From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0087.outbound.protection.outlook.com [104.47.32.87]) by dpdk.org (Postfix) with ESMTP id 589C41B1EE for ; Fri, 5 Jan 2018 10:40:52 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=n83VL2ffciOx9FfMz98gEI75UcyWTTUI6aRcwKDCQ6g=; b=f2gDPyU0i/FgO8dqusEbAMkJ1t6ALJDEaH/pf3aBhrAwDwN0NcVIHYSZk49RggON9Q6kCH0ZfIDQah0VsCZNF9kOQRyIZN91T6G99fKhcUxE1wr41HCz8I/I4PflVdRTbyC5JlJVo/lpXs74t9AfIP4S2nrps9/hlTKvpwxf+IY= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Ravi1.Kumar@amd.com; Received: from wallaby-smavila.amd.com (202.56.249.162) by BN6PR12MB1508.namprd12.prod.outlook.com (10.172.24.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.386.5; Fri, 5 Jan 2018 09:40:49 +0000 From: Ravi Kumar To: dev@dpdk.org Cc: pablo.de.lara.guarch@intel.com Date: Fri, 5 Jan 2018 04:39:56 -0500 Message-Id: <1515145198-97367-18-git-send-email-Ravi1.kumar@amd.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1515145198-97367-1-git-send-email-Ravi1.kumar@amd.com> References: <1512047553-118101-1-git-send-email-Ravi1.kumar@amd.com> <1515145198-97367-1-git-send-email-Ravi1.kumar@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=n Content-Transfer-Encoding: 8bit X-Originating-IP: [202.56.249.162] X-ClientProxiedBy: PN1PR01CA0084.INDPRD01.PROD.OUTLOOK.COM (10.174.144.152) To BN6PR12MB1508.namprd12.prod.outlook.com (10.172.24.149) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: c5c753b6-1cce-45c9-d1c5-08d55420683f X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(48565401081)(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(5600026)(4604075)(2017052603307)(7153060); SRVR:BN6PR12MB1508; X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508; 3:575s+hRo92euNwgYHiLvMBbhQ//ooXm6bXAXt3riscL1LRHCh5N/gbAyERt3jgVfKachTUQ0lhxAcgf7U/7Dm0VL51L7jUhQsskOboWPsJ6jPNy+UUh18ONI0v1Ion21wOcxnoXAFxb7IQOPOlCWzBpEYH66HM3qMtoSejoslvfk8eEeuglZl8NGYMcC34DCPSgeEnW+5WworCwy5tiaBC9m23uU1euEKGtnKEVOfyX4N5ktXlA9zALVE25uczFl; 25:Jw2JwiIZGC6BHy2YFw/SrDv5DyYqC+ccht7yD1IkwUK2EvmJl/y8i3bxBl0P3ZxZwU+O8/7ljvaXnQVOlvOqlSO1nOx0gQ6tjqfqg8KRabJpMw7qCEQNuJJeG1P+bxXA3Eh2mGCRMD1gjBy6axCU5fcNDOHLc/5gnFxbuEDCsZMsRG4J11YwoygLJxD8rC/81r2+nWVpdvnLsnm9vS6ldoy4zdVM70i1n1EGs4ZR0M297GPrqRQzELzQ5b0h3MOIwxzer0dCt4EcjVcdrek93DyxF4EV3ZxfSnys2HkkXUR1p0GkmMxnH20VitkjQyB7rJ/F1N6pSXYkbilrgLSiig==; 31:MDt7UmICWdY2Sv7ngqM0joMx9kdKQL0P3SLSlyq70z2XS3bOhQXqfVCnsXZ3oIGUKovDIObjNdPnfiesaolymvT+1N4GF59BpjRuIl7865V4Z5ikh8cOcw+Z3neLtyFswodRWx+kMjXu8QmqqHNxYXfmPX9Clp52Bto+jMStkjO2NW/x0fKdRsRLMU1/EwK71evWQh5Son+l13Po7/qaNZTOGAEPYrYw+bzFH4G1JNI= X-MS-TrafficTypeDiagnostic: BN6PR12MB1508: X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508; 