DPDK patches and discussions
 help / color / mirror / Atom feed
From: Declan Doherty <declan.doherty@intel.com>
To: Umesh Kartha <Umesh.Kartha@caviumnetworks.com>, dev@dpdk.org
Cc: Jerin Jacob <Jerin.JacobKollanukkaran@cavium.com>,
	Balasubramanian Manoharan <Balasubramanian.Manoharan@cavium.com>,
	Ram Kumar <Ram.Kumar@cavium.com>,
	Murthy Nidadavolu <Nidadavolu.Murthy@cavium.com>,
	pablo.de.lara.guarch@intel.com
Subject: Re: [dpdk-dev] [RFC] specifications for asymmetric crypto algorithms
Date: Mon, 27 Mar 2017 13:58:58 +0100	[thread overview]
Message-ID: <8320df1a-9367-5f7a-528d-a64651600e95@intel.com> (raw)
In-Reply-To: <1490177802-13398-1-git-send-email-Umesh.Kartha@caviumnetworks.com>

On 22/03/2017 10:16 AM, Umesh Kartha wrote:
>
> This RFC contains specifications for asymmetric crypto algorithms.
> Asymmetric crypto algorithms are essential part of protocols such as
> SSL/TLS. As the current DPDK crypto library lacks support for asymmetric
> crypto algorithms, this RFC is an attempt to address it.
>
> Cavium offers  PCI hardware accelerators that supports symmetric and
> asymmetric crypto algorithms, of which a few are  addressed in this RFC.
> Once specifications are agreed upon, I can submit a patch for the same.
> We will develop a poll mode driver which can offload to OpenSSL crypto
> library and to Cavium crypto accelerator.
>
> The asymmetric crypto algorithms supported in this version are:
>
> 1 RSA
>   - RSA Sign
>   - RSA Verify
>   - RSA Public Encrypt
>   - RSA Private Decrypt
>
>   Padding schemes supported for RSA operations are
>     * RSA PKCS#1 BT1
>     * RSA PKCS#1 BT2
>     * RSA PKCS#1 OAEP
>     * RSA PKCS#1 PSS
>
> 2  ECDSA
>   - ECDSA Sign
>   - ECDSA Verify
>
>   Curves supported for ECDSA operations are
>     * Prime192v1
>     * Secp224k1
>     * Prime256v1
>     * Secp384r1
>     * Secp521r1
>
> 3  MODEXP
>
> 4  FUNDAMENTAL ECC
>   - Point Addition
>   - Point Multiplication
>   - Point Doubling
>
>    Curves supported for fundamental ECC operations are same as that of
>    ECDSA operations.
>
>  Asymmetric crypto transform operations support both session oriented
> mode (WIP) and session less mode. If the operation is sessionless, an
> asymmetric crypto transform structure, containing immutable parameters,
> is passed along with per-operation mutable parameters in the structure.
> Specific structures were written to contain immutable parameters
> depending on algorithm used for crypto transform operation. The
> parameters and type of transform is distinguished by the algorithm for
> which the transform structure is filled. For a particular asymmetric
> algorithm, not all parameters will be used and hence not required to be
> filled.
>
>  Unlike symmetric operations, asymmetric operations can have more than
> one resultant component for a single transform. Hence, only for select
> operation types do we use destination mbuf structure passed along with
> other operation parameters. The lengths of input and output parameters
> are fixed and short. Depending on the algorithm, the number of inputs to
> crypto transform operation, both mutable and immutable parameters,
> vary. Depending on the algorithm, the type of data expected at source
> mbuf varies and has been described.
>
> ---
...
>

Hey Umesh,

it's great to see this RFC and the expansion to the cryptodev framework 
functionality. I'm currently working my way through the proposal and 
drafting in some help from colleagues within Intel with asymmetric 
crypto expertise. Hopefully I'll be able to come back to the list with 
detailed comments as soon as possible.

Thanks
Declan

  reply	other threads:[~2017-03-27 12:59 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-22 10:16 Umesh Kartha
2017-03-27 12:58 ` Declan Doherty [this message]
     [not found] ` <348A99DA5F5B7549AA880327E580B435891DBCED@IRSMSX101.ger.corp.intel.com>
2017-04-06 11:39   ` Trahe, Fiona
2017-04-27  7:26     ` Umesh Kartha
2017-05-11 12:35 ` [dpdk-dev] [RFC PATCH v2 0/3] " Umesh Kartha
2017-05-11 12:35   ` [dpdk-dev] [RFC PATCH v2 1/3] cryptodev: added asymmetric algorithms Umesh Kartha
2017-05-25 16:00     ` Trahe, Fiona
2017-05-26  7:18       ` Umesh Kartha
2017-05-29 14:51         ` Trahe, Fiona
2017-06-02 11:01           ` Umesh Kartha
2017-05-11 12:35   ` [dpdk-dev] [RFC PATCH v2 2/3] cryptodev: asymmetric algorithm capability definitions Umesh Kartha
2017-05-11 12:35   ` [dpdk-dev] [RFC PATCH v2 3/3] cryptodev: added asym queue pair and session apis Umesh Kartha
2017-05-24 11:48     ` Trahe, Fiona
2017-05-12 12:15   ` [dpdk-dev] [RFC PATCH v2 0/3] specifications for asymmetric crypto algorithms Neil Horman
2017-05-12 14:35     ` Umesh Kartha

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8320df1a-9367-5f7a-528d-a64651600e95@intel.com \
    --to=declan.doherty@intel.com \
    --cc=Balasubramanian.Manoharan@cavium.com \
    --cc=Jerin.JacobKollanukkaran@cavium.com \
    --cc=Nidadavolu.Murthy@cavium.com \
    --cc=Ram.Kumar@cavium.com \
    --cc=Umesh.Kartha@caviumnetworks.com \
    --cc=dev@dpdk.org \
    --cc=pablo.de.lara.guarch@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).