From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0076.outbound.protection.outlook.com [104.47.38.76]) by dpdk.org (Postfix) with ESMTP id 4E52D1AFFE for ; Fri, 9 Mar 2018 09:36:09 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=vlKjLxdOZkDXf5kfeQrlmFI+F1c2wDzpE41PuJV6RE0=; b=T2jlGz8HzKjmjngwEauq0PWWHBrcK9E6alnzhcFNjkYNsy1r/D67VBCTaOVICZ3iHS4v5ZtLnnsAEAImE9EV5gCHPuK6ag2dDfsw4TVEHob40IvOJrdmYwMOazVmUzk1buLYaTs5YsNuu0jeWQfNQ+YuQEXty1tGeSQysYXbq3M= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Ravi1.Kumar@amd.com; Received: from wallaby-smavila.amd.com (202.56.249.162) by MWHPR12MB1518.namprd12.prod.outlook.com (2603:10b6:301:b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.14; Fri, 9 Mar 2018 08:36:07 +0000 From: Ravi Kumar To: dev@dpdk.org Cc: pablo.de.lara.guarch@intel.com Date: Fri, 9 Mar 2018 03:35:19 -0500 Message-Id: <1520584520-130522-19-git-send-email-Ravi1.kumar@amd.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1520584520-130522-1-git-send-email-Ravi1.kumar@amd.com> References: <1515577379-18453-1-git-send-email-Ravi1.kumar@amd.com> <1520584520-130522-1-git-send-email-Ravi1.kumar@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=y Content-Transfer-Encoding: 8bit X-Originating-IP: [202.56.249.162] X-ClientProxiedBy: MA1PR0101CA0050.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:20::12) To MWHPR12MB1518.namprd12.prod.outlook.com (2603:10b6:301:b::22) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 827c7418-d65e-4df5-3e53-08d58598ce0b X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:MWHPR12MB1518; X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1518; 3:lmerjASWnKx/W0S/ttEwHQ5JCGS4tBsATnYHBnFBnbWuTh22nB3OR1IsxvJX4O075bzXeDJgv8QrqA9TO4SWDuQeFfNhgMgrto0Lohqt2IiAP4gZ5yQucqazRcFN7DRDjno5lCpH0qJiWwxLGBPvXcQQ0Q7yOvWb17ZOpwMgguoNUDlfrjmxwgt7Szz05GJZz8Vz241uhdE40kwUIjj0LakexYyqsFZXnr0w3qc+jj7Czk9O1OWyHzsR+Ykr18I9; 25:eCnosmH7IDv2bMkniCG86sU16SaAXOBe3m9pQDPMbxZ6c4/pzHR8Aot7KPw28EgDI2kaZTCpjFV+j5Y0Ntqt9UFLr/J2CZAsoOWFUJPzl2qxonGk3jCr7ao8YNvlZXehJEiX/7yFhA0XbLMN6VMSz5iuELeyCyD8JMh941Vz4tiL00A5wd9eBmzJIRBJnDuoxrkCVb1PtqH+SAc/A3v7Fmm2JaU+LDooTq7cvp92hiPUhV6suQeU+Or7jqXy6i0LGGsNujRFtGfr/wwsTMW7jMskvbTmfDWSE3p9Nyv1ZQapuvO56SDLf7W3GHYm6SsslZJPWX8zLyHYPrLUSGtTQw==; 31:Sd7BDalQ9km/klKHGHA5DWxvIJklQnTUckFpnYwz7f+JVw4m6Gi+YqrnfwPze93NCnSKcJIV4DX2j5h3aoXRrNIASFvOchAGQishqs184l2EGEovPT4k4DwailTZI1HzQDz4xIVDtN4VfxGVdRC0nStUeseY004eDdHCQtuWrYtSvN71hZ6vIGVCHqR/N8CggfiirGLon5vpTmoCHCouJ7zZgia+gqKHQMyZq0oVs+Y= X-MS-TrafficTypeDiagnostic: MWHPR12MB1518: X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1518; 20: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; 