1. Crypto Device Supported Functionality Matrices
1.1. Supported Feature Flags
Table 1.2 Features availability in crypto drivers
Feature |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
k
a
s
u
m
i |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
Symmetric crypto |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Asymmetric crypto |
|
|
|
|
|
|
|
|
|
|
Sym operation chaining |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
HW Accelerated |
|
|
|
Y |
|
|
|
Y |
|
|
CPU SSE |
Y |
Y |
|
|
|
|
|
|
|
|
CPU AVX |
Y |
Y |
|
|
|
|
|
|
|
|
CPU AVX2 |
Y |
Y |
|
|
|
|
|
|
|
|
CPU AVX512 |
|
Y |
|
|
|
|
|
|
|
|
CPU AESNI |
Y |
Y |
|
|
|
|
|
|
|
|
CPU NEON |
|
|
Y |
|
|
|
|
|
|
|
CPU ARM CE |
|
|
Y |
|
|
|
|
|
|
|
1.2. Supported Cipher Algorithms
Table 1.3 Cipher algorithms in crypto drivers
Cipher algorithm |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
k
a
s
u
m
i |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
NULL |
|
|
|
|
|
Y |
|
Y |
|
|
AES CBC (128) |
|
Y |
Y |
Y |
|
|
Y |
Y |
|
|
AES CBC (192) |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
AES CBC (256) |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
AES CTR (128) |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
AES CTR (192) |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
AES CTR (256) |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
AES DOCSIS BPI |
|
Y |
|
|
|
|
|
Y |
|
|
3DES CBC |
|
|
|
Y |
|
|
Y |
Y |
|
|
3DES CTR |
|
|
|
|
|
|
Y |
Y |
|
|
DES CBC |
|
|
|
|
|
|
|
Y |
|
|
DES DOCSIS BPI |
|
|
|
|
|
|
Y |
Y |
|
|
SNOW3G UEA2 |
|
|
|
|
|
|
|
Y |
Y |
|
KASUMI F8 |
|
|
|
|
Y |
|
|
Y |
|
|
ZUC EEA3 |
|
|
|
|
|
|
|
Y |
|
Y |
1.3. Supported Authentication Algorithms
Table 1.4 Authentication algorithms in crypto drivers
Authentication algorithm |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
k
a
s
u
m
i |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
NULL |
|
|
|
|
|
Y |
|
Y |
|
|
MD5 |
|
|
|
|
|
|
Y |
|
|
|
MD5 HMAC |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
SHA1 |
|
|
|
|
|
|
Y |
|
|
|
SHA1 HMAC |
|
Y |
Y |
Y |
|
|
Y |
Y |
|
|
SHA224 |
|
|
|
|
|
|
Y |
|
|
|
SHA224 HMAC |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
SHA256 |
|
|
|
|
|
|
Y |
|
|
|
SHA256 HMAC |
|
Y |
Y |
Y |
|
|
Y |
Y |
|
|
SHA384 |
|
|
|
|
|
|
Y |
|
|
|
SHA384 HMAC |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
SHA512 |
|
|
|
|
|
|
Y |
|
|
|
SHA512 HMAC |
|
Y |
|
Y |
|
|
Y |
Y |
|
|
AES XCBC MAC |
|
Y |
|
|
|
|
|
Y |
|
|
AES GMAC |
Y |
|
|
|
|
|
Y |
Y |
|
|
SNOW3G UIA2 |
|
|
|
|
|
|
|
Y |
Y |
|
KASUMI F9 |
|
|
|
|
Y |
|
|
Y |
|
|
ZUC EIA3 |
|
|
|
|
|
|
|
Y |
|
Y |
1.4. Supported AEAD Algorithms
Table 1.5 AEAD algorithms in crypto drivers
AEAD algorithm |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
k
a
s
u
m
i |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
AES GCM (128) |
Y |
|
|
Y |
|
|
Y |
Y |
|
|
AES GCM (192) |
Y |
|
|
Y |
|
|
Y |
Y |
|
|
AES GCM (256) |
Y |
|
|
Y |
|
|
Y |
Y |
|
|