[Openswan dev] IPsec HW Offload Engine support

remy.gauguey at mindspeed.com remy.gauguey at mindspeed.com
Wed Jun 7 19:08:00 CEST 2006


Thanks a lot.

I've checked out the git tree, and after a first look, it sounds far 
easier to integrate a full packet IPsec hw offload engine than on 
26sec....
I've seen that this is part of the ocf-linux "todo list" and that the 
SafeNet SafeXcel is able to do this ESP/AH processing too... (but not yet 
supported :-()
My plan is to add an additional field (ocf_full_pkt_proc) in the struct 
ipsec_sa  (like ocf_in_use flag) which would be initialized according to 
crypto driver capabilities (in ipsec_ocf_sa_init()) 
Then according to this flag we could skip some part of code in the IPsec 
state machine functions.

Maybe you've already started to work on this...
In anycase, any comment/suggestions would be appreciated ...

best regards
Remy









David McCullough <david_mccullough at au.securecomputing.com>
Sent by: David McCullough <davidm at snapgear.com>
31/05/2006 12:56
 
        To:     remy.gauguey at mindspeed.com
        cc:     dev at openswan.org
        Subject:        Re: [Openswan dev] IPsec HW Offload Engine support



Jivin remy.gauguey at mindspeed.com lays it down ...
> Hello,
> 
> I'm currently working on a CPE SoC based on ARM11 with an IPSec offload 
> engine.
> This engine performs crypto operations (cipher + digest) but also ESP/AH 

> protocols offload (ESP/AH header and trailer insertion, IPv4 (only) 
header 
> modification...).
> This engine manages SA database, with TTL and anti-replay checks.
> I'm currently working on the integration of this HW accelerator into the 

> 26sec (based on a patch written for 3Com crypto NICs : 
> http://oss.sgi.com/archives/netdev/2005-01/msg00360.html ), but I would 
> like to know how feasible would it be to integrate such a IPSec Offload 
> Engine into OpenSwan KLIPS architecture.
> It sounds like to me the IPsecX interface would allow to do this easier 
> than on 26sec...
> 
> Any ideas or comments are welcome

Have a look at:

                 http://ocf-linux.sourceforge.net/

There is also a publicly available GIT tree for 2.6 with Openswan and
OCF fully integrated.

                 http://git.openswan.org/public/scm/klips.git#ocf_v2.6.16

It should be really easy to add an OCF driver for the cipher/digest
portions,  from there the state machine is already close to what will be
needed for ful packet processing and is something that is being worked
on/discussed.

Cheers,
Davidm

-- 
David McCullough,  david_mccullough at securecomputing.com,   Ph:+61 
734352815
Secure Computing - SnapGear  http://www.uCdot.org 
http://www.cyberguard.com


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/dev/attachments/20060607/976e4078/attachment.htm


More information about the Dev mailing list