4:cI0bd+uJziE35tL7Waz4IWGyEqgTmQ5mj4eRiDL+3Ms7t73Z6zZRYeC4uEZrd+5Qx2O7In+AO2B23GGMJtBR4Uvdj8EG3okMeschyYksEylJME3nP9pVpMT4oJEo/oqIFglranzUK1HuNkV1pX0c89IcZc0o42woUvMJJ689lQh7EjHx9j/utaUNvpP+djS0tzTX9iLZRYCzFK4zzrweomwifgQnisaJJq/IMERJogUJf57qib+Qb++8WilBFKMcPgxamxL3owJD6QAt6NKaTwZ75SqT163X+Js5uie2vTnlRpGUezurb19YzJR6g5Kr X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3002001)(3231220)(944501244)(52105095)(10201501046)(93006095)(93001095)(6055026)(6041310)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:MWHPR12MB1518; BCL:0; PCL:0; RULEID:; SRVR:MWHPR12MB1518; X-Forefront-PRVS: 0606BBEB39 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(39860400002)(39380400002)(396003)(366004)(376002)(346002)(199004)(189003)(26005)(81156014)(16526019)(8676002)(186003)(81166006)(25786009)(7736002)(3846002)(386003)(305945005)(4326008)(6116002)(6666003)(316002)(86362001)(76176011)(52116002)(8936002)(2870700001)(50226002)(5660300001)(2906002)(2950100002)(6916009)(59450400001)(7696005)(36756003)(106356001)(105586002)(6486002)(68736007)(97736004)(53416004)(2361001)(2351001)(53936002)(50466002)(478600001)(47776003)(66066001)(72206003)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR12MB1518; H:wallaby-smavila.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; MWHPR12MB1518; 23:2z6WuJ+d/rok9GecmXVYuwL+5QRnILj9n8lwKrcsG?= =?us-ascii?Q?nb+tIBnZiRB+OcIrHErV9pYKHQmYvNlTPIvubZIHIz+0V0KYjJKnmkrr1wvM?= =?us-ascii?Q?tC1a/mg7Lt01JHmSpmVl0L+s2nx4ibUEgW3Y8ehijALwnQ0R1h9OeU2sSpQW?= =?us-ascii?Q?zRp4Pa2GBPlLu2OI2kCTxvHSfVqcl3aXY4uY1zQBonTBUTgwq4pABlfY1erZ?= =?us-ascii?Q?PyEWV3VTjNEVUCwZcfIhdnrsppPaqfr9iKJzA8Gacv6DCXDBV0Z/pZVz01SL?= =?us-ascii?Q?pY8AlkRHcsT1begi7rXTsS7YFFfzfhs3M6skBHi2B7e5Vt/IIfqOw9Lt/FOL?= =?us-ascii?Q?ZyMv6DlPVSBH6uMBq+BhGBoT6uafMMIwc7ZzC65/ksZh/6S7V1srr5j3h+Wq?= =?us-ascii?Q?yAxBC0Jsb7bdU8i1yaEF9gjp1G5DYB9zA5Emc1KB+CjqfyRnpCrZ7LPSQOy+?= =?us-ascii?Q?K3/OSDun+4wJcDTU/Zyc50lD3I+XO32t9nYKVmDeSXaruZZd+R1i+5lak0hN?= =?us-ascii?Q?R/zeN5wemAK2mc9bI267RyhsoaBEpWfZVhlvA4EL1SoRKtIz5//wwXZijJVX?= =?us-ascii?Q?hvfIltjmX1lxDw7tSo3c/FSY0Cwm650cLGJv/62wJD0b2+lrjIIja+nRq9F9?= =?us-ascii?Q?mKcb+ZBlldYkJChOfabaAEKaRm1572bUzbmGhTctNvjvq4PHPUVVikZ8DJ9N?= =?us-ascii?Q?fBfrlAmUemyHDMvQIy9dyrwKU1k5awybj2gweFYenKRdOqB4sv4OlNyZjVwM?= =?us-ascii?Q?LLrm8F+QBmh76x3rnHEuqfU7SSBfHkWTwXnU5GOZQbP8hZupjrY6T+098ocF?= =?us-ascii?Q?5ByCp/eJ1dy/68Qg4IeQ95CRxQG34gY6su/WHwCXBdED3Njpqm9XdKkUGZG2?= =?us-ascii?Q?BcEbMSVO7q42OVH7lENj5G8wJ+z9fPtDhXZu+k9SxjXIxTay8kAPyp6rhw3E?= =?us-ascii?Q?S9keb6cq1GsgLF6iovE0G6ko8iN1O6+InSqo26pTDcyl+vAJrC4eWPTzooGu?= =?us-ascii?Q?tdCZFoSuJVIOYYrnar10/XMxtTsKgooXd3oub1Pfr2s7b2AdfgFdd+5aK35w?= =?us-ascii?Q?CKvjxGKPFS6sjFvF2W9ptQ8/bqSfCboQXCklBT12UCDzhz6tzxu0Z/maOWKC?= =?us-ascii?Q?PvIGrg7OmlOv4mLvaNVGK7s4HX4EWjX0sJcvHYJcvCALRNwq7H4YQ=3D=3D?