From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0062.outbound.protection.outlook.com [104.47.42.62]) by dpdk.org (Postfix) with ESMTP id 91EEF1B258 for ; Wed, 10 Jan 2018 10:43:50 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=n83VL2ffciOx9FfMz98gEI75UcyWTTUI6aRcwKDCQ6g=; b=47pumXFzYcQU5xRJxBJJFd8giaeBqMxYN1Zhlm8acQAs2Hv/l0U6iVud06pkg/oPpcZrkuOx2RL2KVU6ZD5WBPuH0X8Oe+dwXY9Gtpr8mimewH+EYdsp5JSrZurgnBm5N44rk7V4s8u/pAawxjKoPJzV1kV+rYz3LK3yoaxq4JY= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Ravi1.Kumar@amd.com; Received: from wallaby-smavila.amd.com (202.56.249.162) by CY4PR12MB1509.namprd12.prod.outlook.com (10.172.68.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.386.5; Wed, 10 Jan 2018 09:43:48 +0000 From: Ravi Kumar To: dev@dpdk.org Cc: pablo.de.lara.guarch@intel.com Date: Wed, 10 Jan 2018 04:42:59 -0500 Message-Id: <1515577379-18453-19-git-send-email-Ravi1.kumar@amd.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1515577379-18453-1-git-send-email-Ravi1.kumar@amd.com> References: <1515145198-97367-1-git-send-email-Ravi1.kumar@amd.com> <1515577379-18453-1-git-send-email-Ravi1.kumar@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=n Content-Transfer-Encoding: 8bit X-Originating-IP: [202.56.249.162] X-ClientProxiedBy: MAXPR0101CA0024.INDPRD01.PROD.OUTLOOK.COM (10.174.62.34) To CY4PR12MB1509.namprd12.prod.outlook.com (10.172.68.22) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 31baa463-0297-4ece-7aa8-08d5580ea6a3 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020049)(4652020)(48565401081)(5600026)(4604075)(2017052603307)(7153060)(7193020); SRVR:CY4PR12MB1509; X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1509; 3:P/ECJVwLE1jZAzFSuX5LVC8H+AlKq/UBnVrlzfEdpvM2bZOuuxGqZAYwZ5dUjfrt84347EXSB3kSagRNMKhcqb2fq7/SZ97CtPZ4fRuAkoYNbVNIUlGgCAS8hnbIs/6eNbT5j3xNCmiX2FcbktWxV6VgJ048J45CWZugi3+5LhJYc3yV1d37cQeLkLTSEkjo5mo/Hx7SScEH4A8vszC674BdMCCT1g6SfcgzMO9NkjD4I7a83qt0vD1gLrv1pzCc; 25:jRLVKNgariqWF8hOBbCPTqDja+8kUo5AlCZiuRTiI+PZ8dgSuDr+Te8eWnkZ9Zg7m2ELdC2AGsv9a7FX3POT2GgODj8/j6vFQYP/sYWTs2s0mPo2kCvmtaOWWkCby3zVst5pgBsEE+UH5pzOyTDTjPMfcb7w6muB97buxPixFOsitvYGMUoWBxispxPbAdBhNHj1c0N0UiJPZrFGuYoqU0pA/D0bLir/MPfyvLD9obi10/mLMFD4beHIZjZfpoTkpO0LYynKIzwRHWxdi1y/4tuLJ6uv1FziYKkkv6My+62z7QLA5SMPXz4HC0IzxwP02SSkCXLOJrqO9yg6fel7EA==; 31:/baYHfGL2slBL1PpbIH6AmXiI7kfLEqifY/uxzK+uK5H7PINCy2SN+lXTBIRBZ1Y9PAzbG3ECSKViKJBVtHluLI3+Mnj0bCMikRdF5AGw9ee40cgHFDVfLzy6JKlu7yriXW+G59gc7ydiaBJi/F1b/OiAtp1jZ5cco5nlryqUPT43NPb/qykiWCtDRqJjG7chNn641ZGns4ZPVflj1EAYfqe7qJrTjBt52h0yAxUkPU= X-MS-TrafficTypeDiagnostic: CY4PR12MB1509: X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1509; 20: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; 