20: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; 4:+qnm4+mYb6cUKbwXRvy3yOhjwhTNoAcJ8f6zgINQMxJnj37of6WbVXOTGvM4VGXATI/YPpFsoqJodZQanMV4ZXggWm8LK5RMIw6Xl/oT6xifzjAvdRA89QgMJ4h7R/Sa6N/zxsSc1d3Cp6hpVG3vVHoVRzkKULGOTiwy5pNN8mylJax25O/bKu9RCReECyn5y0A1zBqy0XVXi/qSDqnWqh6vjNaODib05tWnC6jLuZbJzL4Izms2woRBjKV99FRa4WJaRRpjhgS2MAmSEXPsokhLQco2i+MdXKIQjbLl+us7sqS6CImYItaq2Xb+n4PD X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040470)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231023)(944501075)(6055026)(6041268)(20161123558120)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011); SRVR:BN6PR12MB1508; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:BN6PR12MB1508; X-Forefront-PRVS: 05437568AA X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(396003)(39860400002)(366004)(346002)(39380400002)(376002)(199004)(189003)(6486002)(2361001)(6116002)(106356001)(386003)(105586002)(3846002)(6916009)(2950100002)(6666003)(16526018)(36756003)(4326008)(2906002)(316002)(97736004)(25786009)(2870700001)(478600001)(86362001)(68736007)(8676002)(81166006)(2351001)(81156014)(52116002)(8936002)(53936002)(305945005)(50226002)(76176011)(72206003)(50466002)(53416004)(7696005)(47776003)(66066001)(59450400001)(5660300001)(7736002)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1508; H:wallaby-smavila.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN6PR12MB1508; 23:Pae+hAoK0m2De4/F9qHvck7nzKLeVOLWoO5GdU+Cw?= =?us-ascii?Q?Fam9RoMiikFOC35tWKa/BMEr9kPFD4je/Tn9G81h6PjYkVCV1sTOtqjQoYAj?= =?us-ascii?Q?1y8WhiJqtoETUri8nZRrgU2cxiVFEQDukidC117NAvv57CQfCLjKCbkEYDS4?= =?us-ascii?Q?yWG40sxBtp3QAnjC14MPIdHJBBBqB3Q+gi8A6Nig6/gUVhEf3DyZmdcZctBk?= =?us-ascii?Q?Dob7tXmJ+WNFYlpQ61y7+sHKJ793Mp3zFY9z1VY3iuBs4VU0Fya7xwXF29G9?= =?us-ascii?Q?dn5miRUsqbSPgynKG/Y2dK/xbJ5DzXvc/si8RsXYkv0qKTwk85RMtHpQedBg?= =?us-ascii?Q?S3JqTpa4MQjpX0b0GLgw2oQoprjwx4gMCjt9wgxwkNOMvSjTdwmbuq0B5ZYe?= =?us-ascii?Q?qZmZLys7WDqa6A/yCAyE4nqLryh1SsNXT4gKRD9MQEgVK6jao5tUsCaw9ZLz?= =?us-ascii?Q?6cKdwPeuaAnZklETYwL8dF/GXArg8+QEnamdI+5PLyp6y0scr3Clh19uHHN6?= =?us-ascii?Q?/F6hOzQOtSJIB6O26twYrkv+aUVRpmT9RrfiwRxh69YiSR3rIrPgG8r0zrVW?= =?us-ascii?Q?MsMkWbBL3vq2nUPuODLfH6HtJ/vDB96jAJPJUC7+9pAliBM20ETEeEh481LB?= =?us-ascii?Q?qtAFbfvyJqzttNPUudbjmXVo+wAHomZv2BKP87w0zxq5ClHEgEiFd9R0RQja?= =?us-ascii?Q?NHrpNs64RSECPF/skcMideGL6vwKVLCRn5N7MTW/yBKhAUXiNTRF1Vjrp1rp?= =?us-ascii?Q?NUfdBzLnqAACrT99Xn84PUf1eDF8pLWqpF9oEwae7DPLU7FsXcPFzg5qBvmE?= =?us-ascii?Q?nbwgL/NlS3y4yQdQhQA2+2CJAkVB+liSq4N/uYQ1fWU6S3SpAjB5RTyhIXoI?= =?us-ascii?Q?+AeN45GIiQ15mzbnPY+DLstWPj8Kc9I29ua3+P9DoBQDtv4NWwigz2JeVwkW?= =?us-ascii?Q?49eDnnFfmzhupg8Q45Ht+5S8qvob49OvRenuTK5bk2DTkIL2n+7xbDkMzIXm?