DPDK patches and discussions
 help / color / mirror / Atom feed
* [dpdk-dev] [Bug 669] Integrity check failure occurs when ciphering and integrity both enabled with snow3g algorithm
@ 2021-03-31  5:28 bugzilla
  2024-03-15  9:04 ` [DPDK/cryptodev Bug " bugzilla
  0 siblings, 1 reply; 2+ messages in thread
From: bugzilla @ 2021-03-31  5:28 UTC (permalink / raw)
  To: dev

https://bugs.dpdk.org/show_bug.cgi?id=669

            Bug ID: 669
           Summary: Integrity check failure occurs when ciphering and
                    integrity both enabled with snow3g algorithm
           Product: DPDK
           Version: 20.02
          Hardware: x86
                OS: Linux
            Status: UNCONFIRMED
          Severity: critical
          Priority: Normal
         Component: cryptodev
          Assignee: dev@dpdk.org
          Reporter: tiger.liu@mavenir.com
  Target Milestone: ---

Created attachment 153
  --> https://bugs.dpdk.org/attachment.cgi?id=153&action=edit
information about the environment

Environment: 200Mbps traffic, 1 core, crypto_snow3g PMD without QAT for
ciphering and integrity

Detail: 
1.Integrity check failure immediately occurs when sending 200Mbps traffic.
2.Not every packets are failing in the integrity check, the situation is like
this: packet NO.1 passed the check, NO.2-9 failed and 10-18 passed again, these
numbers are not stable every time.
3.The procedure of processing packets is firstly appending 4 bytes MACI by
integrity algorithm then ciphering the packets including the MACI.
4.Checking the error packets with dpdk-test-crypto-perf tool, the ciphered data
does not match with the original data.
5.Before pushing the data for ciphering by function
rte_cryptodev_enqueue_burst() to DPDK, the content is the same as the original
packets and the 4 bytes MACI is correct.
6.After getting the ciphered data by rte_cryptodev_dequeue_burst(),the ciphered
data is not correct, which probably means some error happens in DPDK code.

Additionally, Integrity check failure won’t occur when ciphering and integrity
both enabled with AES algorithm in the same environment. 

We have got a response from Jayakumar Muthurajan, he said it is a missing
feature in the crypto-test when the size is different for encryption and
authentication. Please help check it.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [DPDK/cryptodev Bug 669] Integrity check failure occurs when ciphering and integrity both enabled with snow3g algorithm
  2021-03-31  5:28 [dpdk-dev] [Bug 669] Integrity check failure occurs when ciphering and integrity both enabled with snow3g algorithm bugzilla
@ 2024-03-15  9:04 ` bugzilla
  0 siblings, 0 replies; 2+ messages in thread
From: bugzilla @ 2024-03-15  9:04 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 568 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=669

tiger.liu@mavenir.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |FIXED
             Status|UNCONFIRMED                 |RESOLVED

--- Comment #1 from tiger.liu@mavenir.com ---
Update to dpdk 20.11 with intel-ipsec-mb lib v0.54, issue resolved by using
AESNI MB PMD for snow3g algorithm.

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 2679 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-03-15  9:04 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-03-31  5:28 [dpdk-dev] [Bug 669] Integrity check failure occurs when ciphering and integrity both enabled with snow3g algorithm bugzilla
2024-03-15  9:04 ` [DPDK/cryptodev Bug " bugzilla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).