[tor-relays] hardware accelerated crypto
Gordon Morehouse
gordon at morehouse.me
Wed Oct 2 18:59:30 UTC 2013
Happily, it DOES appear that there may be some hope for the Allwinner A20 based Cubieboard 2 (I haven't checked for the original Cubieboard yet):
"The Security System (SS) is one encrypt/ decrypt function accelerator that is suitable for a variety of
applications. It supports both encryption and decryption. Several modes are supported by the SS
module.
It features:
AES, DES, 3DES, SHA-1, MD5 are supported by this system
ECB, CBC, CNT modes for AES/DES/3DES
128-bit, 192-bit and 256-bit key size for AES
160-bit hardware PRNG with 192-bit seed
32-word RX FIFO and 32-word TX FIFO for high speed application
Support CPU mode and DMA mode
Interrupt support"
http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf
So, it may be a little help, anyway.
The Cubieboard 2 is great for small Tor relays - it'd definitely be more capable than a Raspberry Pi model B as it has double the RAM and 2 more powerful cores with ARMv7 instead of ARMv6.
It's also almost double the price (for considerably more than double the computer), but I don't expect that to last long.
Best,
-Gordon M.
On Tue, 01 Oct 2013 19:02:37 -0700, Gordon Morehouse <gordon at morehouse.me> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> I'm interested if there are any hardware accelerators in either the
> Raspberry Pi (which needs all the help it can get) or the Cubieboard 2
> (A20-based).
>
> Best,
> - -Gordon M.
>
>
> Joshua Datko:
> > I was looking into this for the BeagleBone black [1], which has
> > on-chip accelerators for AES, SHA (1 I think), and md5. The TI
> > processor also has a HWRNG. My belief was that by using the
> > cryptodev kernel module [2] I could get this working, but I ran in
> > some issues building the kernel and then I was caught up in other
> > things.
> >
> > I'm not sure if my approach was flawed or what, but maybe it helps
> > someone here.
> >
> > Josh
> >
> > [1] http://datko.net/2013/09/22/quest_bbb_crypto/ [2]
> > http://cryptodev-linux.org/
> >
> > On Tue, Oct 1, 2013 at 2:35 PM, jason <jason at piratar.is> wrote: I
> > would love to do all this actually but I never managed to get the
> > hw accelerated crypto (ssl/tls) bits working to experiment with.
> > I'd be up for restarting this if I knew I could consult with one or
> > two others who had a genuine interest in this. -Jason
> >
> > On 10/01/2013 08:26 PM, Jeroen Massar wrote:
> >>>> On 2013-10-01 21:20, Andy Isaacson wrote:
> >>>>> On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote:
> >>>>>> I'm not sure why I missed this first post but I'm very
> >>>>>> interested in working on this project with whomever is
> >>>>>> interested. I bought a pogoplug v2 specifically to test
> >>>>>> it's usefulness as a tor exit or relay.
> >>>>>
> >>>>> First step is, run "openssl speed rsa" and post the output
> >>>>> to the list. While you're at it you may as well post the
> >>>>> AES and SHA results as well. Heck, just run the whole
> >>>>> "openssl speed" test (should take less than 20 minutes) and
> >>>>> post the whole thing. :)
> >>>>>
> >>>>> Also details on what CPU/RAM it has, and information about
> >>>>> the kernel and OpenSSL package you are testing, would be
> >>>>> useful. "dmesg" output and the contents of /proc/cpuinfo
> >>>>> may be helpful.
> >>>>
> >>>> Maybe a good idea to put the output in the wiki somewhere?
> >>>>
> >>>> Greets, Jeroen
> >>>>
> >>>> _______________________________________________ tor-relays
> >>>> mailing list tor-relays at lists.torproject.org
> >>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> >>>>
> >
> >>>>
> >> _______________________________________________ tor-relays
> >> mailing list tor-relays at lists.torproject.org
> >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> > _______________________________________________ tor-relays mailing
> > list tor-relays at lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> >
>
> - --
> Sent from my thing that sends email.
> -----BEGIN PGP SIGNATURE-----
>
> iQEcBAEBCgAGBQJSS366AAoJED/jpRoe7/ujyREIAKb2xTXWR8xLdVpj2K8Dub9W
> jSuMtWycMgSW5nkJAOCwA+uJuX47/v7tzejNut1E76oRaAHwEn1fufiWGdT+Dbju
> f4BycdI5Pl3NTRuYcFBas32+lbFeyw+gLClczUjfE+fe/pmHiaXAXra6Alai40z8
> 77B/xGQwrpVyla4S8JHP4CY/p6FHuI5JDs+ghvVESUEK2DHJdNt5R2oLSBy4ZNQw
> BTzAf6qvflFUWhpWOkIkzIzo0c5FsJ/nYiVWpWyAjdV1NgufPdZ8ZKIoNx92iJBP
> aD1G7h9fQh3E2AU/6VHPvPdekQ5NPzehXtH8ywNFMw16oFbXkZ6/eUYUpJ50YZ8=
> =3Yig
> -----END PGP SIGNATURE-----
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
More information about the tor-relays
mailing list