= =?us-ascii?Q?WYR/NBIONm1QQc7FxV+Fah2rxHykF4gjzVXXdJbGiVWc0jtLUkMwb8LqvIvm?= =?us-ascii?Q?wSIxf14eXWIYQp9SAMa0HrpgE2HM2MwVktqmj3qBEi99H4wAYqLVG02OJO2w?= =?us-ascii?Q?e+4Qlk6fQvJCdLda6+YBUIX1nV3m5NJ?= X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508; 6:3OWXmkhivrnyVWMAPMi0/U4j7xfrRd/weYqLxGNItzCMzi5AkuCCz0VVsQo0ZvGANgp0jeCjk0mWKbEppB1sBjRmkecxrp2bauRjONHHT2JZzieP9l1A5k25ANOzirw474HRjAjNkSdI1aW1FHx2oDKQ+nCEj9AxiyYCOMBGndWu2NuvM9yLbRie9NZjqerWBKfhp1csvP5gwlC8QfBRGZxJcAVnU2cie52JUbgqEB5SiqsI8r2aX9FqFYqNZxkHK1C0s0xqh57xcIX6TFB5nV2q4X9Cl9dKoYdPiZzwDSziyGks92cddGdvoOP15p82YgNix8rzLWLhqotlE1H/mbwjihFzDjNSHfEdZNJTHNw=; 5:mAsxHenwUJdUCfLpJ1yKHXsq8LjE5Z8yhRRz4Lhj8yk2r+bt8MkAeuqt5KBlLDpWgHbr6XprcTilsWGS7wowomY4LY+G7kCAU1GHNLZPq+lGy1Jx9/HNtt+H7KwJoW3NYWAlp6wd/1h/RXeNr0x0foSH5+RPzXVZ+W3Lji1YInE=; 24:zIW92YvDhl/H9hBK2Oo5ONGk1rpPfjd0WAoePY92rh0Q58E3hPKltjFA7YHT/01bZYTN336ATDxApUqi/KrUmtGGHQy2uVNFe6NAZE0Z0XI=; 7:qzzKlqIx6jra464R2dXLU7gI7r8sz07Ig2cmzWH89TGXaVUOjinx+YuWfceRbf0B/phZoam2rnh1EDSU1zcTG0N4AQK4ARE/CXGvd+RjrqWkOa50RMvqSZtIfdY4h/E6Gurae8r6qx3NOhJNqdXUEiaG7OjSBpEHuZoqn5/vtj88QlsQceXJ9ZSevtOHSr3vIOgwqdxx5n/y2mf8ry2658AeE7NWwqYSg+yEsT8pBV04NoL9h8VfhTGsL/LNPUVk SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508; 20:NDIUSGie/KyuxSYIYlUjCfu5IQ1hMrYAktXHaQGBbODiN2m4k1K2Y9kjwt46c2HM0UJHhXAzpvW2x9mzyO8RQDPtlhs+PG1Y32cY9zmlY3QsUAiRih9eElmh71oXNOoT4Gy8Tfw+6yDDoYoQYb84QWVgvPpqYc57VA1VTe1mWY6FtFmt5qiVTD9EX3Vf6UoLnc2sorqnjTKpi7Nl2KSB6ztZaZuEgDW0pihZfz6HUo+6Gyerg8xwInaBkHzGWA0c X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Jan 2018 09:40:49.8273 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c5c753b6-1cce-45c9-d1c5-08d55420683f X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1508 Subject: [dpdk-dev] [PATCH v2 18/20] doc: add document for AMD CCP crypto poll mode driver X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Jan 2018 09:40:52 -0000 Signed-off-by: Ravi Kumar --- doc/guides/cryptodevs/ccp.rst | 127 +++++++++++++++++++++++++++++ doc/guides/cryptodevs/features/ccp.ini | 57 +++++++++++++ doc/guides/cryptodevs/features/default.ini | 12 +++ doc/guides/cryptodevs/index.rst | 1 + 4 files changed, 197 insertions(+) create mode 100644 doc/guides/cryptodevs/ccp.rst create mode 100644 doc/guides/cryptodevs/features/ccp.ini diff --git a/doc/guides/cryptodevs/ccp.rst b/doc/guides/cryptodevs/ccp.rst new file mode 100644 index 0000000..59b9281 --- /dev/null +++ b/doc/guides/cryptodevs/ccp.rst @@ -0,0 +1,127 @@ +.. Copyright(c) 2017 Advanced Micro Devices, Inc. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + * Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +AMD CCP Poll Mode Driver +======================== + +This code provides the initial implementation of the ccp poll mode driver. +The CCP poll mode driver library (librte_pmd_ccp) implements support for +AMD’s cryptographic co-processor (CCP). The CCP PMD is a virtual crypto +poll mode driver which schedules crypto operations to one or more available +CCP hardware engines on the platform. The CCP PMD provides poll mode crypto +driver support for the following hardware accelerator devices:: + + AMD Cryptographic Co-processor (0x1456) + AMD Cryptographic Co-processor (0x1468) + +Features +-------- + +CCP crypto PMD has support for: + +Cipher algorithms: + +* ``RTE_CRYPTO_CIPHER_AES_CBC`` +* ``RTE_CRYPTO_CIPHER_AES_ECB`` +* ``RTE_CRYPTO_CIPHER_AES_CTR`` +* ``RTE_CRYPTO_CIPHER_3DES_CBC`` + +Hash algorithms: + +* ``RTE_CRYPTO_AUTH_SHA1`` +* ``RTE_CRYPTO_AUTH_SHA1_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA224`` +* ``RTE_CRYPTO_AUTH_SHA224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA256`` +* ``RTE_CRYPTO_AUTH_SHA256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA384`` +* ``RTE_CRYPTO_AUTH_SHA384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA512`` +* ``RTE_CRYPTO_AUTH_SHA512_HMAC`` +* ``RTE_CRYPTO_AUTH_MD5_HMAC`` +* ``RTE_CRYPTO_AUTH_AES_CMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_224`` +* ``RTE_CRYPTO_AUTH_SHA3_224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_256`` +* ``RTE_CRYPTO_AUTH_SHA3_256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_384`` +* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_512`` +* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC`` + +AEAD algorithms: + +* ``RTE_CRYPTO_AEAD_AES_GCM`` + +Installation +------------ + +To compile CCP PMD, it has to be enabled in the config/common_base file. +* ``CONFIG_RTE_LIBRTE_PMD_CCP=y`` + +The CCP PMD also supports computing authentication over CPU with cipher offloaded +to CCP. To enable this feature, enable following in the configuration. +* ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` + +This code was verified on Ubuntu 16.04. + +Initialization +-------------- + +Bind the CCP devices to DPDK UIO driver module before running the CCP PMD stack. +e.g. for the 0x1456 device:: + + cd to the top-level DPDK directory + modprobe uio + insmod ./build/kmod/igb_uio.ko + echo "1022 1456" > /sys/bus/pci/drivers/igb_uio/new_id + +Another way to bind the CCP devices to DPDK UIO driver is by using the ``dpdk-devbind.py`` script. +The following command assumes ``BFD`` of ``0000:09:00.2``:: + + cd to the top-level DPDK directory + ./usertools/dpdk-devbind.py -b igb_uio 0000:09:00.2 + +To verify real traffic l2fwd-crypto example can be used with following command: + +.. code-block:: console + + sudo ./build/l2fwd-crypto -l 1 -n 4 --vdev "crypto_ccp" -- -p 0x1 + --chain CIPHER_HASH --cipher_op ENCRYPT --cipher_algo AES_CBC + --cipher_key 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f + --iv 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:ff + --auth_op GENERATE --auth_algo SHA1_HMAC + --auth_key 11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + +Limitations +----------- + +* Chained mbufs are not supported +* MD5_HMAC is supported only if ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` is enabled in configuration diff --git a/doc/guides/cryptodevs/features/ccp.ini b/doc/guides/cryptodevs/features/ccp.ini new file mode 100644 index 0000000..add4bd8 --- /dev/null +++ b/doc/guides/cryptodevs/features/ccp.ini @@ -0,0 +1,57 @@ +; +; Supported features of the 'ccp' crypto poll mode driver. +; +; Refer to default.ini for the full list of available PMD features. +; +[Features] +Symmetric crypto = Y +Sym operation chaining = Y +HW Accelerated = Y + +; +; Supported crypto algorithms of the 'ccp' crypto driver. +; +[Cipher] +AES CBC (128) = Y +AES CBC (192) = Y +AES CBC (256) = Y +AES ECB (128) = Y +AES ECB (192) = Y +AES ECB (256) = Y +AES CTR (128) = Y +AES CTR (192) = Y +AES CTR (256) = Y +3DES CBC = Y + +; +; Supported authentication algorithms of the 'ccp' crypto driver. +; +[Auth] +MD5 HMAC = Y +SHA1 = Y +SHA1 HMAC = Y +SHA224 = Y +SHA224 HMAC = Y +SHA256 = Y +SHA256 HMAC = Y +SHA384 = Y +SHA384 HMAC = Y +SHA512 = Y +SHA512 HMAC = Y +AES CMAC = Y +SHA3_224 = Y +SHA3_224 HMAC = Y +SHA3_256 = Y +SHA3_256 HMAC = Y +SHA3_384 = Y +SHA3_384 HMAC = Y +SHA3_512 = Y +SHA3_512 HMAC = Y + +; +; Supported AEAD algorithms of the 'ccp' crypto driver. +; +[AEAD] +AES GCM (128) = Y +AES GCM (192) = Y +AES GCM (256) = Y diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini index 18d66cb..54c90c1 100644 --- a/doc/guides/cryptodevs/features/default.ini +++ b/doc/guides/cryptodevs/features/default.ini @@ -27,6 +27,9 @@ NULL = AES CBC (128) = AES CBC (192) = AES CBC (256) = +AES ECB (128) = +AES ECB (192) = +AES ECB (256) = AES CTR (128) = AES CTR (192) = AES CTR (256) = @@ -61,6 +64,15 @@ AES GMAC = SNOW3G UIA2 = KASUMI F9 = ZUC EIA3 = +AES CMAC = +SHA3_224 = +SHA3_224 HMAC = +SHA3_256 = +SHA3_256 HMAC = +SHA3_384 = +SHA3_384 HMAC = +SHA3_512 = +SHA3_512 HMAC = ; ; Supported AEAD algorithms of a default crypto driver. diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst index 6d4e15b..3202b48 100644 --- a/doc/guides/cryptodevs/index.rst +++ b/doc/guides/cryptodevs/index.rst @@ -39,6 +39,7 @@ Crypto Device Drivers aesni_mb aesni_gcm armv8 + ccp dpaa2_sec dpaa_sec kasumi -- 2.7.4