2018-02-01 17:18:17 +00:00
|
|
|
.. SPDX-License-Identifier: BSD-3-Clause
|
2019-01-09 12:11:12 +00:00
|
|
|
Copyright(c) 2015-2018 Intel Corporation.
|
2015-11-25 13:25:15 +00:00
|
|
|
|
2017-03-22 16:15:57 +00:00
|
|
|
AESN-NI Multi Buffer Crypto Poll Mode Driver
|
2015-11-25 13:25:15 +00:00
|
|
|
============================================
|
|
|
|
|
|
|
|
|
2020-11-03 12:36:02 +00:00
|
|
|
The AESNI MB PMD (**librte_crypto_aesni_mb**) provides poll mode crypto driver
|
2015-12-15 09:38:59 +00:00
|
|
|
support for utilizing Intel multi buffer library, see the white paper
|
2015-11-25 13:25:15 +00:00
|
|
|
`Fast Multi-buffer IPsec Implementations on Intel® Architecture Processors
|
2018-02-14 17:14:06 +00:00
|
|
|
<https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/fast-multi-buffer-ipsec-implementations-ia-processors-paper.pdf>`_.
|
2015-11-25 13:25:15 +00:00
|
|
|
|
|
|
|
The AES-NI MB PMD has current only been tested on Fedora 21 64-bit with gcc.
|
|
|
|
|
2020-04-17 15:03:48 +00:00
|
|
|
The AES-NI MB PMD supports synchronous mode of operation with
|
|
|
|
``rte_cryptodev_sym_cpu_crypto_process`` function call.
|
|
|
|
|
2015-11-25 13:25:15 +00:00
|
|
|
Features
|
|
|
|
--------
|
|
|
|
|
|
|
|
AESNI MB PMD has support for:
|
|
|
|
|
|
|
|
Cipher algorithms:
|
|
|
|
|
2016-09-19 11:14:52 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_AES128_CBC
|
|
|
|
* RTE_CRYPTO_CIPHER_AES192_CBC
|
|
|
|
* RTE_CRYPTO_CIPHER_AES256_CBC
|
|
|
|
* RTE_CRYPTO_CIPHER_AES128_CTR
|
|
|
|
* RTE_CRYPTO_CIPHER_AES192_CTR
|
|
|
|
* RTE_CRYPTO_CIPHER_AES256_CTR
|
2017-02-23 15:06:29 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_AES_DOCSISBPI
|
2017-10-05 05:27:58 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_DES_CBC
|
2018-06-08 09:10:01 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_3DES_CBC
|
2017-10-05 05:27:58 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_DES_DOCSISBPI
|
2020-09-11 15:49:26 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_AES128_ECB
|
|
|
|
* RTE_CRYPTO_CIPHER_AES192_ECB
|
|
|
|
* RTE_CRYPTO_CIPHER_AES256_ECB
|
2020-10-09 11:29:52 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_ZUC_EEA3
|
2020-10-09 11:29:53 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_SNOW3G_UEA2
|
2020-10-09 11:29:54 +00:00
|
|
|
* RTE_CRYPTO_CIPHER_KASUMI_F8
|
2015-11-25 13:25:15 +00:00
|
|
|
|
|
|
|
Hash algorithms:
|
|
|
|
|
2020-10-09 11:29:52 +00:00
|
|
|
* RTE_CRYPTO_AUTH_MD5_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_SHA1_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_SHA224_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_SHA256_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_SHA384_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_SHA512_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_AES_XCBC_HMAC
|
|
|
|
* RTE_CRYPTO_AUTH_AES_CMAC
|
|
|
|
* RTE_CRYPTO_AUTH_AES_GMAC
