numam-dpdk/app/test-crypto-perf/data
Pablo de Lara acf8616901 cryptodev: add auth IV
Authentication algorithms, such as AES-GMAC or the wireless
algorithms (like SNOW3G) use IV, like cipher algorithms.
So far, AES-GMAC has used the IV from the cipher structure,
and the wireless algorithms have used the AAD field,
which is not technically correct.

Therefore, authentication IV parameters have been added,
so API is more correct. Like cipher IV, auth IV is expected
to be copied after the crypto operation.

Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
Acked-by: Declan Doherty <declan.doherty@intel.com>
Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
Acked-by: Fiona Trahe <fiona.trahe@intel.com>
2017-07-06 22:26:48 +02:00
..
aes_cbc_128_sha.data cryptodev: add auth IV 2017-07-06 22:26:48 +02:00
aes_cbc_192_sha.data cryptodev: add auth IV 2017-07-06 22:26:48 +02:00
aes_cbc_256_sha.data cryptodev: add auth IV 2017-07-06 22:26:48 +02:00