[Openswan Users] Fwd: How openswan work with ocf and ixp4xx hardware acceleration?
mix.kao
mix.kao at cipherium.com.tw
Wed Jan 27 03:48:58 EST 2010
Hi Paul,
I have set the HAVE_OCF?=true in openswan Makefile.inc
When i start the openswan with command ipsec setup start, i noticed the
_startklips script always do modprobe to load crypto modules like md5,
des, cbc, twofish....
# first load any crypto modules we might need for acceleration
modprobe -q padlock 2>/dev/null
modprobe -q padlock-aes 2>/dev/null
modprobe -q padlock-sha 2>/dev/null
# load the most common ciphers/algo's
# aes-x86_64 has higher priority in via crypto api
for crypto in aes-x86_64 aes aes_generic des sha512 sha256 md5
cbc xcbc ecb twofish blowfish serpent ccm
do
echo -n "$crypto "
modprobe -q $crypto 2> /dev/null
done
And i can see the current modules by lsmodAnd i can see the current
modules by lsmod
Is the module status ok to have the OCF support?
Or i still don't get OCF support?
Module Size Used by
ecb 1152 0
cbc 1696 0
md5 3872 0
cryptomgr 71408 0
crypto_blkcipher 6468 3 ecb,cbc,cryptomgr
aead 3200 1 cryptomgr
des_generic 16128 0
crypto_algapi 7680 7
ecb,cbc,md5,cryptomgr,crypto_blkcipher,aead,des_generic
ipsec 337716 2
ixp4xx 6992 0
cryptodev 9732 0
ocf 15304 2 ixp4xx,cryptodev
nfnetlink_log 5064 0
nfnetlink 1528 1 nfnetlink_log
iptable_filter 896 0
ip_tables 8080 1 iptable_filter
ebtable_filter 768 1
ebtables 13504 1 ebtable_filter
ipt_ULOG 3780 0
nf_nat_ftp 1216 0
nf_conntrack_ftp 4512 1 nf_nat_ftp
nf_nat 9582 1 nf_nat_ftp
xt_recent 4920 0
x_tables 7044 4 ip_tables,ebtables,ipt_ULOG,xt_recent
ixp400_eth 16368 1
ixp400_oslinux 196804 2 ixp4xx,ixp400_eth
loop 8908 2
More information about the Users
mailing list