Hi Chuan,

Please note that we have daily run of IPSec performance tests in CSIT with VPP 
running on the physical NIC with DPDK drivers.
Also please note that every VPP patch is passing unit tests with IETF and NIST 
test encryption vectors.

Other comments inline….


> On 18 Nov 2019, at 23:48, Chuan Han via Lists.Fd.Io 
> <chuanhan=google....@lists.fd.io> wrote:
> 
> Hi, vpp experts,
> 
> I was told that vpp's native ipsec stack is stabler and more performant. We 
> can enable it by commenting out the vdev line in dpdk stanza. 
> 
> However, when I did so, ipsec decryption failed. 
> 
> Ex:
> # commenting out this line makes decryption fail. 
> vdev crypto_aesni_mb0,socket_id=0

Have you validated that in your working case, packets are decrypted correctly?
Can you share packet trace for both cases?

> 
> Did anyone ever make native ipsec stack, i.e., ia32 work with dpdk/phy nic?

yes, it is tested and working on the daily basis.
> 
> The interesting thing is no matter whether I comment out the vdev line or 
> not, ia32 is shown as the active crypto handler for aes-gcm-256. Does this 
> mean ia32 is used by both cases? 
> 
> vpp# sh crypto engines 
> Name                Prio    Description
> ia32                100     Intel IA32 ISA Optimized Crypto
> ipsecmb             80      Intel(R) Multi-Buffer Crypto for IPsec Library 
> 0.52.0
> openssl             50      OpenSSL
> vpp# sh crypto handlers 
> Algo                Type                Active              Candidates
> (nil)               
> des-cbc             encrypt             openssl             openssl 
>                     decrypt             openssl             openssl 
> 3des-cbc            encrypt             openssl             openssl 
>                     decrypt             openssl             openssl 
> aes-128-cbc         encrypt             ia32                ia32 ipsecmb 
> openssl 
>                     decrypt             ia32                ia32 ipsecmb 
> openssl 
> aes-192-cbc         encrypt             ia32                ia32 ipsecmb 
> openssl 
>                     decrypt             ia32                ia32 ipsecmb 
> openssl 
> aes-256-cbc         encrypt             ia32                ia32 ipsecmb 
> openssl 
>                     decrypt             ia32                ia32 ipsecmb 
> openssl 
> aes-128-ctr         encrypt             openssl             openssl 
>                     decrypt             openssl             openssl 
> aes-192-ctr         encrypt             openssl             openssl 
>                     decrypt             openssl             openssl 
> aes-256-ctr         encrypt             openssl             openssl 
>                     decrypt             openssl             openssl 
> aes-128-gcm         aead-encrypt        ia32                ia32 ipsecmb 
> openssl 
>                     aead-decrypt        ia32                ia32 ipsecmb 
> openssl 
> aes-192-gcm         aead-encrypt        ia32                ia32 ipsecmb 
> openssl 
>                     aead-decrypt        ia32                ia32 ipsecmb 
> openssl 
> aes-256-gcm         aead-encrypt        ia32                ia32 ipsecmb 
> openssl 
>                     aead-decrypt        ia32                ia32 ipsecmb 
> openssl 
> hmac-md5            hmac                openssl             openssl 
> hmac-sha-1          hmac                ipsecmb             ipsecmb openssl 
> hmac-sha-224        hmac                ipsecmb             ipsecmb openssl 
> hmac-sha-256        hmac                ipsecmb             ipsecmb openssl 
> hmac-sha-384        hmac                ipsecmb             ipsecmb openssl 
> hmac-sha-512        hmac                ipsecmb             ipsecmb openssl 
> vpp# 

“show crypto handlers” command is part of new crypto infra, and that command 
doesn’t have anything with dpdk ipsec implementation.
If you turn on dpdk ipsec, new crypto infra is simply not used...

> 
> I attached the two servers' startup conf files and topology diagram. 
> 
> Any input/comments are welcome. 
> Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [dmar...@me.com]
> -=-=-=-=-=-=-=-=-=-=-=-

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#14621): https://lists.fd.io/g/vpp-dev/message/14621
Mute This Topic: https://lists.fd.io/mt/60327762/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to