From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0046.outbound.protection.outlook.com [104.47.41.46]) by dpdk.org (Postfix) with ESMTP id E72A91B198 for ; Mon, 19 Mar 2018 13:24:54 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Cr+AK6uZvEKqYkc+A1pePFkirHKpNc6Fybx2g02kU7I=; b=DNnId0GoIWXhD/+QVONvYaxwjw+NWf/JxugGVxQgrG6vv7aA+FXotty1Hr+gZ8OTfUA0EHRgqkPL5iteIQ0agiBIfBD2r395wXAyxQootYEixDpeKskDUYAd8fA0R3YPn64y+7LA4I8X70yLILXJFkOuxj5ajVLi8o9xEzUChI4= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Ravi1.Kumar@amd.com; Received: from wallaby-smavila.amd.com (202.56.249.162) by BN6PR12MB1505.namprd12.prod.outlook.com (10.172.24.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.588.14; Mon, 19 Mar 2018 12:24:51 +0000 From: Ravi Kumar To: dev@dpdk.org Cc: pablo.de.lara.guarch@intel.com, hemant.agrawal@nxp.com Date: Mon, 19 Mar 2018 08:23:53 -0400 Message-Id: <1521462233-13590-19-git-send-email-Ravi1.kumar@amd.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1521462233-13590-1-git-send-email-Ravi1.kumar@amd.com> References: <1520584520-130522-1-git-send-email-Ravi1.kumar@amd.com> <1521462233-13590-1-git-send-email-Ravi1.kumar@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Originating-IP: [202.56.249.162] X-ClientProxiedBy: MAXPR0101CA0025.INDPRD01.PROD.OUTLOOK.COM (10.174.62.139) To BN6PR12MB1505.namprd12.prod.outlook.com (10.172.24.146) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 6105cb1f-c48f-4185-8d66-08d58d946af4 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BN6PR12MB1505; X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505; 3:gYbCpvv0oYmGYshrH8HZ5Lc6HXNvxs958MEg+nasd1/vsDOycbN1FUjKHsxaPX4MxN8zlyp34dz3ypMgDcWZFWdmFiYFZX2lKmUHITq10Yeq5pCWxzf2SLMHkBLGt+erjBn7zjMIiv3AJxriEaVGAlY6Q48LBIPsASWeDgDIH2dEoL1RYzfrMuvmtb1FNcBPpK9ZdD9HrHli5DKOEe7NBBrrWlqEZ3s0namwswmpmwa5Y9LM/Pdt5vpLQ3DK41pZ; 25:y7c7mIEgiJeQGiPlDHkTEDleoG7ReW0MHFhlPhslJY1rspqxoOiDx5AYX/0gkMwK8ekX2sr7jwDtoeKO19otq+GFlxfzc3YAbEn6PacS8GDAwZYHryk2Ur3QWuErKZ79c6Rk7hGbWCDSa/5UZOZRlc9yJdhneJNSF9B+l5hbcfd10Oh8nYeG0ITi9nfHKXHtzB2pXcf/A50Dh8kXC8Gnb5IuXKkkir4H3nwKLnD5lyCOFSvrQPmS4cEDwiuCGunNA517mdAoNU8hZ7dAtyOR4nHfpuPJHdw5BI20DZlXGVeIOl1ynKgj0W/zQiBeJj1AdNvOQdk5j/vb4Skqz8bS9g==; 31:nEeW40kgHjIHS9Iu8dm1Cy4OueeHsh3pYpciP1DeorGOz2BTvmeImCZrpFdib2j5rFoT1pXEmuEJ709HkXQhDqDx4E3MlfHYa99BUAKy+mWk4ypa3Zx4rUaUy3aDuVdMVer0s2D/mT6rI813TUK98MyA6ZWVVBO8yy3LWLRApIly5pGNIEzbGBYlKI6ykg7IgTnKY7BKWeSs7l08T53bwBFVu5uOdPLd4MIYFgEvPe8= X-MS-TrafficTypeDiagnostic: BN6PR12MB1505: X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505; 20:/YHfK2wTo8gErarSsxlc6Pe3gk03Kzni1MxxMXu5vMlFIcM9IFLiAqsZoM8jNHKEK8hlSigu+hd5sx+msS/TMMTzDijNtSxFsVZk6POaemGV177fkQbfNkiThuFu2w0TZlpord/a6kV7cxDZnD+9ABAat03H/af0RE9NpxjQg2TggCtvRDavK8xOwnDRsVfaMb9KuG0e9mhKAHVCvhVZdMaYliGjJlgwkGwwrnxamv2XB/mGW8Z5sVVNDO+fA0oYp77iwsEHHfNlvIrxJ23RUfRYa5kDKnKTO/R2AGOfn2DBozcLvomD9RksRPJNHCN821SIoyYAAWZ0RC0Co0iv5WAvyX/ZBIqGwl0YoxUiTel/d7DyrxhfpHsx67cuSmTBygCmYovB6VWyKNllfMEwasy0AyjDDwqUjaqpNIWILTVF1nIObtYWLevoGaU6cOmIszcvDURSiLXt+EJc6UsmY5Ag7dEu7dfQa/N0wtkIwZcTeczfLJ2e8/GV46qTEVyF; 