From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from g2t2354.austin.hpe.com (g2t2354.austin.hpe.com [15.233.44.27]) by dpdk.org (Postfix) with ESMTP id E3F623250; Thu, 17 May 2018 04:41:20 +0200 (CEST) Received: from G4W9122.americas.hpqcorp.net (exchangepmrr1.us.hpecorp.net [16.210.21.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g2t2354.austin.hpe.com (Postfix) with ESMTPS id C92E8A0; Thu, 17 May 2018 02:41:19 +0000 (UTC) Received: from G2W6310.americas.hpqcorp.net (2002:10c5:4034::10c5:4034) by G4W9122.americas.hpqcorp.net (2002:10d2:1511::10d2:1511) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Thu, 17 May 2018 02:41:19 +0000 Received: from NAM02-SN1-obe.outbound.protection.outlook.com (15.241.52.12) by G2W6310.americas.hpqcorp.net (16.197.64.52) with Microsoft SMTP Server (TLS) id 15.0.1178.4 via Frontend Transport; Thu, 17 May 2018 02:41:19 +0000 Received: from TU4PR8401MB0655.NAMPRD84.PROD.OUTLOOK.COM (10.169.44.149) by TU4PR8401MB0461.NAMPRD84.PROD.OUTLOOK.COM (10.169.43.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.776.11; Thu, 17 May 2018 02:41:17 +0000 Received: from TU4PR8401MB0655.NAMPRD84.PROD.OUTLOOK.COM ([fe80::20d8:b9aa:e9a7:9470]) by TU4PR8401MB0655.NAMPRD84.PROD.OUTLOOK.COM ([fe80::20d8:b9aa:e9a7:9470%15]) with mapi id 15.20.0755.018; Thu, 17 May 2018 02:41:15 +0000 From: "DAS, SANJIB" To: "Trahe, Fiona" , "users@dpdk.org" , "dts@dpdk.org" , "test-report@dpdk.org" CC: "Zhang, Roy Fan" , "De Lara Guarch, Pablo" , "DAS, SANJIB" Thread-Topic: Query on ipsec-secgw with crypto algorithm CCM Thread-Index: AdPiIIJ7nmx03B7KTHyDIqvoLFC5OQEkXUQQACR+LRAAEfnCMAAA9RGwAVXiN6AADoUfIAAZquig Date: Thu, 17 May 2018 02:41:15 +0000 Message-ID: References: <348A99DA5F5B7549AA880327E580B4358947982E@IRSMSX103.ger.corp.intel.com> <348A99DA5F5B7549AA880327E580B4358947DD1D@IRSMSX103.ger.corp.intel.com> <348A99DA5F5B7549AA880327E580B43589483C6D@IRSMSX103.ger.corp.intel.com> In-Reply-To: <348A99DA5F5B7549AA880327E580B43589483C6D@IRSMSX103.ger.corp.intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=sanjib.das@hpe.com; x-originating-ip: [115.112.149.98] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; TU4PR8401MB0461; 7:oQuxcEt6WckjrHtlBc6EUELgwcTgFpzGX4wtTx3kJ6SkjsxKJyUuvQaSuB3jkDusW87k9m3BHFdk/pnt5tEmXVzCKL/0R5oqmAsITA/Dz4Fxt19ERt8jPiJQuNRM4FE8eSwbJlgbCnmb+IKEslJez+uk24DiLwjWck3HvTkmpvk4RyHwAsweMSwCHoBq+PZpKz/hvJYjuFoA/UyYYk9hvbxllkeJl4iR+SH4Qc5K+OM9cHk/ZMyMD7PI90ggofYT x-ms-exchange-antispam-srfa-diagnostics: SOS;SOR; x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(376002)(39860400002)(346002)(39380400002)(396003)(366004)(13464003)(199004)(189003)(81166006)(81156014)(102836004)(8676002)(229853002)(26005)(186003)(6436002)(5250100002)(74316002)(2501003)(2900100001)(66066001)(305945005)(33656002)(8936002)(16799955002)(3660700001)(5660300001)(9686003)(3280700002)(486006)(99286004)(11346002)(6306002)(3846002)(53936002)(446003)(6506007)(55016002)(53546011)(476003)(2906002)(25786009)(76176011)(347745004)(54906003)(4326008)(86362001)(7696005)(14454004)(68736007)(53346004)(6246003)(316002)(110136005)(478600001)(105586002)(6116002)(2201001)(97736004)(7736002)(106356001)(55236004)(93886005); DIR:OUT; SFP:1102; SCL:1; SRVR:TU4PR8401MB0461; H:TU4PR8401MB0655.NAMPRD84.