.. SPDX-License-Identifier: BSD-3-Clause Copyright(C) 2020 Broadcom Broadcom FlexSparc Crypto Poll Mode Driver ========================================== The FlexSparc crypto poll mode driver (BCMFS PMD) provides support for offloading cryptographic operations to the Broadcom SoCs having FlexSparc4/FlexSparc5 unit. Detailed information about SoCs can be found at `Broadcom Official Website `__. Supported Broadcom SoCs ----------------------- * Stingray * Stingray2 Features -------- The BCMFS SYM PMD has support for: Cipher algorithms: * ``RTE_CRYPTO_CIPHER_3DES_CBC`` * ``RTE_CRYPTO_CIPHER_3DES_CTR`` * ``RTE_CRYPTO_CIPHER_AES128_CBC`` * ``RTE_CRYPTO_CIPHER_AES192_CBC`` * ``RTE_CRYPTO_CIPHER_AES256_CBC`` * ``RTE_CRYPTO_CIPHER_AES128_CTR`` * ``RTE_CRYPTO_CIPHER_AES192_CTR`` * ``RTE_CRYPTO_CIPHER_AES256_CTR`` * ``RTE_CRYPTO_CIPHER_AES_XTS`` * ``RTE_CRYPTO_CIPHER_DES_CBC`` Hash algorithms: * ``RTE_CRYPTO_AUTH_SHA1`` * ``RTE_CRYPTO_AUTH_SHA1_HMAC`` * ``RTE_CRYPTO_AUTH_SHA224`` * ``RTE_CRYPTO_AUTH_SHA224_HMAC`` * ``RTE_CRYPTO_AUTH_SHA256`` * ``RTE_CRYPTO_AUTH_SHA256_HMAC`` * ``RTE_CRYPTO_AUTH_SHA384`` * ``RTE_CRYPTO_AUTH_SHA384_HMAC`` * ``RTE_CRYPTO_AUTH_SHA512`` * ``RTE_CRYPTO_AUTH_SHA512_HMAC`` * ``RTE_CRYPTO_AUTH_AES_XCBC_MAC`` * ``RTE_CRYPTO_AUTH_AES_CBC_MAC`` * ``RTE_CRYPTO_AUTH_MD5_HMAC`` * ``RTE_CRYPTO_AUTH_AES_GMAC`` * ``RTE_CRYPTO_AUTH_AES_CMAC`` Supported AEAD algorithms: * ``RTE_CRYPTO_AEAD_AES_GCM`` * ``RTE_CRYPTO_AEAD_AES_CCM`` Installation ------------ Information about kernel, rootfs and toolchain can be found at `Broadcom Official Website `__. .. Note:: To execute BCMFS PMD, it must be compiled with VFIO_PRESENT flag on the compiling platform and same gets enabled in rte_vfio.h. The BCMFS crypto PMD may be compiled natively on a Stingray/Stingray2 platform or cross-compiled on an x86 platform. For example, below commands can be executed for cross compiling on x86 platform. .. code-block:: console cd meson --cross-file config/arm/arm64_stingray_linux_gcc cd ninja Initialization -------------- The supported platform devices should be present in the */sys/bus/platform/devices/fs/* path on the booted kernel. To get BCMFS PMD executing, device node must be owned by VFIO platform module only. For example, below commands can be run to get hold of a device node by VFIO. .. code-block:: console SETUP_SYSFS_DEV_NAME=67000000.crypto_mbox io_device_name="vfio-platform" echo $io_device_name > /sys/bus/platform/devices/${SETUP_SYSFS_DEV_NAME}/driver_override echo ${SETUP_SYSFS_DEV_NAME} > /sys/bus/platform/drivers_probe Limitations ----------- * Only supports the session-oriented API implementation (session-less APIs are not supported). * CCM is not supported on Broadcom`s SoCs having FlexSparc4 unit. Testing ------- The symmetric crypto operations on BCMFS crypto PMD may be verified by running the test application: .. code-block:: console ./dpdk-test RTE>>cryptodev_bcmfs_autotest