<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hardware accelerated disk encryption in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281952#M32630</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also having this problem.&amp;nbsp; If I set CONFIG_CRYPTO_DEV_FSL_CAAM_CRYPTO_API in my system and then try to create an encrypted disk, my system hangs.&amp;nbsp; If I don't set this (in which case I assume the software implementation goes into effect), everything works fine.&amp;nbsp; Although I must admit it's not really noticeably slow either, so for now I am going to limp along with the software encryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied the suggested kernel patches (although maybe someone could give me the list of patches applicable to this just to make sure?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the 3.0.101 LTIB kernel from the 3.0.101-4.1.1 distro.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Dean&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jan 2016 20:49:12 GMT</pubDate>
    <dc:creator>deanmatsen</dc:creator>
    <dc:date>2016-01-19T20:49:12Z</dc:date>
    <item>
      <title>Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281945#M32623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd like to implement disk encryption on an i.MX6-based device. I've tried TrueCrypt, dm-crypt/LUKS, and ecryptfs(passphrase) under Ubuntu, but there's a huge performance with all of them even with the MX6Q. Is there a way to use the MX6's AES acceleration to provide a fast disk encryption solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 18:35:01 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281945#M32623</guid>
      <dc:creator>kguilbert</dc:creator>
      <dc:date>2013-04-23T18:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281946#M32624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could try to use the CAAM I guess. Right now (and if I am not wrong) applications (like OpenSSL) are not able to take advantage of it so you could try the performance with some C code. But that's not an easy thing to do for the moment, waiting a full support of CAAM is a better option in my opinion.&lt;/P&gt;&lt;P&gt;I don't know how disk encryption works, does it encrypt the full disk like one archive or every single file ? If that's the latter SW encryption should be definitely the better option anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Jocelyn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Apr 2013 07:11:23 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281946#M32624</guid>
      <dc:creator>AlbertT</dc:creator>
      <dc:date>2013-04-24T07:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281947#M32625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've used TrueCrypt successfully. LUKS (using cryptsetup) seems to work &lt;/P&gt;&lt;P&gt;on small partitions, but on larger ones, mkfs hangs up, so something &lt;/P&gt;&lt;P&gt;isn't working right there. With respect to CAAM, it does seem like it's &lt;/P&gt;&lt;P&gt;not well integrated yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Different encryption solutions work differently. TrueCrypt and LUKS &lt;/P&gt;&lt;P&gt;encrypt the entire device using device-mapper to provide the interface &lt;/P&gt;&lt;P&gt;to the encrypted device. There's also ecryptfs which is a layered file &lt;/P&gt;&lt;P&gt;system that encrypts file contents (though it can be set up to also &lt;/P&gt;&lt;P&gt;encrypt file system metadata).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has found a good solution for this, let me know!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kyle&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 14:57:51 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281947#M32625</guid>
      <dc:creator>kguilbert</dc:creator>
      <dc:date>2013-04-25T14:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281948#M32626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After some experimentation, I found out that CAAM causes cryptsetup/LUKS &lt;/P&gt;&lt;P&gt;to break -- creating the filesystem hangs indefinitely. After I disable &lt;/P&gt;&lt;P&gt;CAAM in the kernel, LUKS encryption works beautifully -- though it slows &lt;/P&gt;&lt;P&gt;my file system performance from ~150 MB/s to ~20 MB/s.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kyle&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 18:20:22 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281948#M32626</guid>
      <dc:creator>kguilbert</dc:creator>
      <dc:date>2013-04-29T18:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281949#M32627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did any of you guys make some progress on this matter?&lt;/P&gt;&lt;P&gt;I would really like to use CAAM with cryptsetup. Is this doable?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ofer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Jan 2014 15:03:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281949#M32627</guid>
      <dc:creator>ofer_livny</dc:creator>