4:FoGma3yOH6650LacKx5dFsovIW6uQJDBBq6Ioifmyy3dawPYdAUQaKi3TQ+W6UdN0imSnHIQRyrPDgv5Poc8WYV/q9OdJ8xrzIB9Alts00y7X9qE8/nXudIGp8q8/llNmoaYLwWq+MJTk/MwP4pt5C3MSibyHtWtXAa6+9Obmb1eALOyWajY9tzhYi+qrrmTeqLJQ+hq0Jv3px+IBDsb55V0Ie1cKxL0JfbLwA493mb9ZqgqZlhhXZEiE2V5xyJg9x+czsNQMegqV1nKNoS81OLUEcQMwWbBueFOxgD8i+tqqtphkAr+MEpBZkweZHyR X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231221)(944501300)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041310)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(6072148)(201708071742011); SRVR:BN6PR12MB1505; BCL:0; PCL:0; RULEID:; SRVR:BN6PR12MB1505; X-Forefront-PRVS: 06167FAD59 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(396003)(39380400002)(39860400002)(346002)(376002)(366004)(199004)(189003)(97736004)(105586002)(2361001)(2351001)(72206003)(4326008)(50226002)(76176011)(59450400001)(8676002)(26005)(316002)(8936002)(53936002)(106356001)(186003)(7696005)(16526019)(52116002)(386003)(81166006)(81156014)(8656006)(23676004)(25786009)(66066001)(68736007)(86362001)(47776003)(6486002)(5660300001)(7736002)(53416004)(6116002)(305945005)(3846002)(2870700001)(478600001)(2950100002)(36756003)(6916009)(2906002)(50466002)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1505; H:wallaby-smavila.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxNTA1OzIzOkFnc0czY1dXL3dPeFM4ZHlxYU1DVGY4bit2?= =?utf-8?B?RTBzdEhmZEo0eFd5R01FQURaMlBjNURIakpKSUltYk9uR01kMnk2QW1WeFpw?= =?utf-8?B?N1k0SzM3R2VrZDh5dlRBV2hTNXdEOFJlcU1QdUNvMTl4SndoSGhTbHZRWThG?= =?utf-8?B?SXh5MFJIZlBycElFYklUNXQzYVdyNzE3aUVWT0RlQU84bEswaEQ0RGdXdk9s?= =?utf-8?B?L09IQU04WXhtekZDeUh4Mmc0SC84Q01MaTJUZ3VTSVpZOEVhYlBWdWxKbHZk?= =?utf-8?B?ZExKTXpJb2w0d3puekk0SEpSc1pCZXBDTVI4VUUyNFdBUHlwTWJxYy85MGs5?= =?utf-8?B?aWVLVkN4RDluZURxNjBsN29Ic1VXeGVNK1MrT09BNmpGK1A0NlR2R0FocEFy?= =?utf-8?B?ZU51YXJXZ1ZxMW9GWTR2SGRUZW9KOUpIWnZLS3Y0cmxOOVlKR1ZRSGovSHNn?= =?utf-8?B?aVcwcXJMRjg3MldZK1JwR3R6NFlTNzVoNC9hY2xKekJYei9leDNZa0RXVXRW?= =?utf-8?B?VTNmY3V0WW9DOFpaR0xkdDZvZUxNdWZYM1BCbnQwK3RndFF3R0FjNlM2UUY2?= =?utf-8?B?NmthY0hTc2pVbGN2dnlxTjMvMzFxVldIQjVrVWFyb3kwOVlGSE0xSmdhZnVp?= =?utf-8?B?RkNDWkt3U2VGQmFrOVdhN1R2bi9ydGlWaHJIQWZMdUFzUXB6NU1OazFuZjlh?= =?utf-8?B?dkhac1hMRlA1amNlWitVRkYrdnNyaEU2Y3VCdHVNUXYxcDg4eTVZWGw5RDJM?= =?utf-8?B?Y3c1dWIyWGI5MGlReUtUeVArYnNsUU9kbEpZTThGTzhDMlpveUlRTmVhWDFS?= =?utf-8?B?N25KeXZMZG90dHVpd20yeW82QzRUcXN1ZFhvb1owanBxTllnRmdTdkppQm9r?= =?utf-8?B?TzlGTzVuTjdLQk9tSFdncEl0WlFLZ29VdkphZkdYRjNDYzRjVmFBSHREWUVX?= =?utf-8?B?bWx1NXkwckJyOW8wODRQZWc4aWZIejdKKzlBOTJrWm9jRjN1c1VjQUdGVGlm?= =?utf-8?B?eEZGSUpSTWp1MWR0OEdpellsREZsMGZUMmc5b2tKR0wvQ2FuYVEzcE56WVFz?= =?utf-8?B?KzJjenJrS1k3R01SZVhRZzZCUlpUV2ZZOEI4Y1o3NHZ6OXYrTVQ4MlNPOXpE?