<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックQuestions regarding article from KB about enhancing cryptodev+OpenSSL</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Questions-regarding-article-from-KB-about-enhancing-cryptodev/m-p/1451751#M189918</link>
    <description>&lt;P&gt;Hi all and&amp;nbsp;@&lt;A href="https://community.nxp.com/t5/user/viewprofilepage/user-id/30869" target="_self"&gt;&lt;SPAN class=""&gt;xiaodong_zhang&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I mean this article&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors-Knowledge-Base/Enhance-cryptodev-and-its-engine-in-OpenSSL-by-CAAM-s-public-key/ta-p/1101000" target="_blank" rel="noopener"&gt;Enhance cryptodev and its engine in OpenSSL by CAA... - NXP Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Is it really supposed to run properly on iMX7D? Article suggests yes, but I have serious problems with it. If iMX7 indeed is not supported, then which iMX variants are really compatible with these patches? I used kernel 5.4. Perhaps I'm doing something wrong, then just confirm it is really OK for iMX7 and that you don't experience issues like these:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, it improves benchmarks noticeably. But we need not only speed improvements, but as well compatible encrypt/decrypt and digest operations to allow interoperation of network nodes using cryptodev and not using cryptodev. I mean `openssl enc` and `openssl enc -d` should be able to decrypt and encrypt files not only when cryptodev is always loaded/ aloways not loaded, bus as well:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;cryptodev unloaded at encryption time +&amp;nbsp;cryptodev loaded at decryption time&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;cryptodev loaded at encryption time +&amp;nbsp;cryptodev unloaded at decryption time&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;openssl dgst should give the same results with cryptodev loaded and unloaded. Hopefully I see no problems with dighests&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;`openssl s_client -connect mysite.com:443` should work OK with cryptodev loaded when connecting to different TLS hosts, which are using different certificates and encodings.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My results:&lt;/P&gt;&lt;P&gt;`openssl s_client`&amp;nbsp; doesn't work properly at all with cryptodev loaded. You may try connecting to &lt;A href="http://www.google.com:443" target="_blank" rel="noopener"&gt;www.google.com:443&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;All added OFB and CFB cipher modes are broken. For example using -aes-128-ofb, not possible to decrypt file encrypted with opposite state of cryptodev loaded/unloaded status, like this&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;# modprobe cryptodev&lt;/P&gt;&lt;P&gt;# echo "Abrakadabra" | openssl enc -aes-128-ofb -out file.enc -iter 1&lt;/P&gt;&lt;P&gt;# rmmod cryptodev&lt;/P&gt;&lt;P&gt;# openssl enc -d -aes-128-ofb -in file.enc -iter 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;In contrast the same works well replacing -ofb with -ecb, - ctr and others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;</description>
    <pubDate>Mon, 02 May 2022 09:05:31 GMT</pubDate>
    <dc:creator>kef2</dc:creator>
    <dc:date>2022-05-02T09:05:31Z</dc:date>
    <item>
      <title>Questions regarding article from KB about enhancing cryptodev+OpenSSL</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Questions-regarding-article-from-KB-about-enhancing-cryptodev/m-p/1451751#M189918</link>
      <description>&lt;P&gt;Hi all and&amp;nbsp;@&lt;A href="https://community.nxp.com/t5/user/viewprofilepage/user-id/30869" target="_self"&gt;&lt;SPAN class=""&gt;xiaodong_zhang&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I mean this article&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/i-MX-Processors-Knowledge-Base/Enhance-cryptodev-and-its-engine-in-OpenSSL-by-CAAM-s-public-key/ta-p/1101000" target="_blank" rel="noopener"&gt;Enhance cryptodev and its engine in OpenSSL by CAA... - NXP Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Is it really supposed to run properly on iMX7D? Article suggests yes, but I have serious problems with it. If iMX7 indeed is not supported, then which iMX variants are really compatible with these patches? I used kernel 5.4. Perhaps I'm doing something wrong, then just confirm it is really OK for iMX7 and that you don't experience issues like these:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, it improves benchmarks noticeably. But we need not only speed improvements, but as well compatible encrypt/decrypt and digest operations to allow interoperation of network nodes using cryptodev and not using cryptodev. I mean `openssl enc` and `openssl enc -d` should be able to decrypt and encrypt files not only when cryptodev is always loaded/ aloways not loaded, bus as well:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;cryptodev unloaded at encryption time +&amp;nbsp;cryptodev loaded at decryption time&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;cryptodev loaded at encryption time +&amp;nbsp;cryptodev unloaded at decryption time&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;openssl dgst should give the same results with cryptodev loaded and unloaded. Hopefully I see no problems with dighests&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;`openssl s_client -connect mysite.com:443` should work OK with cryptodev loaded when connecting to different TLS hosts, which are using different certificates and encodings.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My results:&lt;/P&gt;&lt;P&gt;`openssl s_client`&amp;nbsp; doesn't work properly at all with cryptodev loaded. You may try connecting to &lt;A href="http://www.google.com:443" target="_blank" rel="noopener"&gt;www.google.com:443&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;All added OFB and CFB cipher modes are broken. For example using -aes-128-ofb, not possible to decrypt file encrypted with opposite state of cryptodev loaded/unloaded status, like this&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;# modprobe cryptodev&lt;/P&gt;&lt;P&gt;# echo "Abrakadabra" | openssl enc -aes-128-ofb -out file.enc -iter 1&lt;/P&gt;&lt;P&gt;# rmmod cryptodev&lt;/P&gt;&lt;P&gt;# openssl enc -d -aes-128-ofb -in file.enc -iter 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;In contrast the same works well replacing -ofb with -ecb, - ctr and others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edward&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 09:05:31 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Questions-regarding-article-from-KB-about-enhancing-cryptodev/m-p/1451751#M189918</guid>
      <dc:creator>kef2</dc:creator>
      <dc:date>2022-05-02T09:05:31Z</dc:date>
    </item>
  </channel>
</rss>