      <dc:date>2014-01-19T15:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281950#M32628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also interested if that has been any movement on this issue as we would like to use the CAAM for dmCrypt/LUKS to encrypt sensitive data on a i.MX6 system?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 19:52:14 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281950#M32628</guid>
      <dc:creator>davidwilliams</dc:creator>
      <dc:date>2014-02-06T19:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281951#M32629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using Yocto v1.7 and cryptsetup doesn't take any CAAM accelerated encryption cipher, such as cbc(aes). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cryptsetup --cipher="cbc(aes)"&amp;nbsp; create&amp;nbsp; blahfs&amp;nbsp;&amp;nbsp; /media/flash/blah&lt;/P&gt;&lt;P&gt;Enter passphrase: ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;device-mapper: reload ioctl on&amp;nbsp; failed: Invalid argument&lt;/P&gt;&lt;P&gt;device-mapper: table: 254:0: crypt: Bad cipher specification&lt;/P&gt;&lt;P&gt;device-mapper: ioctl: error adding target to table&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bernardo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jun 2015 16:06:32 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281951#M32629</guid>
      <dc:creator>bernardo</dc:creator>
      <dc:date>2015-06-23T16:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281952#M32630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also having this problem.&amp;nbsp; If I set CONFIG_CRYPTO_DEV_FSL_CAAM_CRYPTO_API in my system and then try to create an encrypted disk, my system hangs.&amp;nbsp; If I don't set this (in which case I assume the software implementation goes into effect), everything works fine.&amp;nbsp; Although I must admit it's not really noticeably slow either, so for now I am going to limp along with the software encryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied the suggested kernel patches (although maybe someone could give me the list of patches applicable to this just to make sure?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the 3.0.101 LTIB kernel from the 3.0.101-4.1.1 distro.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Dean&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jan 2016 20:49:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281952#M32630</guid>
      <dc:creator>deanmatsen</dc:creator>
      <dc:date>2016-01-19T20:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281953#M32631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try --cipher="aes-cbc-plain"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jan 2016 20:52:25 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281953#M32631</guid>
      <dc:creator>deanmatsen</dc:creator>
      <dc:date>2016-01-19T20:52:25Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281954#M32632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your suggestion doesn't guarantee that it uses the CAAM. &amp;nbsp;So, the question is still unsanswered? I tried to find out and it actually didnt work. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT1:&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are other things that are to be considered&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;cryptsetup backend: OpenSSL or gCrypt&lt;UL&gt;&lt;LI&gt;Through OpenSSL, Hardware acceleration (CAAM) is possible only through cryptodev (/dev/crypto) module. This module has to be compiled seperately for the kernel.&lt;/LI&gt;&lt;LI&gt;gCrypt has some hardware accelration but doesn't use CAAM, it uses NEON or ARMv8 (64-bit) crypto modules which are part of the processor.&lt;/LI&gt;&lt;LI&gt;It is important to note that CAAM is a special hardware whereas NEON, etc are part of the processor with different instruction sets (&lt;EM&gt;This is what I understood from my research and the way it works. Correct me if I am wrong)&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;Also OpenSSL backend is faster than gCrypt. I can guarantee this as I made tests. gCrypt is the default backend for cryptsetup but if you want a faster one please use OpenSSL over gCrypt.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Device Encryption:&amp;nbsp;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;AES uses two cipher modes CBC or XTS for device encryption.&lt;/LI&gt;&lt;LI&gt;There are two types of CAAM: Low Power CAAM and High Power CAAM. My device iMX6 Quad has is LP CAAM. It doesn't provide support to XTS and only CBC cipher mode is supported. HP CAAM does provide support XTS cipher mode.&lt;/LI&gt;&lt;LI&gt;LUKS uses XTS cipher mode by default but can be forced to use CBC cipher mode through "--cipher or -c" in cryptsetup. LUKS is the best for cryptsetup. So, if you have LP CAAM then your hardware acceleration for cryptsetup isn't of any use here.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets,&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2017 16:58:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281954#M32632</guid>
      <dc:creator>satyadamarla</dc:creator>
