git.droids-corp.org
/
dpdk.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
crypto/aesni_mb: support Chacha20-Poly1305
[dpdk.git]
/
doc
/
guides
/
cryptodevs
/
features
/
qat.ini
diff --git
a/doc/guides/cryptodevs/features/qat.ini
b/doc/guides/cryptodevs/features/qat.ini
index
0832e59
..
9e82f28
100644
(file)
--- a/
doc/guides/cryptodevs/features/qat.ini
+++ b/
doc/guides/cryptodevs/features/qat.ini
@@
-7,12
+7,16
@@
Symmetric crypto = Y
Sym operation chaining = Y
HW Accelerated = Y
Symmetric crypto = Y
Sym operation chaining = Y
HW Accelerated = Y
+Protocol offload = Y
In Place SGL = Y
OOP SGL In SGL Out = Y
OOP SGL In LB Out = Y
OOP LB In SGL Out = Y
OOP LB In LB Out = Y
Digest encrypted = Y
In Place SGL = Y
OOP SGL In SGL Out = Y
OOP SGL In LB Out = Y
OOP LB In SGL Out = Y
OOP LB In LB Out = Y
Digest encrypted = Y
+Asymmetric sessionless = Y
+RSA PRIV OP KEY EXP = Y
+RSA PRIV OP KEY QT = Y
;
; Supported crypto algorithms of the 'qat' crypto driver.
;
; Supported crypto algorithms of the 'qat' crypto driver.
@@
-41,10
+45,15
@@
ZUC EEA3 = Y
[Auth]
NULL = Y
MD5 HMAC = Y
[Auth]
NULL = Y
MD5 HMAC = Y
+SHA1 = Y
SHA1 HMAC = Y
SHA1 HMAC = Y
+SHA224 = Y
SHA224 HMAC = Y
SHA224 HMAC = Y
+SHA256 = Y
SHA256 HMAC = Y
SHA256 HMAC = Y
+SHA384 = Y
SHA384 HMAC = Y
SHA384 HMAC = Y
+SHA512 = Y
SHA512 HMAC = Y
AES GMAC = Y
SNOW3G UIA2 = Y
SHA512 HMAC = Y
AES GMAC = Y
SNOW3G UIA2 = Y
@@
-57,12
+66,13
@@
AES CMAC (128) = Y
; Supported AEAD algorithms of the 'qat' crypto driver.
;
[AEAD]
; Supported AEAD algorithms of the 'qat' crypto driver.
;
[AEAD]
-AES GCM (128) = Y
-AES GCM (192) = Y
-AES GCM (256) = Y
-AES CCM (128) = Y
-AES CCM (192) = Y
-AES CCM (256) = Y
+AES GCM (128) = Y
+AES GCM (192) = Y
+AES GCM (256) = Y
+AES CCM (128) = Y
+AES CCM (192) = Y
+AES CCM (256) = Y
+CHACHA20-POLY1305 = Y
;
; Supported Asymmetric algorithms of the 'qat' crypto driver.
;
; Supported Asymmetric algorithms of the 'qat' crypto driver.
@@
-70,3
+80,4
@@
AES CCM (256) = Y
[Asymmetric]
Modular Exponentiation = Y
Modular Inversion = Y
[Asymmetric]
Modular Exponentiation = Y
Modular Inversion = Y
+RSA = Y