X-Git-Url: http://git.droids-corp.org/?a=blobdiff_plain;f=doc%2Fguides%2Fcryptodevs%2Faesni_mb.rst;h=1eff2b07363dbe7c66e11745e1129899dcfaa58d;hb=092a9de50b25c2b66eb79be83bee21c2db2f08e5;hp=c29295002f4df078dcf6bbbb180ed9fecc9f5e90;hpb=06c761d6fb50c8ba5990fa48838c478b5dbd89c0;p=dpdk.git diff --git a/doc/guides/cryptodevs/aesni_mb.rst b/doc/guides/cryptodevs/aesni_mb.rst index c29295002f..1eff2b0736 100644 --- a/doc/guides/cryptodevs/aesni_mb.rst +++ b/doc/guides/cryptodevs/aesni_mb.rst @@ -1,5 +1,5 @@ .. SPDX-License-Identifier: BSD-3-Clause - Copyright(c) 2015-2017 Intel Corporation. + Copyright(c) 2015-2018 Intel Corporation. AESN-NI Multi Buffer Crypto Poll Mode Driver ============================================ @@ -40,16 +40,22 @@ Hash algorithms: * RTE_CRYPTO_HASH_SHA512_HMAC * RTE_CRYPTO_HASH_AES_XCBC_HMAC * RTE_CRYPTO_HASH_AES_CMAC +* RTE_CRYPTO_HASH_AES_GMAC +* RTE_CRYPTO_HASH_SHA1 +* RTE_CRYPTO_HASH_SHA224 +* RTE_CRYPTO_HASH_SHA256 +* RTE_CRYPTO_HASH_SHA384 +* RTE_CRYPTO_HASH_SHA512 AEAD algorithms: * RTE_CRYPTO_AEAD_AES_CCM +* RTE_CRYPTO_AEAD_AES_GCM Limitations ----------- * Chained mbufs are not supported. -* Only in-place is currently supported (destination address is the same as source address). Installation @@ -58,8 +64,8 @@ Installation To build DPDK with the AESNI_MB_PMD the user is required to download the multi-buffer library from `here `_ and compile it on their user system before building DPDK. -The latest version of the library supported by this PMD is v0.50, which -can be downloaded from ``_. +The latest version of the library supported by this PMD is v0.52, which +can be downloaded from ``. .. code-block:: console @@ -81,7 +87,8 @@ and the Multi-Buffer library version supported by them: 17.05 - 17.08 0.45 - 0.48 17.11 0.47 - 0.48 18.02 0.48 - 18.05+ 0.49+ + 18.05 - 19.02 0.49 - 0.52 + 19.05+ 0.52+ ============== ============================ @@ -122,7 +129,7 @@ Extra notes For AES Counter mode (AES-CTR), the library supports two different sizes for Initialization Vector (IV): -* 12 bytes: used mainly for IPSec, as it requires 12 bytes from the user, which internally +* 12 bytes: used mainly for IPsec, as it requires 12 bytes from the user, which internally are appended the counter block (4 bytes), which is set to 1 for the first block (no padding required from the user)