opencrypto.crypto_ret_kq.drops
521The following sysctl entries exist to get statistics.
522.It opencrypto.crypto_ret_q.len
523Current crypto_ret_q length.
524.It opencrypto.crypto_ret_q.drops
525The count of
526.Fn crypto_getreq
527failed as overflow
528.Pa opencrypto.crypto_ret_q.maxlen .
529.It opencrypto.crypto_ret_kq.len
530Current crypto_ret_kq length.
531.It opencrypto.crypto_ret_kq.drops
532The count of
533.Fn crypto_kgetreq
534failed as overflow
535.Pa opencrypto.crypto_ret_kq.maxlen .
536.El
537.Sh DRIVER-SIDE API
538The
539.Fn crypto_get_driverid ,
540.Fn crypto_register ,
541.Fn crypto_kregister ,
542.Fn crypto_unregister ,
543.Fn crypto_unregister_all ,
544and
545.Fn crypto_done
546routines are used by drivers that provide support for cryptographic
547primitives to register and unregister with the kernel crypto services
548framework.
549Drivers must first use the
550.Fn crypto_get_driverid
551function to acquire a driver identifier, specifying the
552.Fa flags
553as an argument (normally 0, but software-only drivers should specify
554.Dv CRYPTOCAP_F_SOFTWARE ) .
555For each algorithm the driver supports, it must then call
556.Fn crypto_register .
557The first argument is the driver identifier.
558The second argument is an array of
559.Dv CRYPTO_ALGORITHM_MAX + 1
560elements, indicating which algorithms are supported.
561The last three arguments are pointers to three
562driver-provided functions that the framework may call to establish new
563cryptographic context with the driver, free already established
564context, and ask for a request to be processed (encrypt, decrypt,
565etc.)
566.Fn crypto_unregister
567is called by drivers that wish to withdraw support for an algorithm.
568The two arguments are the driver and algorithm identifiers, respectively.
569algorithms supported by the card.
570If all algorithms associated with a driver are unregistered, the
571driver will be disabled (no new sessions will be allocated on that
572driver, and any existing sessions will be migrated to other drivers).
573.Fn crypto_unregister_all
574will unregister all registered algorithms, disable the driver,
575and migrate existing sessions to other drivers.
576.Pp
577The calling convention for the three driver-supplied routines is:
578.Bd -literal
579int (*newsession) (void *, u_int32_t *, struct cryptoini *);
580int (*freesession) (void *, u_int64_t);
581int (*process) (void *, struct cryptop *, int);
582.Ed
583.Pp
584On invocation, the first argument to
585.Fn newsession
586contains the driver identifier obtained via
587.Fn crypto_get_driverid .
588On successfully returning, it should contain a driver-specific session
589identifier.
590The second argument is identical to that of
591.Fn crypto_newsession .
592.Pp
593The
594.Fn freesession
595routine takes as argument the SID (which is the concatenation of the
596driver identifier and the driver-specific session identifier).
597It should clear any context associated with the session (clear hardware
598registers, memory, etc.).
599.Pp
600The
601.Fn process
602routine is invoked with a request to perform crypto processing.
603This routine must not block, but should queue the request and return
604immediately.
605Upon processing the request, the callback routine should be invoked.
606In case of error, the error indication must be placed in the
607.Fa crp_etype
608field of the
609.Fa cryptop
610structure.
611The
612.Fa hint
613argument can be set to
614.Dv CRYPTO_HINT_MORE
615when there will be more request right after this request.
616When the request is completed, or an error is detected, the
617.Fn process
618routine should invoke
619.Fn crypto_done .
620Session migration may be performed, as mentioned previously.
621.Pp
622The
623.Fn kprocess
624routine is invoked with a request to perform crypto key processing.
625This routine must not block, but should queue the request and return
626immediately.
627Upon processing the request, the callback routine should be invoked.
628In case of error, the error indication must be placed in the
629.Fa krp_status
630field of the
631.Fa cryptkop
632structure.
633When the request is completed, or an error is detected, the
634.Fn kprocess
635routine should invoke
636.Fn crypto_kdone .
637.Sh RETURN VALUES
638.Fn crypto_register ,
639.Fn crypto_kregister ,
640.Fn crypto_unregister ,
641.Fn crypto_newsession ,
642and
643.Fn crypto_freesession
644return 0 on success, or an error code on failure.
645.Fn crypto_get_driverid
646returns a non-negative value on error, and \-1 on failure.
647.Fn crypto_getreq
648returns a pointer to a
649.Fa cryptop
650structure and
651.Dv NULL
652on failure.
653.Fn crypto_kgetreq
654returns a pointer to a
655.Fa cryptkop
656structure and
657.Dv NULL
658on failure.
659.Fn crypto_dispatch
660returns
661.Er EINVAL
662if its argument or the callback function was
663.Dv NULL ,
664and 0 otherwise.
665The callback is provided with an error code in case of failure, in the
666.Fa crp_etype
667field.
668.Sh FILES
669.Bl -tag -width sys/opencrypto/crypto.c
670.It Pa sys/opencrypto/crypto.c
671most of the framework code
672.It Pa sys/crypto
673crypto algorithm implementations
674.El
675.Sh SEE ALSO
676.Xr ipsec 4 ,
677.Xr pcmcia 4 ,
678.Xr condvar 9 ,
679.Xr malloc 9 ,
680.Xr pool 9
681.Rs
682.%A "Angelos D. Keromytis"
683.%A "Jason L. Wright"
684.%A "Theo de Raadt"
685.%T "The Design of the OpenBSD Cryptographic Framework"
686.%I "Usenix"
687.%N "2003"
688.%D "June 2003"
689.Re
690.Sh HISTORY
691The cryptographic framework first appeared in
692.Ox 2.7
693and was written by
694.An Angelos D. Keromytis Aq Mt angelos@openbsd.org .
695.Pp
696.An Sam Leffler
697ported the crypto framework to
698.Fx
699and made performance improvements.
700.Pp
701.An Jonathan Stone Aq Mt jonathan@NetBSD.org
702ported the cryptoframe from
703.Fx
704to
705.Nx .
706.Nm opencrypto
707first appeared in
708.Nx 2.0 .
709.Sh BUGS
710The framework currently assumes that all the algorithms in a
711.Fn crypto_newsession
712operation must be available by the same driver.
713If that's not the case, session initialization will fail.
714.Pp
715The framework also needs a mechanism for determining which driver is
716best for a specific set of algorithms associated with a session.
717Some type of benchmarking is in order here.
718.Pp
719Multiple instances of the same algorithm in the same session are not
720supported.
721Note that 3DES is considered one algorithm (and not three
722instances of DES).
723Thus, 3DES and DES could be mixed in the same request.
724.Pp
725A queue for completed operations should be implemented and processed
726at some software
727.Xr spl 9
728level, to avoid overall system latency issues, and potential kernel
729stack exhaustion while processing a callback.
730.Pp
731When SMP time comes, we will support use of a second processor (or
732more) as a crypto device (this is actually AMP, but we need the same
733basic support).
734