METHOD AND APPARATUS FOR ESTABLISHING SECURE SESSIONS
First Claim
1. A computer implemented method comprising:
- calling an operation from a first processor;
executing a plurality of primitive security operations at a second processor in response to the operation call;
generating a set of data from executing the plurality of primitive security operations; and
establishing a secure session with the set of data.
11 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory. Additionally, the request unit is to distribute the retrieved requests to the number of execution units based on availability for processing by the number of execution units.
25 Citations
34 Claims
-
1. A computer implemented method comprising:
-
calling an operation from a first processor;
executing a plurality of primitive security operations at a second processor in response to the operation call;
generating a set of data from executing the plurality of primitive security operations; and
establishing a secure session with the set of data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer implemented method comprising:
-
calling a macro security operation;
performing a set of operations in response to the macro security operation, the set of operations comprising generating a secret and a key material, creating a first finished hash for a client message, creating a second finished hash for a server message, creating a finished message; and
establishing a secure session. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a first network element to request a secure session; and
a second network element networked to the first network element, the second network element to call a macro security operation from a first processor, to execute a plurality of primitive security operations at a second processor in response to the macro security operation cal and to generate a set of data from the execution of the plurality of primitive security operations. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
a first processor to call a macro security operation to establish a secure session;
a second processor coupled to the first processor, the second processor to perform a plurality of primitive security operations in response to the macro security operation call; and
a memory coupled to the first and the second processor, the memory to store a set of data generated by the second processor. - View Dependent Claims (17, 18, 19, 20)
-
-
21. An apparatus comprising:
-
a first processor to call a macro security operation;
a second processor coupled to the first processor, the second processor comprising a request unit to retrieve the macro security operation, a plurality of execution units coupled to the request unit, one of the plurality of execution units to perform a plurality of primitive security operations, the plurality of primitive security operations corresponding to the macro security operation; and
a memory coupled to the first and second processor, the memory to store a set of data generated by the second processor. - View Dependent Claims (22, 23, 24)
-
-
25. A machine-readable medium that provides instructions, which when executed by a set of one or more processors, cause said set of processors to perform operations comprising:
-
executing a macro security operation at a first one of the set of processors;
executing a plurality of primitive security operations at a second one of the set of processors in response to the macro security operation call;
generating a set of data from executing the plurality of primitive security operations; and
establishing a secure session with the set of data. - View Dependent Claims (26, 27, 28, 29)
-
-
30. A machine-readable medium that provides instructions, which when executed by a set of one or more processors, cause said set of processors to perform operations comprising:
-
calling a macro security operation from a first one of the set of processors;
performing a set of operations at a second one of the set of processors in response to the macro security operation, the set of operations comprising generating a secret and a key material, creating a first finished hash for a client message, creating a second finished hash for a server message, creating a finished message; and
establishing a secure session. - View Dependent Claims (31, 32, 33, 34)
-
Specification