Happily, it DOES appear that there may be some hope for the Allwinner A20 based Cubieboard 2 (I haven't checked for the original Cubieboard yet):
"The Security System (SS) is one encrypt/ decrypt function accelerator that is suitable for a variety of applications. It supports both encryption and decryption. Several modes are supported by the SS module. It features: AES, DES, 3DES, SHA-1, MD5 are supported by this system ECB, CBC, CNT modes for AES/DES/3DES 128-bit, 192-bit and 256-bit key size for AES 160-bit hardware PRNG with 192-bit seed 32-word RX FIFO and 32-word TX FIFO for high speed application Support CPU mode and DMA mode Interrupt support" http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf So, it may be a little help, anyway. The Cubieboard 2 is great for small Tor relays - it'd definitely be more capable than a Raspberry Pi model B as it has double the RAM and 2 more powerful cores with ARMv7 instead of ARMv6. It's also almost double the price (for considerably more than double the computer), but I don't expect that to last long. Best, -Gordon M. On Tue, 01 Oct 2013 19:02:37 -0700, Gordon Morehouse <[email protected]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > I'm interested if there are any hardware accelerators in either the > Raspberry Pi (which needs all the help it can get) or the Cubieboard 2 > (A20-based). > > Best, > - -Gordon M. > > > Joshua Datko: > > I was looking into this for the BeagleBone black [1], which has > > on-chip accelerators for AES, SHA (1 I think), and md5. The TI > > processor also has a HWRNG. My belief was that by using the > > cryptodev kernel module [2] I could get this working, but I ran in > > some issues building the kernel and then I was caught up in other > > things. > > > > I'm not sure if my approach was flawed or what, but maybe it helps > > someone here. > > > > Josh > > > > [1] http://datko.net/2013/09/22/quest_bbb_crypto/ [2] > > http://cryptodev-linux.org/ > > > > On Tue, Oct 1, 2013 at 2:35 PM, jason <[email protected]> wrote: I > > would love to do all this actually but I never managed to get the > > hw accelerated crypto (ssl/tls) bits working to experiment with. > > I'd be up for restarting this if I knew I could consult with one or > > two others who had a genuine interest in this. -Jason > > > > On 10/01/2013 08:26 PM, Jeroen Massar wrote: > >>>> On 2013-10-01 21:20, Andy Isaacson wrote: > >>>>> On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote: > >>>>>> I'm not sure why I missed this first post but I'm very > >>>>>> interested in working on this project with whomever is > >>>>>> interested. I bought a pogoplug v2 specifically to test > >>>>>> it's usefulness as a tor exit or relay. > >>>>> > >>>>> First step is, run "openssl speed rsa" and post the output > >>>>> to the list. While you're at it you may as well post the > >>>>> AES and SHA results as well. Heck, just run the whole > >>>>> "openssl speed" test (should take less than 20 minutes) and > >>>>> post the whole thing. :) > >>>>> > >>>>> Also details on what CPU/RAM it has, and information about > >>>>> the kernel and OpenSSL package you are testing, would be > >>>>> useful. "dmesg" output and the contents of /proc/cpuinfo > >>>>> may be helpful. > >>>> > >>>> Maybe a good idea to put the output in the wiki somewhere? > >>>> > >>>> Greets, Jeroen > >>>> > >>>> _______________________________________________ tor-relays > >>>> mailing list [email protected] > >>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > >>>> > > > >>>> > >> _______________________________________________ tor-relays > >> mailing list [email protected] > >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > _______________________________________________ tor-relays mailing > > list [email protected] > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > > > - -- > Sent from my thing that sends email. > -----BEGIN PGP SIGNATURE----- > > iQEcBAEBCgAGBQJSS366AAoJED/jpRoe7/ujyREIAKb2xTXWR8xLdVpj2K8Dub9W > jSuMtWycMgSW5nkJAOCwA+uJuX47/v7tzejNut1E76oRaAHwEn1fufiWGdT+Dbju > f4BycdI5Pl3NTRuYcFBas32+lbFeyw+gLClczUjfE+fe/pmHiaXAXra6Alai40z8 > 77B/xGQwrpVyla4S8JHP4CY/p6FHuI5JDs+ghvVESUEK2DHJdNt5R2oLSBy4ZNQw > BTzAf6qvflFUWhpWOkIkzIzo0c5FsJ/nYiVWpWyAjdV1NgufPdZ8ZKIoNx92iJBP > aD1G7h9fQh3E2AU/6VHPvPdekQ5NPzehXtH8ywNFMw16oFbXkZ6/eUYUpJ50YZ8= > =3Yig > -----END PGP SIGNATURE----- > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