      <dc:date>2017-02-13T16:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281955#M32633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using dm-crypt with default (so I'm using XTS mode) on imx6UL. I made several tests on writing speed on the encrypted partition. I tried several different supports (sd-card...NFS folder... tmpfs) and I always obtained a writing speed of 5.5 MB/s. With cryptsetup benchmark i obtain a useful encryption speed of 9MB/s. This can be related to a wrong setting or it's a common loss of speed due to other operations different from the simple AES-sencryption. (I just ask you if you have tried this before and have observed something similar).&lt;/P&gt;&lt;P&gt;Then I don't understand how can I set the usage of HP instead of LP CAAM, and how can I check what dm-crypt is really using now? Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 08:30:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281955#M32633</guid>
      <dc:creator>giuliodominutti</dc:creator>
      <dc:date>2017-10-23T08:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281956#M32634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Ideal hardware enabled build chain:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cryptsetup&amp;nbsp; --&amp;gt; OpenSSL&amp;nbsp; --&amp;gt; cryptodev (facilitates hardware engines to be used)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Answers:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;* HP CAAM or LP CAAM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;You cannot set them. It's a hardware feature. Read the Security Reference manual of your CPU. Mine is iMX6q and it has Low Power CAAM. Low Power CAAM doesn't support XTS cipher code which is the default of cryptsetup's Linux Unified Key Setup (LUKS). If you modify this to use other cipher modes than XTS than there is a chance of using the hardware CAAM.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;* OpenSSl vs. gCrypt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;gCrypt wasn't written with hardware acceleration in mind (The author of gCrypt said this). It supports hardware acceleration now but not special hardware modules like CAAM. It supports hardware acceleration through seperate "instruction sets" like Intel's AES-NI or ARM's NEON.&lt;/P&gt;&lt;P&gt;On the other hand, OpenSSL supports hardware acceleration through hardware modules like CAAM. These are called engines and for this OpenSSL has to be build with Cryptodev.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;* cryptsetup benchmarks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;It depend on how cryptsetup is build. Is it build with OpenSSL or with gCrypt? Build it with OpenSSL and test it with the one build with gCrypt. You will have different benchmarks. I remember doing it few years ago.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;* cryptodev&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you are using default XTS mode and have a LP CAAM or HP CAAM but didn't use cryptodev then you are not using hardware acceleration. I can confirm you that&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets,&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Oct 2017 09:32:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281956#M32634</guid>
      <dc:creator>satyadamarla</dc:creator>
      <dc:date>2017-10-25T09:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281957#M32635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In these weeks I tried to change kernel, now I'm sure to have the cryptodev working.&lt;BR /&gt;I tested it with: "openssl speed -evp aes-128-cbc -engine cryptodev" and I can see the difference with the same command without the cryptodev.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;engine "cryptodev" set.&lt;BR /&gt;Doing aes-128-cbc for 3s on 16 size blocks: 44868 aes-128-cbc's in 0.16s&lt;BR /&gt;Doing aes-128-cbc for 3s on 64 size blocks: 44355 aes-128-cbc's in 0.19s&lt;BR /&gt;Doing aes-128-cbc for 3s on 256 size blocks: 35367 aes-128-cbc's in 0.35s&lt;BR /&gt;Doing aes-128-cbc for 3s on 1024 size blocks: 30326 aes-128-cbc's in 0.15s&lt;BR /&gt;Doing aes-128-cbc for 3s on 8192 size blocks: 10236 aes-128-cbc's in 0.04s&lt;BR /&gt;OpenSSL 1.0.2h&amp;nbsp; 3 May 2016&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'm also sure that the created disk uses as backend openssl with:&lt;/P&gt;&lt;P&gt;"cryptsetup luksDump &amp;lt;your luks device&amp;gt; --debug | grep backend" &lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;# Initialising device-mapper backend library.&lt;BR /&gt;# Crypto backend (OpenSSL 1.0.2h&amp;nbsp; 3 May 2016) initialized in cryptsetup library &lt;BR /&gt;version 1.7.0.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;But also if openSSL seems to work fine cryptsetup benchmark achieves same results as before, and also testing the writing speed with&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&amp;nbsp;time dd bs=50MB count=1 if=/dev/zero of=/home/encryptroot/provaNF conv=fsync&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I obtain always around a speed of 5/6 MB/s.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if there are other thing that I can change (I'm pretty sure that the writing is still not using caam).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 15:08:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281957#M32635</guid>