|
|
|
|
* RTE_CRYPTO_AUTH_SHA1
|
|
|
|
* RTE_CRYPTO_AUTH_SHA224
|
|
|
|
* RTE_CRYPTO_AUTH_SHA256
|
|
|
|
* RTE_CRYPTO_AUTH_SHA384
|
|
|
|
* RTE_CRYPTO_AUTH_SHA512
|
|
|
|
* RTE_CRYPTO_AUTH_ZUC_EIA3
|
2020-10-09 11:29:53 +00:00
|
|
|
* RTE_CRYPTO_AUTH_SNOW3G_UIA2
|
2020-10-09 11:29:54 +00:00
|
|
|
* RTE_CRYPTO_AUTH_KASUMI_F9
|
2015-11-25 13:25:15 +00:00
|
|
|
|
2017-12-19 15:34:30 +00:00
|
|
|
AEAD algorithms:
|
|
|
|
|
|
|
|
* RTE_CRYPTO_AEAD_AES_CCM
|
2018-10-10 11:04:41 +00:00
|
|
|
* RTE_CRYPTO_AEAD_AES_GCM
|
2020-10-09 12:05:21 +00:00
|
|
|
* RTE_CRYPTO_AEAD_CHACHA20_POLY1305
|
2017-12-19 15:34:30 +00:00
|
|
|
|
2020-07-03 12:39:29 +00:00
|
|
|
Protocol offloads:
|
|
|
|
|
|
|
|
* RTE_SECURITY_PROTOCOL_DOCSIS
|
|
|
|
|
2015-11-25 13:25:15 +00:00
|
|
|
Limitations
|
|
|
|
-----------
|
|
|
|
|
|
|
|
* Chained mbufs are not supported.
|
2020-07-03 12:39:29 +00:00
|
|
|
* Out-of-place is not supported for combined Crypto-CRC DOCSIS security
|
|
|
|
protocol.
|
|
|
|
* RTE_CRYPTO_CIPHER_DES_DOCSISBPI is not supported for combined Crypto-CRC
|
|
|
|
DOCSIS security protocol.
|
2021-10-15 14:39:47 +00:00
|
|
|
* The only tag size supported for ZUC-EIA3-256 is 4 bytes.
|
2017-07-13 05:36:48 +00:00
|
|
|
|
2015-11-25 13:25:15 +00:00
|
|
|
|
|
|
|
Installation
|
|
|
|
------------
|
|
|
|
|
2017-02-10 12:33:42 +00:00
|
|
|
To build DPDK with the AESNI_MB_PMD the user is required to download the multi-buffer
|
|
|
|
library from `here <https://github.com/01org/intel-ipsec-mb>`_
|
2016-12-19 17:29:01 +00:00
|
|
|
and compile it on their user system before building DPDK.
|
2022-02-23 18:22:45 +00:00
|
|
|
The latest version of the library supported by this PMD is v1.2, which
|
|
|
|
can be downloaded from `<https://github.com/01org/intel-ipsec-mb/archive/v1.2.zip>`_.
|
2015-11-25 13:25:15 +00:00
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
2018-03-27 12:14:29 +00:00
|
|
|
make
|
|
|
|
make install
|
2015-11-25 13:25:15 +00:00
|
|
|
|
2020-05-21 09:15:12 +00:00
|
|
|
The library requires NASM to be built. Depending on the library version, it might
|
|
|
|
require a minimum NASM version (e.g. v0.54 requires at least NASM 2.14).
|
|
|
|
|
|
|
|
NASM is packaged for different OS. However, on some OS the version is too old,
|
|
|
|
so a manual installation is required. In that case, NASM can be downloaded from
|
|
|
|
`NASM website <https://www.nasm.us/pub/nasm/releasebuilds/?C=M;O=D>`_.
|
|
|
|
Once it is downloaded, extract it and follow these steps:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
./configure
|
|
|
|
make
|
|
|
|
make install
|
|
|
|
|
2020-02-17 17:12:55 +00:00
|
|
|
.. note::
|
|
|
|
|
|
|
|
Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53.
|
|
|
|
If a lower GCC version than 5.0, the workaround proposed by the following link
|
|
|
|
should be used: `<https://github.com/intel/intel-ipsec-mb/issues/40>`_.
