cryptodev: add ChaCha20-Poly1305 AEAD algorithm
This patch adds Chacha20-Poly1305 AEAD algorithm to Cryptodev. Signed-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com> Acked-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
This commit is contained in:
parent
e62893f5ec
commit
b922dbd38c
@ -96,12 +96,13 @@ SHA3_512 HMAC =
|
|||||||
; Supported AEAD algorithms of a default crypto driver.
|
; Supported AEAD algorithms of a default crypto driver.
|
||||||
;
|
;
|
||||||
[AEAD]
|
[AEAD]
|
||||||
AES GCM (128) =
|
AES GCM (128) =
|
||||||
AES GCM (192) =
|
AES GCM (192) =
|
||||||
AES GCM (256) =
|
AES GCM (256) =
|
||||||
AES CCM (128) =
|
AES CCM (128) =
|
||||||
AES CCM (192) =
|
AES CCM (192) =
|
||||||
AES CCM (256) =
|
AES CCM (256) =
|
||||||
|
CHACHA20-POLY1305 =
|
||||||
;
|
;
|
||||||
; Supported Asymmetric algorithms of a default crypto driver.
|
; Supported Asymmetric algorithms of a default crypto driver.
|
||||||
;
|
;
|
||||||
|
@ -145,6 +145,10 @@ New Features
|
|||||||
* Optimized the memory consumption of flow.
|
* Optimized the memory consumption of flow.
|
||||||
* Added support for flow aging based on hardware counter.
|
* Added support for flow aging based on hardware counter.
|
||||||
|
|
||||||
|
* **Added Chacha20-Poly1305 algorithm to Cryptodev API.**
|
||||||
|
|
||||||
|
Chacha20-Poly1305 AEAD algorithm can now be supported in Cryptodev.
|
||||||
|
|
||||||
* **Updated the AESNI MB crypto PMD.**
|
* **Updated the AESNI MB crypto PMD.**
|
||||||
|
|
||||||
* Added support for intel-ipsec-mb version 0.54.
|
* Added support for intel-ipsec-mb version 0.54.
|
||||||
|
@ -409,6 +409,8 @@ enum rte_crypto_aead_algorithm {
|
|||||||
/**< AES algorithm in CCM mode. */
|
/**< AES algorithm in CCM mode. */
|
||||||
RTE_CRYPTO_AEAD_AES_GCM,
|
RTE_CRYPTO_AEAD_AES_GCM,
|
||||||
/**< AES algorithm in GCM mode. */
|
/**< AES algorithm in GCM mode. */
|
||||||
|
RTE_CRYPTO_AEAD_CHACHA20_POLY1305,
|
||||||
|
/**< Chacha20 cipher with poly1305 authenticator */
|
||||||
RTE_CRYPTO_AEAD_LIST_END
|
RTE_CRYPTO_AEAD_LIST_END
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -452,6 +454,11 @@ struct rte_crypto_aead_xform {
|
|||||||
* be allocated, even though the length field will
|
* be allocated, even though the length field will
|
||||||
* have a value less than this.
|
* have a value less than this.
|
||||||
*
|
*
|
||||||
|
* - For Chacha20-Poly1305 it is 96-bit nonce.
|
||||||
|
* PMD sets initial counter for Poly1305 key generation
|
||||||
|
* part to 0 and for Chacha20 encryption to 1 as per
|
||||||
|
* rfc8439 2.8. AEAD construction.
|
||||||
|
*
|
||||||
* For optimum performance, the data pointed to SHOULD
|
* For optimum performance, the data pointed to SHOULD
|
||||||
* be 8-byte aligned.
|
* be 8-byte aligned.
|
||||||
*/
|
*/
|
||||||
@ -468,6 +475,8 @@ struct rte_crypto_aead_xform {
|
|||||||
*
|
*
|
||||||
* - For CCM mode, this is the length of the nonce,
|
* - For CCM mode, this is the length of the nonce,
|
||||||
* which can be in the range 7 to 13 inclusive.
|
* which can be in the range 7 to 13 inclusive.
|
||||||
|
*
|
||||||
|
* - For Chacha20-Poly1305 this field is always 12.
|
||||||
*/
|
*/
|
||||||
} iv; /**< Initialisation vector parameters */
|
} iv; /**< Initialisation vector parameters */
|
||||||
|
|
||||||
|
@ -152,6 +152,7 @@ const char *
|
|||||||
rte_crypto_aead_algorithm_strings[] = {
|
rte_crypto_aead_algorithm_strings[] = {
|
||||||
[RTE_CRYPTO_AEAD_AES_CCM] = "aes-ccm",
|
[RTE_CRYPTO_AEAD_AES_CCM] = "aes-ccm",
|
||||||
[RTE_CRYPTO_AEAD_AES_GCM] = "aes-gcm",
|
[RTE_CRYPTO_AEAD_AES_GCM] = "aes-gcm",
|
||||||
|
[RTE_CRYPTO_AEAD_CHACHA20_POLY1305] = "chacha20-poly1305"
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
Loading…
x
Reference in New Issue
Block a user