4:TodFEJ5SMTZlvVcuSs+ed1WRE511U9WDPUqXBddgNmlDl0YHZKkQ75plvz/C7gHDUuT1CJmJ7ak96CJ85gjadikFMeufFoISI5qlN9m3pUYB8gnMwPG4amEmWSXtOVu4dxfXW+ltfJJttTvGn+fRLEO+zbHTwI6Bo9N/HoNoRJFw37gB5V032/1M/lDr4capSj07+4HCj6N4xIppBzKwbi/Lx/7ENpTD0zvL+/Gg2XpinDy+lZD2N316Y8jc1NA+Hx2NM0cV/51vOCCkEMCLrSBKaNuRDGA6b2lkEPGagfyicMcs0KpIMZ7NYB83besp X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040470)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(3231023)(944501119)(6055026)(6041268)(20161123562045)(20161123558120)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:CY4PR12MB1509; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:CY4PR12MB1509; X-Forefront-PRVS: 0548586081 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(366004)(39860400002)(396003)(346002)(376002)(39380400002)(189003)(199004)(25786009)(8676002)(81166006)(47776003)(6666003)(2950100002)(81156014)(6916009)(66066001)(50226002)(68736007)(36756003)(8936002)(72206003)(50466002)(16526018)(316002)(2870700001)(53936002)(478600001)(5660300001)(86362001)(4326008)(386003)(2361001)(2351001)(6486002)(53416004)(97736004)(76176011)(106356001)(105586002)(7736002)(6116002)(3846002)(2906002)(59450400001)(305945005)(7696005)(52116002)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR12MB1509; H:wallaby-smavila.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY4PR12MB1509; 23:nAzT3RCqZrDWFuA0fQ9AWJTh4NNjCkVLlg5+kS+2j?= =?us-ascii?Q?wIBfl53y3jQrWSDn4dwV26z0o0V+uops+eBR9oPIeyuhqKxHx9olnWuiJ9+/?= =?us-ascii?Q?Ro/OdguymJ9qsrISX6nTHvHTMOLX3AXpWl322Dfl147nqQNmAk47PJusKs0f?= =?us-ascii?Q?TIRxqjuDi3LqpgbWRjhpoXuseMjuyP0SGPqFW4JUpeVL9vkpMIAqKBYx9BN+?= =?us-ascii?Q?/u7DRWonNQkYIJNtWaABHkVzKlQVmS+sF65Y8zfpwQa1RVKlMqf7XxWRqIu4?= =?us-ascii?Q?R8Dbx4Fjccd4aremiOYf6/NA4WUTrI8B0N8MKen1mRx1fuIDFTEwuF4WnElL?= =?us-ascii?Q?kkYT+MGu22y0LFSmgrs07MxlUSMNx973Km2mEjivj0FpGc1bat5BDPTzJcG9?= =?us-ascii?Q?XFx/rnhfnDXl5GcBXvzDluTJoQFcSMZdvdTbvqpcvptdHxQWZvDJSKNrNdfN?= =?us-ascii?Q?yYkHc23X4l5WmY/vYEXtFs7S3qEOJomQsAmXGJxBcZJygILV6CfszaZ+VqMs?= =?us-ascii?Q?iEpTAtFIvziUTeLu/aNYSv0bjCboipEppwrIgLD+OyFEte9A/6RKgNO4mg/+?= =?us-ascii?Q?GB+BEt7i7U6j5HFya1CDqXARRktkNkUJ6rIv4UE7H5pyAPjMngNFPezrfWhM?= =?us-ascii?Q?OpXhi/1R8cQQAtmcFSMUEYNVcJMFExtOcxEi05Y7YX8RS2BZgOQ8hhZFiOVY?= =?us-ascii?Q?W316S79dh3sjuxGs+mPKddZRu0vxak091/LxDDkCm7ysntrPSOaKfHZ5aer0?= =?us-ascii?Q?FdwQdvgN9CPprQFVnTPD1NOl2qd2Z0QnRJ2sQdcW9g8VlrUgbv91m66KLTaV?= =?us-ascii?Q?8luNO5NlONmtZHBDgoI/JKDKUnqck8TT9LzdtieGkbSU7noCKCZixfMC3BNi?= =?us-ascii?Q?TveK58WnAlHIyrnBCzulRZ1w3Ih9KqqLEWWv6XYF+j0MPaotMW/5jHV/lBOR?= =?us-ascii?Q?YtmSOiaDsttnXcppppI4hAad8M+H/46pP+ZwOKDWTY7D9hmKEz2555ZoDScr?= =?us-ascii?Q?BcErEcgZXyR+A2SJKZxOhJRe1At22QD9ax4QyuEKX0DGgytw3+lCYN8GR9bs?= =?us-ascii?Q?6N17Gxm36rVnl8HLQ79WVd+8/lsGUQSjozT9yqsLhthsZuSJp2foTbLkAphc?