= =?utf-8?B?SHFTOTFQZnlLaTh3dWNmQUdiM2NvNTE0TnBXVEptYm15UWgrS1YrUHd1SUpG?= =?utf-8?B?WWRlYzRnOERCekR5UlEvVkRtSFQxL1BnWnU2cmUrVTNudCtjN3dOcU9nSURj?= =?utf-8?B?WGRwWEpvSU15OGVVTmlWNTBRUVZmcVVQOHo5UlNsQklKN0cxZnZFVUdzb0hN?= =?utf-8?B?eFlyT3hWYlN1YlZlUWdQeUFqY1VNZHMya0tMMmR3Y3JYeFAxK2F1ZFlaT2ZC?= =?utf-8?B?MGNhdE5WajMxTmFlemc3c2VsTkVIWkVpcVBQcWUyRUc1TU16VE9pYUFDOVJK?= =?utf-8?B?Sy9FcWpGbkRVVFNxTnB2ZHRTVjFmaFl1YXZrSVJJeXFudlkzYzdtRE5pMW1P?= =?utf-8?B?YWZ5d01EZVRPWC9MK0tpRkFJR1BMWnNUR0MzUEJMWGVQbE8xK00yNmVSdUJF?= =?utf-8?Q?NrIOrkM4rfqcdiyMXQxycVhh6HQGBf6lIZXzTrn3rbos=3D?= X-Microsoft-Antispam-Message-Info: xcWaQ3Awc/+SXSmb6nc9LUxM/SLsOuu2JXUdzK75o56LmlPVRpmj8M+HzGI3eQR5kFUyWKzQYZAgLrr1onrht8bO7kfjDOLwpZaInxquoC1Uy8ZgfDidEDRJ5MBqqcEX8tVR9wfy4npBaysT/tk4Pt26tGVMEG0tLkGSzLtWmSdubh64d996ngkqQRh10OlR X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505; 6:J1faVZ0HE0VhipSThBWEgfesD2xWigS1WKWiw2yKkaF2YHrnEU7INCb4yi4bqWPkp5fIzH1fshisDKWSRMkFflS/FKdIUriwmY/TcGGgEfmfwtiQOVvqqTCu6Ob1YIIdxTqh4Y+G0odN5h3TfQAlQr7onfpjD512ndYyjrnPUBVn1lCAQEME/fNEBfUYAdTlK7ZSWAtSGJSDwz1WebkeU0MTOol8Kuqyx6SPy/gYp7e/kn3jXfBaz8p5nsuJidwlvYgkBiRT2RFC3pxTw8EYNPTNCRbGc+OTsRimVx5SckWYXVrb4/7Mo5rYKyvJi82A8I1NrYF3xV2vnWFwaAsspEPAtO1fyz06jTQJEGgBh6o=; 5:y9rKyt3uHkZKh9+zK86G44CE167BuaN4PSwHC1k2aDIMWG23gzHTfNn9V/6DNWzr+HjvWdgmRVn/pXa04bk8GiUjvj9dw0eMHk6FOMFP0LexCYGUlmCEcIu0TWAKlco2e5PVInHly6YUPuChspnir2qnO7meRMNgi+KdguX5pdo=; 24:/oO8rd8QBserRIkiJAZiceR+0+AiOP2E9EbZo0Vl9jI2uw2q8EAeWIhFoeguVNKZO76UtaSX385uGdIdFqIXLV9LFXHUzDS1Nx/+4HWpL14=; 7:9FZfvIzrLnMuCoI+dmAZJaLe2aC0fRIRmCHMjmFob96Uaki3jTGW53sMtOZdoGkTIBHtOvwBXR1jvmoLfkXXBzeLQMnxRhg2H1eviXLqubpNjz6eqnjUjaSPGdIeX+mZ3SczxFg7iDCAfBXxgZ2y+La8tbgHmNXPSHXzudNzCAbvcrJXrlhyRcN3CiAThblJUdcGWVNDctUReNi+mb1y9hFH9Gm63LNaAN9Ko8gH1QIQ68/9Fz4boxsr8XpWV06u SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505; 20:OqV6YfGeRlUGaEMjWtbm7nvGzE51vDhnFscZOmx8g+j+SQU+vzGyC2FY/LGApiQFNLkrfzPBLzjUCMmLv3/2y0tt1UlWm91gh+IziAq+C5mhilOIx0C4LIyPQ4dRPeY/JaTdyVYdaoDdD/GyQBwwnRdvFbL4UoheLg52rGEFMQnifaJl0SbJ76OuFRNgKxyZpxwPkjevgjpF3/JMGrq7kZ8EwyFJY5SS/FV3hIBb8+URZIj1xZ3diHxwq0Bp2Ea0 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Mar 2018 12:24:51.9040 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6105cb1f-c48f-4185-8d66-08d58d946af4 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1505 Subject: [dpdk-dev] [PATCH v5 19/19] doc: add document for AMD CCP crypto poll mode driver X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Mar 2018 12:24:55 -0000 Signed-off-by: Ravi Kumar --- doc/guides/cryptodevs/ccp.rst | 102 +++++++++++++++++++++++++++++ doc/guides/cryptodevs/features/ccp.ini | 57 ++++++++++++++++ doc/guides/cryptodevs/features/default.ini | 12 ++++ doc/guides/cryptodevs/index.rst | 1 + 4 files changed, 172 insertions(+) create mode 100644 doc/guides/cryptodevs/ccp.rst create mode 100644 