      <dc:creator>giuliodominutti</dc:creator>
      <dc:date>2017-11-23T15:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281958#M32636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is very important to know that &lt;EM&gt;/dev/zero&lt;/EM&gt; is a software (kernel based) zero generator.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CAAM FIPS-140 certified Random Number Generator:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you have CAAM random number generator enabled in your kernel then it is available as &lt;EM&gt;/dev/hwrng&lt;/EM&gt;&amp;nbsp;(or something like that, I don't remember it anymore. Please check it. CAAM was causing problems for us and so, we disabled it.).&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;LUKS by default uses &lt;EM&gt;/&lt;/EM&gt;&lt;EM&gt;dev/urandom.&lt;/EM&gt;&amp;nbsp;So, one has to force cryptsetup to use&amp;nbsp;&lt;EM&gt;/dev/hwrng&amp;nbsp;&lt;/EM&gt;and then the creation of an encrypted block device is hardware accelerated. Currently cryptsetup only supports &lt;EM&gt;/dev/random (--use-random)&amp;nbsp;&lt;/EM&gt;which is very slow and &lt;EM&gt;/dev/urandom&lt;/EM&gt; which is faster.&amp;nbsp;&lt;STRONG&gt;Therefore, if you want to use the CAAM's&amp;nbsp;&lt;EM&gt;/devhwrng&lt;/EM&gt;, then you have to change the configuration of cryptsetup and introduce changes to enable other random number providers and build you own cryptsetup.&amp;nbsp;&lt;/STRONG&gt;This is the only way you can use CAAM's&amp;nbsp;&lt;EM&gt;/dev/hwrng.&amp;nbsp;&lt;/EM&gt;This will tremondously increase the speed of creation of a LUKS partition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is just one step. I will update this later. These steps would include how to use to CAAM hardware acceleration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good Luck,&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2017 14:05:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281958#M32636</guid>
      <dc:creator>satyadamarla</dc:creator>
      <dc:date>2017-11-28T14:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281959#M32637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kyle,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have reproduced the same scenario using aes-ecb with the command below &lt;BR /&gt;cryptsetup -v --cipher aes-ecb --key-size 256 --hash sha256 --iter-time 2000 --use-urandom --verify-passphrase luksFormat test_file&lt;BR /&gt;Have you made any follow-up regarding this issue or have you find any fix?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Catalin&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 08:37:25 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281959#M32637</guid>
      <dc:creator>catalinneagu</dc:creator>
      <dc:date>2018-05-11T08:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281960#M32638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Is there any further update on this ?&lt;/P&gt;&lt;P&gt;I have similar requirement and looking for solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards&lt;/P&gt;&lt;P&gt;Varsha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2018 13:32:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281960#M32638</guid>
      <dc:creator>varsha_a</dc:creator>
      <dc:date>2018-12-11T13:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281961#M32639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;&amp;nbsp; Please create request to get more information about disk encryption, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;using CAAM-accelerated dm-crypt.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Yuri.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2018 10:10:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/281961#M32639</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2018-12-12T10:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Hardware accelerated disk encryption</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/1828795#M221290</link>
      <description>&lt;P&gt;&lt;BR /&gt;Just leaving this comment so no one else has to spend as much time as I did trying to get this to work.&lt;BR /&gt;&lt;BR /&gt;This is not possible on newer versions of the Linux Kernel. The CAAM drivers have the&amp;nbsp;CRYPTO_ALG_ALLOCATES_MEMORY flag which will prevent dm-crypt from using them.&lt;BR /&gt;&lt;BR /&gt;source:&amp;nbsp;&lt;A href="https://github.com/torvalds/linux/commit/cd74693870fb748d812867ba49af733d689a3604" target="_blank"&gt;https://github.com/torvalds/linux/commit/cd74693870fb748d812867ba49af733d689a3604&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 19:48:17 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Hardware-accelerated-disk-encryption/m-p/1828795#M221290</guid>
      <dc:creator>rmsaad</dc:creator>
      <dc:date>2024-03-14T19:48:17Z</dc:date>
    </item>
  </channel>
</rss>

