The credential and the AES-XTS keys should be provided to the hardware, as ciphertext
encrypted by the KEK.
+A keytag (64 bits) should be appended to the AES-XTS keys (before wrapping),
+and will be validated when the hardware attempts to access it.
+
When crypto engines are defined to work in wrapped import method, they come out
of the factory in Commissioning mode, and thus, cannot be used for crypto operations
yet. A dedicated tool is used for changing the mode from Commissioning to
The "wrapped_crypto_operational" value will be "0x00000001" if the mode was
successfully changed to operational mode.
+ The mlx5 crypto PMD can be verified by running the test application::
+
+ dpdk-test -c 1 -n 1 -w <dev>,class=crypto,wcs_file=<file_path>
+ RTE>>cryptodev_mlx5_autotest
+
Driver options
--------------
The identifier of the credential, default value is 0 represents the operational
register credential.
+- ``keytag`` parameter [int]
+
+ The plaintext of the keytag appended to the AES-XTS keys, default value is 0.
+
+- ``max_segs_num`` parameter [int]
+
+ Maximum number of mbuf chain segments(src or dest), default value is 8.
+
Supported NICs
--------------