From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B6845A04FF for ; Tue, 24 May 2022 07:23:59 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 746DF4014F; Tue, 24 May 2022 07:23:59 +0200 (CEST) Received: from APC01-SG2-obe.outbound.protection.outlook.com (mail-sgaapc01on2069.outbound.protection.outlook.com [40.107.215.69]) by mails.dpdk.org (Postfix) with ESMTP id 6A28540A84 for ; Tue, 24 May 2022 07:23:58 +0200 (CEST) ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=FB+se+tpq+LuOcgPyAKA2DNBU2LrkYq2OtLhcu+Df1sSnLP6bK2MyZN+j+ygEI8QQc5H0DEvC8J2ZrIRegiPhGM6DlN7PZUkn5khF3ueoG6f9rYnObjg3MaNwgRkZzwgnWcJFLFBPEeDA0xetq8I5LTwOe2ZimBT91tynNhB1GEvH99gZqDiDbcb6ePeh2sGfkBTcnYzdzDdPU769GkfbL2xkJxBvi6/c2HP23nIMAjlC8ukM4+OXJ18qgU44A6rte+Mafj+nKBjtdEuNWDO2ZbR4d6Ubl0nAa+m2Rax5T7SDJZFJ3/r73qEXMzjpTFp8+ThflnU3Gp0h+OoSehJ6A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=osvlbfw0LQBtd+742Cv0+Y1Cpb5YoVpECymEpIxEUdo=; b=IzAJZ+5GMpX8skQ/gyP/QCiM6rQEON8AeVrH8cJ6hufQVzGazrlrTdOQUzQh9JPDfjUS2UccPbAb4fB7/8fNNBEobVHHREz7wt4UqB0DL//t03vzZC4PhQVSFEW3efotHWi1+XdiZ4fiqVqwtnBasN4oarkiyneC0ehdsU2rhlwET62HRFSKsfhDx581irEdDzs8+HN0tgVsuhYG3Q6yXUfzgXs1R5Ym+b4F6NEoKDmz4XfRMP/66eJS493U9QxS+bu/7nc1yGtLUoLsFWhKZfH7XGDAjWmx+m8ioVKjDsMFTXbB3cOLXT2JJQ5ImdcWQJV+hN/bUht8u2ikG+ySig== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 54.79.123.149) smtp.rcpttodomain=intel.com smtp.mailfrom=tatacommunications.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=tatacommunications.com; dkim=pass (signature was verified) header.d=tatacommunications.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=tatacommunications.com] dkim=[1,1,header.d=tatacommunications.com] dmarc=[1,1,header.from=tatacommunications.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tatacommunications.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=osvlbfw0LQBtd+742Cv0+Y1Cpb5YoVpECymEpIxEUdo=; b=DfaqQmpVyLUDJt5NfVWQ0BTRg1owH0h3u5DesUQnJnnfwsgbktgiWKLgr1939ZOqcNuKg/yxRwpAZDlVVXqnfG1Bv6xYu1n2N7g+G4P3VmjZ6CxkouaUuq87TKl3ZM8ks+IZnadGgPQ+eMFhXpT/meA25a7kwQ2TGbQHOdec1xeBNMrjBO/A7ILIhPQ6wfUSleqzq1O4UjG1HsI1Jkuo5L3VJybI5yFhKR53R2iQpT/RWlr8PNtWGKtCpTlDSFTIiOEZSOraaPYnUkeCDof4trXSyM7lv37v5FDKBZn2Z6ndaSKJXe7Imke3dtjITPeYKKXhJbl0+G0Y9WvXgiF1EQ== Received: from SG2PR04CA0164.apcprd04.prod.outlook.com (2603:1096:4::26) by KL1PR0401MB5213.apcprd04.prod.outlook.com (2603:1096:820:89::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.17; Tue, 24 May 2022 05:23:56 +0000 Received: from SG2APC01FT0047.eop-APC01.prod.protection.outlook.com (2603:1096:4:0:cafe::ef) by SG2PR04CA0164.outlook.office365.com (2603:1096:4::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.14 via Frontend Transport; Tue, 24 May 2022 05:23:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 54.79.123.149) smtp.mailfrom=tatacommunications.com; dkim=pass (signature was verified) header.d=tatacommunications.com;dmarc=pass action=none header.from=tatacommunications.com; Received-SPF: Pass (protection.outlook.com: domain of tatacommunications.com designates 54.79.123.149 as permitted sender) receiver=protection.outlook.com; client-ip=54.79.123.149; helo=sydapipop-haraka-inline01.vpc-a3a96cc4.ase2.shn; pr=C Received: from sydapipop-haraka-inline01.vpc-a3a96cc4.ase2.shn (54.79.123.149) by SG2APC01FT0047.mail.protection.outlook.com (10.13.36.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.14 via Frontend Transport; Tue, 24 May 2022 05:23:55 +0000 Received: from APC01-SG2-obe.outbound.protection.outlook.com (mail-sgaapc01lp2111.outbound.protection.outlook.com [104.47.26.111]) by sydapipop-haraka-inline01.vpc-a3a96cc4.ase2.shn (Haraka/2.8.24) with ESMTPS id A7D685B4-33CD-4956-BE5A-1FF60AD71613.1 envelope-from (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 verify=FAIL); Tue, 24 May 2022 05:23:53 