|
|
|
|
|
2017-03-30 15:04:18 +00:00
|
|
|
As a reference, the following table shows a mapping between the past DPDK versions
|
|
|
|
and the Multi-Buffer library version supported by them:
|
|
|
|
|
|
|
|
.. _table_aesni_mb_versions:
|
|
|
|
|
|
|
|
.. table:: DPDK and Multi-Buffer library version compatibility
|
|
|
|
|
2017-10-05 05:27:57 +00:00
|
|
|
============== ============================
|
|
|
|
DPDK version Multi-buffer library version
|
|
|
|
============== ============================
|
|
|
|
2.2 - 16.11 0.43 - 0.44
|
|
|
|
17.02 0.44
|
2017-12-19 09:27:55 +00:00
|
|
|
17.05 - 17.08 0.45 - 0.48
|
|
|
|
17.11 0.47 - 0.48
|
2018-03-27 12:14:29 +00:00
|
|
|
18.02 0.48
|
2019-03-25 13:58:35 +00:00
|
|
|
18.05 - 19.02 0.49 - 0.52
|
2019-11-04 09:32:46 +00:00
|
|
|
19.05 - 19.08 0.52
|
2021-10-15 14:39:46 +00:00
|
|
|
19.11 - 20.08 0.52 - 0.55
|
2022-02-23 18:22:45 +00:00
|
|
|
20.11 - 21.08 0.53 - 1.2*
|
|
|
|
21.11+ 1.0 - 1.2*
|
2017-10-05 05:27:57 +00:00
|
|
|
============== ============================
|
2017-03-30 15:04:18 +00:00
|
|
|
|
2021-06-23 16:20:15 +00:00
|
|
|
\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system.
|
2017-03-30 15:04:18 +00:00
|
|
|
|
2016-04-04 13:14:37 +00:00
|
|
|
Initialization
|
|
|
|
--------------
|
|
|
|
|
|
|
|
In order to enable this virtual crypto PMD, user must:
|
|
|
|
|
|
|
|
* Build the multi buffer library (explained in Installation section).
|
|
|
|
|
|
|
|
To use the PMD in an application, user must:
|
|
|
|
|
2017-05-04 16:01:19 +00:00
|
|
|
* Call rte_vdev_init("crypto_aesni_mb") within the application.
|
2016-04-04 13:14:37 +00:00
|
|
|
|
2017-05-04 16:01:19 +00:00
|
|
|
* Use --vdev="crypto_aesni_mb" in the EAL options, which will call rte_vdev_init() internally.
|
2016-04-04 13:14:37 +00:00
|
|
|
|
|
|
|
The following parameters (all optional) can be provided in the previous two calls:
|
|
|
|
|
|
|
|
* socket_id: Specify the socket where the memory for the device is going to be allocated
|
|
|
|
(by default, socket_id will be the socket where the core that is creating the PMD is running on).
|
|
|
|
|
|
|
|
* max_nb_queue_pairs: Specify the maximum number of queue pairs in the device (8 by default).
|
|
|
|
|
|
|
|
* max_nb_sessions: Specify the maximum number of sessions that can be created (2048 by default).
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
2020-10-21 08:17:16 +00:00
|
|
|
./dpdk-l2fwd-crypto -l 1 -n 4 --vdev="crypto_aesni_mb,socket_id=0,max_nb_sessions=128" \
|
2017-07-26 00:59:59 +00:00
|
|
|
-- -p 1 --cdev SW --chain CIPHER_HASH --cipher_algo "aes-cbc" --auth_algo "sha1-hmac"
|
2017-07-02 02:55:05 +00:00
|
|
|
|
|
|
|
Extra notes
|
|
|
|
-----------
|
|
|
|
|
|
|
|
For AES Counter mode (AES-CTR), the library supports two different sizes for Initialization
|
|
|
|
Vector (IV):
|
|
|
|
|
2019-04-26 15:14:21 +00:00
|
|
|
* 12 bytes: used mainly for IPsec, as it requires 12 bytes from the user, which internally
|
2017-07-02 02:55:05 +00:00
|
|
|
are appended the counter block (4 bytes), which is set to 1 for the first block
|
|
|
|
(no padding required from the user)
|
|
|
|
|
|
|
|
* 16 bytes: when passing 16 bytes, the library will take them and use the last 4 bytes
|
|
|
|
as the initial counter block for the first block.
|