[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] Virtualization + CPU w/crypto acceleration instructions


  • To: xen-users@xxxxxxxxxxxxxxxxxxx, virtualization@xxxxxxxxxxxxxx
  • From: "Molle Bestefich" <molle.bestefich@xxxxxxxxx>
  • Date: Mon, 12 Mar 2007 20:35:31 +0100
  • Delivery-date: Mon, 12 Mar 2007 12:34:40 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=D0sKEQHzctHnnHtjotLU70bELS+iGYNXSZ7D90FF3Fl6fG9siKDWHypH4TfZB1+ilDanspuFXmKL/pRrXEGTZ/hoixGMi5BifNwcbCSEzn0mCk6pW2uFygJzrMR5B+yUlXNg1VphqD1mFcYxo+QwrONg1VGIQZ0uMOdZKHS7vOI=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

In a virtualized environment running Xen or VMware, can the guest
operating systems utilize hardware crypto acceleration such as the
"PadLock" AES acceleration built into VIA CPUs?

(Wasn't able to find this info in any of ~400 Google hits, so I'm
shooting it out a bit to let as many as possible benefit from the
answer.)

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.