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XBmQt+JAqEOwGajTKuJgQC9Rriz4TTfo8L1M1oA7Du3vQG3+/kgUWBbU5edQO+6JjLsBvl8LQjk2iWm8B485NP578QyirN0N1bCxzEVwYOhg7lDtZ51DfjLLlLngYuNQOtUuIh4G7mkb/YN2BW2pDwXpt/GtyEj0XktnpolgiGmKFZc8Ylu87+vyD0eg5gqIp5EVzu3cwzNmXzghRNtIVzRW1dt2JIS3ipuW9+KqKCt4xR8c2wbhiUjYx7mAIygELHeMuRAs3CsVEdGWkOphIvJrVKLFM+zpNMp8P3EkbLtga6Y1Jk76cbWjNBAwnDKS5nJXg8LV2GeIb0yzZ7tWCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=osvlbfw0LQBtd+742Cv0+Y1Cpb5YoVpECymEpIxEUdo=; b=HbJ1gcWjvL2T0uZYQRcNlFdfw618ML8uTnTbA5rV7nZKZKfRmUxyb8l5XgNPda7qF1YtSLskAjytzrCzKbH+DiS7k4s8iR2SM2dfnC92Ptl6/8LRg+h4XJrXwPEHdZ/0vsVqSlJfn9/c7LtrlZZSx+a4cp8inDvNwFD8zWqpwH0VvrnTWYKlQmvxtrWz7T+bO3zz6Qpi1q8rq78QraBiKWMZ4XedDFl4vpnS5rRirUT0GK1Zu4ZHfLZkJf9Rkex/sebO9aCcskZT7muiSOd8tlFG1B2CBfneyKWKYXiKNjMuhF8dab32v0I5Af645zRgIT5Ch7sjax+ygBaXGChAAw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=tatacommunications.com; dmarc=pass action=none header.from=tatacommunications.com; dkim=pass header.d=tatacommunications.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tatacommunications.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=osvlbfw0LQBtd+742Cv0+Y1Cpb5YoVpECymEpIxEUdo=; b=DfaqQmpVyLUDJt5NfVWQ0BTRg1owH0h3u5DesUQnJnnfwsgbktgiWKLgr1939ZOqcNuKg/yxRwpAZDlVVXqnfG1Bv6xYu1n2N7g+G4P3VmjZ6CxkouaUuq87TKl3ZM8ks+IZnadGgPQ+eMFhXpT/meA25a7kwQ2TGbQHOdec1xeBNMrjBO/A7ILIhPQ6wfUSleqzq1O4UjG1HsI1Jkuo5L3VJybI5yFhKR53R2iQpT/RWlr8PNtWGKtCpTlDSFTIiOEZSOraaPYnUkeCDof4trXSyM7lv37v5FDKBZn2Z6ndaSKJXe7Imke3dtjITPeYKKXhJbl0+G0Y9WvXgiF1EQ== Received: from PSAPR04MB5516.apcprd04.prod.outlook.com (2603:1096:301:5c::9) by SG2PR04MB5495.apcprd04.prod.outlook.com (2603:1096:4:173::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.14; Tue, 24 May 2022 05:23:52 +0000 Received: from PSAPR04MB5516.apcprd04.prod.outlook.com ([fe80::2820:7577:ede8:f622]) by PSAPR04MB5516.apcprd04.prod.outlook.com ([fe80::2820:7577:ede8:f622%4]) with mapi id 15.20.5273.023; Tue, 24 May 2022 05:23:51 +0000 From: Balakrishnan K To: "Kusztal, ArkadiuszX" , "users@dpdk.org" Subject: RE: how to use crypto openssl PMD for asymmetric encryption and decryption Thread-Topic: how to use crypto openssl PMD for asymmetric encryption and decryption Thread-Index: Adhul7L76HpVKxCxQgm6OmL7h9++VgACBMowACMLKYA= Date: Tue, 24 May 2022 05:23:51 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_ActionId=1e9b2051-9f45-4073-b7f5-e6b509538b52; MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_ContentBits=0; MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_Enabled=true; MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_Method=Privileged; MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_Name=General-Test; MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_SetDate=2022-05-23T11:32:59Z; MSIP_Label_5cbf6393-50e2-4904-bc3e-1804619f2b03_SiteId=20210462-2c5e-4ec8-b3e2-0be950f292ca; Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=tatacommunications.com; X-MS-Office365-Filtering-Correlation-Id: 6218ba3c-d7c1-4d5b-8d1c-08da3d459927 x-ms-traffictypediagnostic: SG2PR04MB5495:EE_|SG2APC01FT0047:EE_|KL1PR0401MB5213:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PSAPR04MB5516.apcprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(508600001)(86362001)(9326002)(316002)(9686003)(71200400001)(83380400001)(7696005)(33656002)(186003)(26005)(6506007)(53546011)(55016003)(66556008)(122000001)(38100700002)(38070700005)(2906002)(5660300002)(66446008)(110136005)(8936002)(52536014)(8676002)(76116006)(64756008)(66476007)(66946007); DIR:OUT; SFP:1101; Content-Type: multipart/alternative; boundary="_000_PSAPR04MB55167EE7F28A38EE575504DAD6D79PSAPR04MB5516apcp_" MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SG2PR04MB5495 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=tatacommunications.com; X-SHN-DLP-SCAN: success X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: SG2APC01FT0047.eop-APC01.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 645fe32f-4159-43a7-354c-08da3d4596c8 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:54.79.123.149; CTRY:AU; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:sydapipop-haraka-inline01.vpc-a3a96cc4.ase2.shn; PTR:send1.mail-inline.syd-pop.i-shn.net; CAT:NONE; SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(356005)(9326002)(81166007)(36860700001)(8936002)(53546011)(52536014)(508600001)(5660300002)(40460700003)(2906002)(83380400001)(7696005)(6506007)(316002)(33656002)(70586007)(186003)(70206006)(8676002)(55016003)(47076005)(36906005)(336012)(9686003)(26005)(110136005)(86362001)(82310400005); DIR:OUT; SFP:1101; X-OriginatorOrg: tatacommunications.