= X-Microsoft-Antispam-Message-Info: t8bYh1M0s4ZniC8qY65MRlstqeVlMXXTnd2tpjkjhRFuyygQ6DUBlMDxfjBHxYdH3hb/xCJY1GUDv4rq97IRXpA+oPV/6G/vE2BAKhzFQrK/u1aVWnYr9Ve0SojwffaIJL6JwgoLAnmjt2nW1K7BVE4uc7RSDGL0hAqsOOCuGg8hu9db2/Jrme64GIoiFK7V X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1518; 6:nMzxcJcUz3d3grWGdrDFof3/FBC9dlcW9xE0waEudfZ03VDfRJOgUMaz+MI4O8LPOv9Yo+n5CLl8HYXI8fcVRXXfg7Bt2+U1NZ+1h9CuFW7CFJBOfEDifL1nCDLXCj3fPOkxAy2v9OOEGezewF5M1mGILaCs2uec6RwoSwqExOFV0Twtu5o6UoYlfr83vPRJfMevNovqz2VtkQZykmx0+QpYwlPqmK9bDpU/WvSE8wa1s7SFdNeNjjlP1MRkQjdyWJWhl7zx9/O0vg/rMCc2/Iuoy88FzphgzJO+NIMNKsU6ZkMTzhdUAR7SQAbefEQ+rg1QJRCYBMYKqQUrm38NGS9fVw3cfXs2p/NYyBQmxEw=; 5:Pdxcd67ubWVLSs1fEYO4wHzKDDxnmbMdG0Mfof/mSN1e/beYrbhbjmTcHKrKGMLOhTwy+zxVjAz5UU1U1y2KYRzALsCQYsOfAZ1gz69TubwEv7KfviX6Er2A/3Nn4tk3R+oNdEzU20XUl1DWnAp+q9SqfpCdWMLFFkhLX6DX8t4=; 24:8WuWwelJBHh7QMfA7XHUJCPigWXKoQRkglU6uQwK72mOx4y5jF82Pl4wSm/kNS/NivzgV6PTGpTFE1mtSC0VMAR5ik5fOhyYJSbaV9H0bRE=; 7:k8Gig16VNPgXTFwVRUViS7gIsYxudYjeXaPVUMzDrxIuGBmgHuXt+Pw7+CRlhBFaymoyj1ZawmqaOpHC5350xegkWuaFDlh/7I+g1OlR+azC9KVa6pqJVd0yythGetSRn/YjztIhRmiRbY6bCKE3drVi7aTG5IzqHF9fWX0XQfu2W7JAi87MTsS7E8G8JRdV2Brpxm3j7Sq+6+8B8uB1kDOVPB5E3ymINyMo6ccLEeympnSLZEW0KSEzpMBysMkq SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; MWHPR12MB1518; 20:qrPJEXQvKpR8/v33rGPS3eI9Uwc9Hd+NLd3kAX28VA/PuB6EXlrHLQI6XRYZHaUgG+qwP/h43R9YVrFLXT9E5wpqbZTxz8A+Dtc8bwIdRRKHzZgs8cD6TPJ0fhNBFkBbwUsBp08QpRhhf2FsihG2Uic3u94S3wg7UPC9ctECk33bX2VsSabsL7EKKeXyImCGylsV+JUMfgWFYXok3+h1+Ri1e14wYkTA+fLGcasSJStKbuS0RkMXKS0QaNFkMECN X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2018 08:36:07.2722 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 827c7418-d65e-4df5-3e53-08d58598ce0b X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR12MB1518 Subject: [dpdk-dev] [PATCH v4 19/20] doc: add document for AMD CCP crypto poll mode driver X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Mar 2018 08:36:09 -0000 Signed-off-by: Ravi Kumar --- doc/guides/cryptodevs/ccp.rst | 127 +++++++++++++++++++++++++++++ doc/guides/cryptodevs/features/ccp.ini | 57 +++++++++++++ doc/guides/cryptodevs/features/default.ini | 12 +++ doc/guides/cryptodevs/index.rst | 1 + 4 files changed, 197 insertions(+) create mode 100644 doc/guides/cryptodevs/ccp.rst create mode 100644 doc/guides/cryptodevs/features/ccp.ini diff --git a/doc/guides/cryptodevs/ccp.rst b/doc/guides/cryptodevs/ccp.rst new file mode 100644 index 0000000..59b9281 --- /dev/null +++ b/doc/guides/cryptodevs/ccp.rst @@ -0,0 +1,127 @@ +.. Copyright(c) 2017 Advanced Micro Devices, Inc. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + * Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +AMD CCP Poll Mode Driver +======================== + +This code provides the initial implementation of the ccp poll mode driver. +The CCP poll mode driver library (librte_pmd_ccp) implements support for +AMD’s cryptographic co-processor (CCP). The CCP PMD is a virtual crypto +poll mode driver which schedules crypto operations to one or more available +CCP hardware engines on the platform. The CCP PMD provides poll mode crypto +driver support for the following hardware accelerator devices:: + + AMD Cryptographic Co-processor (0x1456) + AMD Cryptographic Co-processor (0x1468) + +Features +-------- + +CCP crypto PMD has support for: + +Cipher algorithms: + +* ``RTE_CRYPTO_CIPHER_AES_CBC`` +* ``RTE_CRYPTO_CIPHER_AES_ECB`` +* ``RTE_CRYPTO_CIPHER_AES_CTR`` +* ``RTE_CRYPTO_CIPHER_3DES_CBC`` + +Hash algorithms: + +* ``RTE_CRYPTO_AUTH_SHA1`` +* ``RTE_CRYPTO_AUTH_SHA1_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA224`` +* ``RTE_CRYPTO_AUTH_SHA224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA256`` +* ``RTE_CRYPTO_AUTH_SHA256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA384`` +* ``RTE_CRYPTO_AUTH_SHA384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA512`` +* ``RTE_CRYPTO_AUTH_SHA512_HMAC`` +* ``RTE_CRYPTO_AUTH_MD5_HMAC`` +* ``RTE_CRYPTO_AUTH_AES_CMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_224`` +* ``RTE_CRYPTO_AUTH_SHA3_224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_256`` +* ``RTE_CRYPTO_AUTH_SHA3_256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_384`` +* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_512`` +* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC`` + +AEAD algorithms: + +* ``RTE_CRYPTO_AEAD_AES_GCM`` + +Installation +------------ + +To compile CCP PMD, it has to be enabled in the config/common_base file. +* ``CONFIG_RTE_LIBRTE_PMD_CCP=y`` + +The CCP PMD also supports computing authentication over CPU with cipher offloaded +to CCP. To enable this feature, enable following in the configuration. +* ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` + +This code was verified on Ubuntu 16.04. + +Initialization +-------------- + +Bind the CCP devices to DPDK UIO driver module before running the CCP PMD stack. +e.g. for the 0x1456 device:: + + cd to the top-level DPDK directory + modprobe uio + insmod ./build/kmod/igb_uio.ko + echo "1022 1456" > /sys/bus/pci/drivers/igb_uio/new_id + +Another way to bind the CCP devices to DPDK UIO driver is by using the ``dpdk-devbind.py`` script. +The following command assumes ``BFD`` of ``0000:09:00.2``:: + + cd to the top-level DPDK directory + ./usertools/dpdk-devbind.py -b igb_uio 0000:09:00.2 + +To verify real traffic l2fwd-crypto example can be used