= =?us-ascii?Q?eveEvNDbfJtt1QjD1GMvb0+2YzyrFU1?= X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1509; 6:SCSi3X4WUTE9cMBvGJrUDXxSHtQ32VZYO2Q1QjN51CLx6IiMZpUiU6vYIaLXXLBqYc/M1H6mqNy2qTD5Cj1qXsBM2hirtEUx9nJCU49Rel8qeaNxwKEu2ijzqcqAW+ZxewZISxh3oLIRFxqzSL4DtSL4ksnCuxEoH+W2BSg3/vB1fCJJ7+4owlx1AUK/dpPBdZAGoVmjTHKCAR7vZ2GVo+wxBra3w3IBFott+kYTqAwJDoad7ATlvwHnO71kxOICmJjK7XhFEkL6q9NHGXpnPPa9q8wq93IbYvnXDqDL0GuBYxruTxDRnGXEK9bIztD87ppqv/h1DCPsTzRox+N7283FCTdlzaV/OXIEUxL0RAs=; 5:fTCissRpfUiKEfGr/lgNhNGRuQ6xTS29+SXei2Fj3N4oPyq9QuIUTMhTaikGkHa4/D2uu90yRg4Uw4BQ1c0MfVQvUMBe2N67sxEs1f9khRGugnxCOXsjWxi/QZalZmBsXN7BYTQrh1jaWC5RBziNkDuMItkGP6Fy5f+7i2Z4e84=; 24:ANcsnCwEhvi8OFw0oPNhGbPS554LZEku816g0r/sH0qGX7SEW6UCvWHIFUE6AYanCTdKmHwk44gG+Eghgvmu29dwTa4ZweMds74kyWAfJ44=; 7:YTIyHHWSFeXAN4DvH0xA8ZMkCYgBrb6RRkOxNGeZO7Vekte+xyXRUlXsxqu6idwry1lTcofGw4NoxZtZs4zl+WGepDzLVXSC0Usy8I18+3ny0sSFbXYGgj6ngW6Rj9xh7R527ZgqYj0ONZeNGByzlxCmuu0yNCKo3QGyh6/KCcbeGVvu3Szcav23f9wykQecXXovIV6tC8aFc3sT7y2ZlP47wRaT7UGZ2oLt+4/A+k6AZ6nRBKu+bT6czgv10ZTQ SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY4PR12MB1509; 20:cL2/JElydRdUfdCm+YeHVkYW03sS7/b+etSSJywTXAlobfEj5t8Nru2wqCeKuCbJanmdNS9hvWNOdI2UMEmPttQQ/pZCMcNgG5HR2GET4pVlumRaasEZ6L5+PyA5FN1HzVIGKecTv25myeXu/n2Nn9i2Yn8JM2vcDF94kD8lYLA1hGm6cLvi4lV/k1iO55J68ok+UGZ1cJzOIHBMnPfF9VFj3yGsZ7Jsqa+vY5aN3P4zspfKuz/BpHsfLYjI5N9A X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Jan 2018 09:43:48.2092 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 31baa463-0297-4ece-7aa8-08d5580ea6a3 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1509 Subject: [dpdk-dev] [PATCH v3 19/19] doc: add document for AMD CCP crypto poll mode driver X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Jan 2018 09:43:51 -0000 Signed-off-by: Ravi Kumar --- doc/guides/cryptodevs/ccp.rst | 127 +++++++++++++++++++++++++++++ doc/guides/cryptodevs/features/ccp.ini | 57 +++++++++++++ doc/guides/cryptodevs/features/default.ini | 12 +++ doc/guides/cryptodevs/index.rst | 1 + 4 files changed, 197 insertions(+) create mode 100644 doc/guides/cryptodevs/ccp.rst create mode 100644 doc/guides/cryptodevs/features/ccp.ini diff --git a/doc/guides/cryptodevs/ccp.rst b/doc/guides/cryptodevs/ccp.rst new file mode 100644 index 0000000..59b9281 --- /dev/null +++ b/doc/guides/cryptodevs/ccp.rst @@ -0,0 +1,127 @@ +.. Copyright(c) 2017 Advanced Micro Devices, Inc. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + * Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + * Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT + HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, + SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT + LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +AMD CCP Poll Mode Driver +======================== + +This code provides the initial implementation of the ccp poll mode driver. +The CCP poll mode driver library (librte_pmd_ccp) implements support for +AMD’s cryptographic co-processor (CCP). The CCP PMD is a virtual crypto +poll mode driver which schedules crypto operations to one or more available +CCP hardware engines on the platform. The CCP PMD provides poll mode crypto +driver support for the following hardware accelerator devices:: + + AMD Cryptographic Co-processor (0x1456) + AMD Cryptographic Co-processor (0x1468) + +Features +-------- + +CCP crypto PMD has support for: + +Cipher algorithms: + +* ``RTE_CRYPTO_CIPHER_AES_CBC`` +* ``RTE_CRYPTO_CIPHER_AES_ECB`` +* ``RTE_CRYPTO_CIPHER_AES_CTR`` +* ``RTE_CRYPTO_CIPHER_3DES_CBC`` + +Hash algorithms: + +* ``RTE_CRYPTO_AUTH_SHA1`` +* ``RTE_CRYPTO_AUTH_SHA1_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA224`` +* ``RTE_CRYPTO_AUTH_SHA224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA256`` +* ``RTE_CRYPTO_AUTH_SHA256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA384`` +* ``RTE_CRYPTO_AUTH_SHA384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA512`` +* ``RTE_CRYPTO_AUTH_SHA512_HMAC`` +* ``RTE_CRYPTO_AUTH_MD5_HMAC`` +* ``RTE_CRYPTO_AUTH_AES_CMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_224`` +* ``RTE_CRYPTO_AUTH_SHA3_224_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_256`` +* ``RTE_CRYPTO_AUTH_SHA3_256_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_384`` +* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC`` +* ``RTE_CRYPTO_AUTH_SHA3_512`` +* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC`` + +AEAD algorithms: + +* ``RTE_CRYPTO_AEAD_AES_GCM`` + +Installation +------------ + +To compile CCP PMD, it has to be enabled in the config/common_base file. +* ``CONFIG_RTE_LIBRTE_PMD_CCP=y`` + +The CCP PMD also supports computing authentication over CPU with cipher offloaded +to CCP. To enable this feature, enable following in the configuration. +* ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` + +This code was verified on Ubuntu 16.04. + +Initialization +-------------- + +Bind the CCP devices to DPDK UIO driver module before running the CCP PMD stack. +e.g. for the 0x1456 device:: + + cd to the top-level DPDK directory + modprobe uio + insmod ./build/kmod/igb_uio.ko + echo "1022 1456" > /sys/bus/pci/drivers/igb_uio/new_id + +Another way to bind the CCP devices to DPDK UIO driver is by using the ``dpdk-devbind.py`` script. +The following command assumes ``BFD`` of ``0000:09:00.2``:: + + cd to the top-level DPDK directory + ./usertools/dpdk-devbind.py -b igb_uio 0000:09:00.2 + +To verify real traffic l2fwd-crypto example can be used with following command: + +.. code-block:: console + + sudo ./build/l2fwd-crypto -l 1 -n 4 --vdev "crypto_ccp" -- -p 0x1 + --chain CIPHER_HASH --cipher_op ENCRYPT --cipher_algo AES_CBC + --cipher_key 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f + --iv 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:ff + --auth_op GENERATE --auth_algo SHA1_HMAC + --auth_key 11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + :11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11 + +Limitations +----------- + +* Chained mbufs are not supported +* MD5_HMAC is supported only if ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` is enabled in configuration diff --git a/doc/guides/cryptodevs/features/ccp.ini b/doc/guides/cryptodevs/features/ccp.ini new file mode 100644 index 0000000..add4bd8 --- /dev/null +++ b/doc/guides/cryptodevs/features/ccp.ini @@ -0,0 +1,57 @@ +; +; Supported features of the 'ccp' crypto poll mode driver. +; +; Refer to default.ini for the full list of available PMD features. +; +[Features] +Symmetric crypto = Y +Sym operation chaining = Y +HW Accelerated = Y + +; +; Supported crypto algorithms of the 'ccp' crypto driver. +; +[Cipher] +AES CBC (128) = Y +AES CBC (192) = Y +AES CBC (256) = Y +AES ECB (128) = Y +AES ECB (192) = Y +AES ECB (256) = Y +AES CTR (128) = Y +AES CTR (192) = Y +AES CTR (256) = Y +3DES CBC = Y + +; +; Supported authentication algorithms of the 'ccp' crypto driver. +; +[Auth] +MD5 HMAC = Y +SHA1 = Y +SHA1 HMAC = Y +SHA224 = Y +SHA224 HMAC = Y +SHA256 = Y +SHA256 HMAC = Y +SHA384 = Y +SHA384 HMAC = Y +SHA512 = Y +SHA512 HMAC = Y +AES CMAC = Y +SHA3_224 = Y +SHA3_224 HMAC = Y +SHA3_256 = Y +SHA3_256 HMAC = Y +SHA3_384 = Y +SHA3_384 HMAC = Y +SHA3_512 = Y +SHA3_512 HMAC = Y + +; +; Supported AEAD algorithms of the 'ccp' crypto driver. +; +[AEAD] +AES GCM (128) = Y +AES GCM (192) = Y +AES GCM (256) = Y diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini index 18d66cb..54c90c1 100644 --- a/doc/guides/cryptodevs/features/default.ini +++ b/doc/guides/cryptodevs/features/default.ini @@ -27,6 +27,9 @@ NULL = AES CBC (128) = AES CBC (192) = AES CBC (256) = +AES ECB (128) = +AES ECB (192) = +AES ECB (256) = AES CTR (128) = AES CTR (192) = AES CTR (256) = @@ -61,6 +64,15 @@ AES GMAC = SNOW3G UIA2 = KASUMI F9 = ZUC EIA3 = +AES CMAC = +SHA3_224 = +SHA3_224 HMAC = +SHA3_256 = +SHA3_256 HMAC = +SHA3_384 = +SHA3_384 HMAC = +SHA3_512 = +SHA3_512 HMAC = ; ; Supported AEAD algorithms of a default crypto driver. diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst index 6d4e15b..3202b48 100644 --- a/doc/guides/cryptodevs/index.rst +++ b/doc/guides/cryptodevs/index.rst @@ -39,6 +39,7 @@ Crypto Device Drivers aesni_mb aesni_gcm armv8 + ccp dpaa2_sec dpaa_sec kasumi -- 2.7.4