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 May 2022 05:23:55.3359 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6218ba3c-d7c1-4d5b-8d1c-08da3d459927 X-MS-Exchange-CrossTenant-Id: 20210462-2c5e-4ec8-b3e2-0be950f292ca X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=20210462-2c5e-4ec8-b3e2-0be950f292ca; Ip=[54.79.123.149]; Helo=[sydapipop-haraka-inline01.vpc-a3a96cc4.ase2.shn] X-MS-Exchange-CrossTenant-AuthSource: SG2APC01FT0047.eop-APC01.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: KL1PR0401MB5213 X-BeenThere: users@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK usage discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: users-bounces@dpdk.org --_000_PSAPR04MB55167EE7F28A38EE575504DAD6D79PSAPR04MB5516apcp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Arek, Thanks for quick response. I am using resulted output vector to verify the encrypted message. I thought the encrypted data will be in the asym_op->rsa.message.data after= rte_cryptodev_enqueue_burst and rte_cryptodev_enqueue_burst call with oper= ation type RTE_CRYPTO_ASYM_OP_ENCRYPT. So ,I checked the hex_dump of asym_op->rsa.message.data. Code snippet: asym_op =3D result_op->asym; debug_hexdump(stdout, "encrypted message", asym_op->rsa.message.data, asym_op->rsa.message.length); Encrypted data will be placed in asym_op->rsa.cipher.data after crypto oper= ation is my understanding is correct ? I should use debug_hexdump(stdout, "encrypted message", asym_op->rsa.cipher.data, asym_op->rsa.cipher.length); to check the encrypted message for the input given? Regards, Bala From: Kusztal, ArkadiuszX Sent: 23 May 2022 18:15 To: Balakrishnan K ; users@dpdk.org Subject: RE: how to use crypto openssl PMD for asymmetric encryption and de= cryption CAUTION: This email originated from outside of the organization. Do not cli= ck links or open attachments unless you recognize the sender and know the c= ontent is safe. Hi Bala, Ciphertext will be written into asym_op->rsa.cipher.data (not message.data)= by the PMD, here you are using same address for both hex dumps. Although there is a bug in debug_hexdump in this function which may cause t= his confusion. Plus, the test you are referring is PWCT test (Pairwise conditional test) -= > it will encrypt, then decrypt. Please take a look into this comment in queue_ops_rsa_enc_dec function: /* Use the resulted output as decryption Input vector* So above this line there is an encryption part. Below is decryption. Regards, Arek From: Balakrishnan K > Sent: Monday, May 23, 2022 1:33 PM To: users@dpdk.org Subject: how to use crypto openssl PMD for asymmetric encryption and decryp= tion Hi All, I am new to dpdk. Planning to use openssl crypto PMD for encrypting/decr= ypting the packets. Couldn't find much documents on openssl PMD for asymmetric encryption/decry= ption. Any one please point me in the right document. I have tried to run the test cases wrote for asymmetric crypto using openss= l virtual PMD. But the output of particular test case is same after the encryption done. File : app/test/test_cryptodev_asym.c Test executable: ./app/test/dpdk-test Test case : test_rsa_enc_dec Input given to encryption: message at [0x1894e60], len=3D20 00000000: F8 BA 1A 55 D0 2F 85 AE 96 7B B6 2F B6 CD A8 EB | ...U./...{./...= . 00000010: 7E 78 A0 50 | ~x.P After processing the output also looks like same : encrypted message exist at [0x1894e60], len=3D20 00000000: F8 BA 1A 55 D0 2F 85 AE 96 7B B6 2F B6 CD A8 EB | ...U./...{./...= . 00000010: 7E 78 A0 50 Regards, Bala --_000_PSAPR04MB55167EE7F28A38EE575504DAD6D79PSAPR04MB5516apcp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Arek,