doc/guides/cryptodevs/features/ccp.ini diff --git a/doc/guides/cryptodevs/ccp.rst b/doc/guides/cryptodevs/ccp.rst new file mode 100644 index 0000000..1fcd462 --- /dev/null +++ b/doc/guides/cryptodevs/ccp.rst @@ -0,0 +1,102 @@ +.. SPDX-License-Identifier: BSD-3-Clause + Copyright(c) 2018 Advanced Micro Devices, Inc. All rights reserved. + +AMD CCP Poll Mode Driver +======================== + +This code provides the initial implementation of the ccp poll mode driver. +The CCP poll mode driver library (librte_pmd_ccp) implements support for +AMD’s cryptographic co-processor (CCP). The CCP PMD is a virtual crypto +poll mode driver which schedules crypto operations to one or more available +CCP hardware engines on the platform. The CCP PMD provides poll mode crypto +driver support for the following hardware accelerator devices:: + + AMD Cryptographic Co-processor (0x1456) + AMD Cryptographic Co-processor (0x1468) + +Features +-------- + +CCP crypto PMD has support for: + +Cipher algorithms: + +* ``RTE_CRYPTO_CIPHER_AES_CBC`` +* ``RTE_CRYPTO_CIPHER_AES_ECB`` +* ``RTE_CRYPTO_CIPHER_AES_CTR`` +* ``RTE_CRYPTO_CIPHER_3DES_CBC`` + +Hash algorithms: + +* ``RTE_CRYPTO_AUTH_SHA1`` +* ``RTE_CRYPTO_AUTH_SHA1_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA224`` +* ``RTE_CRYPTO_AUTH_SHA224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA256`` +* ``RTE_CRYPTO_AUTH_SHA256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA384`` +* ``RTE_CRYPTO_AUTH_SHA384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA512`` +* ``RTE_CRYPTO_AUTH_SHA512_HMAC`` +* ``RTE_CRYPTO_AUTH_MD5_HMAC`` +* ``RTE_CRYPTO_AUTH_AES_CMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_224`` +* ``RTE_CRYPTO_AUTH_SHA3_224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_256`` +* ``RTE_CRYPTO_AUTH_SHA3_256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_384`` +* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_512`` +* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC`` + +AEAD algorithms: + +* ``RTE_CRYPTO_AEAD_AES_GCM`` + +Installation +------------ + +To compile CCP PMD, it has to be enabled in the config/common_base file. +* ``CONFIG_RTE_LIBRTE_PMD_CCP=y`` + +The CCP PMD also supports computing authentication over CPU with cipher offloaded +to CCP. To enable this feature, enable following in the configuration. +* ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` + +This code was verified on Ubuntu 16.04. + +Initialization +-------------- + +Bind the CCP devices to DPDK UIO driver module before running the CCP PMD stack. +e.g. for the 0x1456 device:: + + cd to the top-level DPDK directory + modprobe uio + insmod ./build/kmod/igb_uio.ko + echo "1022 1456" > /sys/bus/pci/drivers/igb_uio/new_id + +Another way to bind the CCP devices to DPDK UIO driver is by using the ``dpdk-devbind.py`` script. +The following command assumes ``BFD`` of ``0000:09:00.2``:: + + cd to the top-level DPDK directory + ./usertools/dpdk-devbind.py -b igb_uio 0000:09:00.2 + +To verify real traffic l2fwd-crypto example can be used with following command: + +.. code-block:: console + + sudo ./build/l2fwd-crypto -l 1 -n 4 --vdev "crypto_ccp" -- -p 0x1 + --chain CIPHER_HASH --cipher_op ENCRYPT --cipher_algo AES_CBC + --cipher_key 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f + --iv 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:ff + --auth_op GENERATE --auth_algo SHA1_HMAC + --auth_key 11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + +Limitations +----------- + +* Chained mbufs are not supported +* MD5_HMAC is supported only if ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` is enabled in configuration diff --git a/doc/guides/cryptodevs/features/ccp.ini b/doc/guides/cryptodevs/features/ccp.ini new file mode 100644 index 0000000..add4bd8 --- /dev/null +++ b/doc/guides/cryptodevs/features/ccp.ini @@ -0,0 +1,57 @@ +; +; Supported features of the 'ccp' crypto poll mode driver. +; +; Refer to default.ini for the full list of available PMD features. +; +[Features] +Symmetric crypto = Y +Sym operation chaining = Y +HW Accelerated = Y + +; +; Supported crypto algorithms of the 'ccp' crypto driver. +; +[Cipher] +AES CBC (128) = Y +AES CBC (192) = Y +AES CBC (256) = Y +AES ECB (128) = Y +AES ECB (192) = Y +AES ECB (256) = Y +AES CTR (128) = Y +AES CTR (192) = Y +AES CTR (256) = Y +3DES CBC = Y + +; +; Supported authentication algorithms of the 'ccp' crypto driver. +; +[Auth] +MD5 HMAC = Y +SHA1 = Y +SHA1 HMAC = Y +SHA224 = Y +SHA224 HMAC = Y +SHA256 = Y +SHA256 HMAC = Y +SHA384 = Y +SHA384 HMAC = Y +SHA512 = Y +SHA512 HMAC = Y +AES CMAC = Y +SHA3_224 = Y +SHA3_224 HMAC = Y +SHA3_256 = Y +SHA3_256 HMAC = Y +SHA3_384 = Y +SHA3_384 HMAC = Y +SHA3_512 = Y +SHA3_512 HMAC = Y + +; +; Supported AEAD algorithms of the 'ccp' crypto driver. +; +[AEAD] +AES GCM (128) = Y +AES GCM (192) = Y +AES GCM (256) = Y diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini index 728ce3b..aa1ca31 100644 --- a/doc/guides/cryptodevs/features/default.ini +++ b/doc/guides/cryptodevs/features/default.ini @@ -28,6 +28,9 @@ NULL = AES CBC (128) = AES CBC (192) = AES CBC (256) = +AES ECB (128) = +AES ECB (192) = +AES ECB (256) = AES CTR (128) = AES CTR (192) = AES CTR (256) = @@ -62,6 +65,15 @@ AES GMAC = SNOW3G UIA2 = KASUMI F9 = ZUC EIA3 = +AES CMAC = +SHA3_224 = +SHA3_224 HMAC = +SHA3_256 = +SHA3_256 HMAC = +SHA3_384 = +SHA3_384 HMAC = +SHA3_512 = +SHA3_512 HMAC = ; ; Supported AEAD algorithms of a default crypto driver. diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst index 558c926..8a921dd 100644 --- a/doc/guides/cryptodevs/index.rst +++ b/doc/guides/cryptodevs/index.rst @@ -13,6 +13,7 @@ Crypto Device Drivers aesni_mb aesni_gcm armv8 + ccp dpaa2_sec dpaa_sec kasumi -- 2.7.4