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:(222181515654134); BCL:0; PCL:0; RULEID:(7020095)(4652020)(8989080)(5600026)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(8990040)(48565401081)(2017052603328)(7167020)(7153060)(7193020); SRVR:TU4PR8401MB0461; x-ms-traffictypediagnostic: TU4PR8401MB0461: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(261408538637735)(227479698468861)(222181515654134)(228905959029699); x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231254)(944501410)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:TU4PR8401MB0461; BCL:0; PCL:0; RULEID:; SRVR:TU4PR8401MB0461; x-forefront-prvs: 067553F396 received-spf: None (protection.outlook.com: hpe.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: loO1N93WSr/FHIE5U6L2BQyxueDzPrrcRClpOaNdUW5+d4xamkbKfK71IGUDIcptv2TqmzqYUbDo3s4B1OZU77S7r509VpMHr0hstbFACz3gxKs4nARQS0gJlPcPfQp7yUFvqN83/Wpd/GfV1sa0sA2DrbFS+s86YwxXlyQQmiFMw49mxxSLRbP9VBcbVdfN spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: a0396036-50f1-48e7-33ac-08d5bb9fa91b X-MS-Exchange-CrossTenant-Network-Message-Id: a0396036-50f1-48e7-33ac-08d5bb9fa91b X-MS-Exchange-CrossTenant-originalarrivaltime: 17 May 2018 02:41:15.3182 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-Transport-CrossTenantHeadersStamped: TU4PR8401MB0461 X-OriginatorOrg: hpe.com X-Mailman-Approved-At: Thu, 17 May 2018 18:41:06 +0200 Subject: Re: [dpdk-users] Query on ipsec-secgw with crypto algorithm CCM X-BeenThere: users@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK usage discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 May 2018 02:41:21 -0000 No problem Fiona, Appreciate your reply.=20 Hi Pablo/Fiona, Thought of asking you one more query, is there any sample ipsec-secgw confi= g file with SA rules for 'out' traffic. Looking for one with CGM & CCM support. Just wanted to compare with mine. Thanks, Sanjib my page-0 wiki -----Original Message----- From: Trahe, Fiona [mailto:fiona.trahe@intel.com]=20 Sent: Wednesday, May 16, 2018 7:53 PM To: DAS, SANJIB ; users@dpdk.org; dts@dpdk.org; test-re= port@dpdk.org Cc: Zhang, Roy Fan ; De Lara Guarch, Pablo Subject: RE: Query on ipsec-secgw with crypto algorithm CCM Sorry Sanjib, I'm not familiar with that API or error. Fiona > -----Original Message----- > From: DAS, SANJIB [mailto:sanjib.das@hpe.com] > Sent: Wednesday, May 16, 2018 8:35 AM > To: Trahe, Fiona ; users@dpdk.org;=20 > dts@dpdk.org; test-report@dpdk.org > Cc: Zhang, Roy Fan ; De Lara Guarch, Pablo=20 > ; DAS, SANJIB > Subject: RE: Query on ipsec-secgw with crypto algorithm CCM >=20 > Hi Fiona, >=20 > One query with dpsk-17.11.2 ipsec-secgw. >=20 > I do see API ixgbe_crypto_enable_ipsec() returning me error for both=20 > rx/tx > (dev_conf.rxmode.offloads/dev_conf.txmode.offloads) offload on my target = X86 system. >=20 > It fails to read value whatever it writes either on IXGBE_SECRXCTRL or IX= GBE_SECTXCTRL. > I am currently debugging this issue, but if I ignore these errors it=20 > continues & I can see its handling packets also. >=20 > Does ignoring these errors mean simply its not enabling hw offloads for b= oth rx/tx? > Is my understanding correct? Other than that does it have any other side = effect? >=20 >=20 > Thanks, > Sanjib >=20 >=20 > -----Original Message----- > From: DAS, SANJIB > Sent: Wednesday, May 9, 2018 5:48 PM > To: 'Trahe, Fiona' ; users@dpdk.org;=20 > dts@dpdk.org; test-report@dpdk.org > Cc: Zhang, Roy Fan ; De Lara Guarch, Pablo=20 > > Subject: RE: Query on ipsec-secgw with crypto algorithm CCM >=20 > Thanks a lot Fiona. It worked. >=20 > Thanks, > Sanjib >=20 > my page-0 wiki >=20 >=20 >=20 > -----Original Message----- > From: Trahe, Fiona [mailto:fiona.trahe@intel.com] > Sent: Wednesday, May 9, 2018 5:22 PM > To: DAS, SANJIB ; users@dpdk.org; dts@dpdk.org;=20 > test-report@dpdk.org > Cc: Zhang, Roy Fan ; De Lara Guarch, Pablo=20 > ; Trahe, Fiona > Subject: RE: Query on ipsec-secgw with crypto algorithm CCM >=20 > CCM aead-iv-size should be between 7 and 13, you're setting to 16. > See drivers/crypto/openssl/rte_openssl_pmd_ops.c for openssl=20 > capabilities >=20 >=20 > > -----Original Message----- > > From: DAS, SANJIB [mailto:sanjib.das@hpe.com] > > Sent: Wednesday, May 9, 2018 4:19 AM > > To: Trahe, Fiona ; users@dpdk.org;=20 > > dts@dpdk.org; test-report@dpdk.org > > Cc: Zhang, Roy Fan ; De Lara Guarch, Pablo=20 > > ; DAS, SANJIB > > Subject: RE: Query on ipsec-secgw with crypto algorithm CCM > > > > Thanks Fiona, > > > > Recently I was trying with "dpdk-test-crypto-perf" application & PMD a= s openssl. > > But I do see it fails for CCM (dpdk-17.11.2). This API fails=20 > > rte_cryptodev_sym_capability_check_aead(). It all works fine with GCM. > > > > > > I used this command > > > > ./dpdk-test-crypto-perf -l 1-2 --vdev crypto_openssl -w 0000:00:00.0 > > -- --devtype crypto_openssl --aead- algo aes-ccm --aead-key-sz 16=20 > > --aead-iv-sz 16 --aead-op encrypt --aead-aad-sz 16 --digest-sz 16=20 > > --optype aead --silent --ptest throughput --total-ops 1000000 > > > > Not sure if others too faced this issue. > > > > Thanks, > > Sanjib > > > > my page-0 wiki > > > > > > -----Original Message----- > > From: Trahe, Fiona [mailto:fiona.trahe@intel.com] > > Sent: Tuesday, May 8, 2018 3:26 PM > > To: DAS, SANJIB ; users@dpdk.org; dts@dpdk.org;=20 > > test-report@dpdk.org > > Cc: Zhang, Roy Fan ; De Lara Guarch, Pablo=20 > > > > Subject: RE: Query on ipsec-secgw with crypto algorithm CCM > > > > Hi Sanjib, > > > > Copying Pablo who added unit tests for it in this commit - this=20 > > should give you an example of how to get it working: > > 77a217a19bb72860e26b9aefb19dce92239e0820 > > > > Also copying Fan who added CCM to aesni_mb PMD. > > > > Fiona > > > > > -----Original Message----- > > > From: users [mailto:users-bounces@dpdk.org] On Behalf Of DAS,=20 > > > SANJIB > > > Sent: Wednesday, May 2, 2018 3:21 PM > > > To: users@dpdk.org; dts@dpdk.org; test-report@dpdk.org > > > Cc: DAS, SANJIB > > > Subject: [dpdk-users] Query on ipsec-secgw with crypto algorithm=20 > > > CCM > > > > > > Hello team, > > > > > > I am currently executing performance testing using ipsec-secgw=20 > > > application for different crypto > > algorithms. > > > I was able to execute the tests for crypto algorithms CBC & GCM,=20 > > > but as such dint find much pointers on CCM. From ipsec-secgw=20 > > > sample application source code (DPDK-18.02.1) also it looks CCM=20 > > > support is not there. Could you kindly share your comments on=20 > > > that. Can we actually execute ipsec-secgw > > application for crypto algorithm CCM? > > > > > > > > Thanks, > > > Sanjib > > > > > > my page-0 > > > wiki > > ik > > > i_ > > > space> > > > > > > > > > > > >=20