   Thanks for quick r= esponse.

I am using resulted output vect= or to verify the encrypted message.

I thought the encrypted data will be in the asym_op-&g=
t;rsa.message.data after rte_cryptodev_enqueue_burst and rte_cryptodev_enqu=
eue_burst call with operation type RTE_CRYPTO_ASYM_OP_ENCRYPT.
So ,I checked the hex_dump of asym_op->rsa.message.=
data.
 
Code snippet:
asym_op =3D result_op->asym;=
debug_hexdump(stdout, "encrypted message&quo=
t;, asym_op->rsa.message.data,
        &=
nbsp;           &nbs=
p; asym_op->rsa.message.length);
 
 
 
Enc=
rypted data will be placed in asym_op->rsa.c=
ipher.data after crypto operation is my understanding is correct ?
I should use 
debug_hexdump(stdout, "encrypted message&quo=
t;, asym_op->rsa.cipher.data,
        &=
nbsp;           &nbs=
p; asym_op->rsa.cipher.length);
to check the encrypted message for the input give=
n?
 
 
Regards,
Bala 
 

&nbs= p;

From: Kusztal, ArkadiuszX <arkadiuszx.kusztal@intel.com>
Sent: 23 May 2022 18:15
To: Balakrishnan K <Balakrishnan.K1@tatacommunications.com>; u= sers@dpdk.org
Subject: RE: how to use crypto openssl PMD for asymmetric encryption= and decryption

 

CAUTION: This email originated from outside of the organization. = Do not click links or open attachments unless you recognize the sender and know the content is safe. <= /p>

Hi Bala,

 

Ciphertext will be written into= asym_op->rsa.cipher.data (not message.data) by the PMD, here you are us= ing same address for both hex dumps.

Although there is a bug in debu= g_hexdump in this function which may cause this confusion.

 

Plus, the test you are referrin= g is PWCT test (Pairwise conditional test) -> it will encrypt, then decr= ypt.

Please take a look into this co= mment in queue_ops_rsa_enc_dec function:

/* Use the resulted output as d= ecryption Input vector*

So above this line there is an = encryption part.

Below is decryption.  = ;        

 

Regards,

Arek

 

From: Balakrishnan K <Balakrishnan.K1@tatacommunication= s.com>
Sent: Monday, May 23, 2022 1:33 PM
To:
us= ers@dpdk.org
Subject: how to use crypto openssl PMD for asymmetric encryption and= decryption

 

Hi All,

   I am new to dpdk. = Planning to use openssl crypto PMD for encrypting/decrypting  the pack= ets.

Couldn’t find much docume= nts on openssl PMD for asymmetric encryption/decryption.

Any one please point me in the = right document.

 

I have tried to run the test ca= ses wrote for asymmetric crypto using openssl virtual PMD.

But the output of particular te= st case is same after the encryption done.

 

File : app/test/test_cryptodev_= asym.c

Test executable: ./app/test/dpd= k-test

Test case : test_rsa_enc_dec

    <= /span>

Input given to encryption:&n= bsp;            &nbs= p;

message at [0x1894e60], len=3D2= 0

00000000: F8 BA 1A 55 D0 2F 85 = AE 96 7B B6 2F B6 CD A8 EB | ...U./...{./....

00000010: 7E 78 A0 50 &nbs= p;            &= nbsp;           &nbs= p;          | ~x.P<= /span>

 

After processing the output = also looks like same :

encrypted message exist at [0x1= 894e60], len=3D20

00000000: F8 BA 1A 55 D0 2F 85 = AE 96 7B B6 2F B6 CD A8 EB | ...U./...{./....

00000010: 7E 78 A0 50

 

 

Regards,

Bala

--_000_PSAPR04MB55167EE7F28A38EE575504DAD6D79PSAPR04MB5516apcp_--