with following command: + +.. code-block:: console + + sudo ./build/l2fwd-crypto -l 1 -n 4 --vdev "crypto_ccp" -- -p 0x1 + --chain CIPHER_HASH --cipher_op ENCRYPT --cipher_algo AES_CBC + --cipher_key 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f + --iv 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:ff + --auth_op GENERATE --auth_algo SHA1_HMAC + --auth_key 11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + +Limitations +----------- + +* Chained mbufs are not supported +* MD5_HMAC is supported only if ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` is enabled in configuration diff --git a/doc/guides/cryptodevs/features/ccp.ini b/doc/guides/cryptodevs/features/ccp.ini new file mode 100644 index 0000000..add4bd8 --- /dev/null +++ b/doc/guides/cryptodevs/features/ccp.ini @@ -0,0 +1,57 @@ +; +; Supported features of the 'ccp' crypto poll mode driver. +; +; Refer to default.ini for the full list of available PMD features. +; +[Features] +Symmetric crypto = Y +Sym operation chaining = Y +HW Accelerated = Y + +; +; Supported crypto algorithms of the 'ccp' crypto driver. +; +[Cipher] +AES CBC (128) = Y +AES CBC (192) = Y +AES CBC (256) = Y +AES ECB (128) = Y +AES ECB (192) = Y +AES ECB (256) = Y +AES CTR (128) = Y +AES CTR (192) = Y +AES CTR (256) = Y +3DES CBC = Y + +; +; Supported authentication algorithms of the 'ccp' crypto driver. +; +[Auth] +MD5 HMAC = Y +SHA1 = Y +SHA1 HMAC = Y +SHA224 = Y +SHA224 HMAC = Y +SHA256 = Y +SHA256 HMAC = Y +SHA384 = Y +SHA384 HMAC = Y +SHA512 = Y +SHA512 HMAC = Y +AES CMAC = Y +SHA3_224 = Y +SHA3_224 HMAC = Y +SHA3_256 = Y +SHA3_256 HMAC = Y +SHA3_384 = Y +SHA3_384 HMAC = Y +SHA3_512 = Y +SHA3_512 HMAC = Y + +; +; Supported AEAD algorithms of the 'ccp' crypto driver. +; +[AEAD] +AES GCM (128) = Y +AES GCM (192) = Y +AES GCM (256) = Y diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini index 728ce3b..aa1ca31 100644 --- a/doc/guides/cryptodevs/features/default.ini +++ b/doc/guides/cryptodevs/features/default.ini @@ -28,6 +28,9 @@ NULL = AES CBC (128) = AES CBC (192) = AES CBC (256) = +AES ECB (128) = +AES ECB (192) = +AES ECB (256) = AES CTR (128) = AES CTR (192) = AES CTR (256) = @@ -62,6 +65,15 @@ AES GMAC = SNOW3G UIA2 = KASUMI F9 = ZUC EIA3 = +AES CMAC = +SHA3_224 = +SHA3_224 HMAC = +SHA3_256 = +SHA3_256 HMAC = +SHA3_384 = +SHA3_384 HMAC = +SHA3_512 = +SHA3_512 HMAC = ; ; Supported AEAD algorithms of a default crypto driver. diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst index 558c926..8a921dd 100644 --- a/doc/guides/cryptodevs/index.rst +++ b/doc/guides/cryptodevs/index.rst @@ -13,6 +13,7 @@ Crypto Device Drivers aesni_mb aesni_gcm armv8 + ccp dpaa2_sec dpaa_sec kasumi -- 2.7.4