1. Crypto Device Supported Functionality Matrices
1.1. Supported Feature Flags
Table 1.3 Features availability in crypto drivers
| Feature |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
d
p
a
a
_
s
e
c |
k
a
s
u
m
i |
m
r
v
l |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
| Symmetric crypto |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
| Asymmetric crypto |
|
|
|
|
|
|
|
|
|
|
|
|
| Sym operation chaining |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
| HW Accelerated |
|
|
|
Y |
Y |
|
|
|
|
Y |
|
|
| Protocol offload |
|
|
|
Y |
|
|
|
|
|
|
|
|
| CPU SSE |
Y |
Y |
|
|
|
|
|
|
|
|
|
|
| CPU AVX |
Y |
Y |
|
|
|
|
|
|
|
|
|
|
| CPU AVX2 |
Y |
Y |
|
|
|
|
|
|
|
|
|
|
| CPU AVX512 |
|
Y |
|
|
|
|
|
|
|
|
|
|
| CPU AESNI |
Y |
Y |
|
|
|
|
|
|
|
|
|
|
| CPU NEON |
|
|
Y |
|
|
|
|
|
|
|
|
|
| CPU ARM CE |
|
|
Y |
|
|
|
|
|
|
|
|
|
1.2. Supported Cipher Algorithms
Table 1.4 Cipher algorithms in crypto drivers
| Cipher algorithm |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
d
p
a
a
_
s
e
c |
k
a
s
u
m
i |
m
r
v
l |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
| NULL |
|
|
|
|
|
|
|
Y |
|
Y |
|
|
| AES CBC (128) |
|
Y |
Y |
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES CBC (192) |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES CBC (256) |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES CTR (128) |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES CTR (192) |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES CTR (256) |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES DOCSIS BPI |
|
Y |
|
|
|
|
|
|
|
Y |
|
|
| 3DES CBC |
|
|
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| 3DES CTR |
|
|
|
|
|
|
Y |
|
Y |
Y |
|
|
| DES CBC |
|
Y |
|
|
|
|
|
|
|
Y |
|
|
| DES DOCSIS BPI |
|
Y |
|
|
|
|
|
|
Y |
Y |
|
|
| SNOW3G UEA2 |
|
|
|
|
|
|
|
|
|
Y |
Y |
|
| KASUMI F8 |
|
|
|
|
|
Y |
|
|
|
Y |
|
|
| ZUC EEA3 |
|
|
|
|
|
|
|
|
|
Y |
|
Y |
1.3. Supported Authentication Algorithms
Table 1.5 Authentication algorithms in crypto drivers
| Authentication algorithm |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
d
p
a
a
_
s
e
c |
k
a
s
u
m
i |
m
r
v
l |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
| NULL |
|
|
|
|
|
|
|
Y |
|
Y |
|
|
| MD5 |
|
|
|
|
|
|
Y |
|
Y |
|
|
|
| MD5 HMAC |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| SHA1 |
|
|
|
|
|
|
Y |
|
Y |
|
|
|
| SHA1 HMAC |
|
Y |
Y |
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| SHA224 |
|
|
|
|
|
|
|
|
Y |
|
|
|
| SHA224 HMAC |
|
Y |
|
Y |
Y |
|
|
|
Y |
Y |
|
|
| SHA256 |
|
|
|
|
|
|
Y |
|
Y |
|
|
|
| SHA256 HMAC |
|
Y |
Y |
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| SHA384 |
|
|
|
|
|
|
Y |
|
Y |
|
|
|
| SHA384 HMAC |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| SHA512 |
|
|
|
|
|
|
Y |
|
Y |
|
|
|
| SHA512 HMAC |
|
Y |
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES XCBC MAC |
|
Y |
|
|
|
|
|
|
|
Y |
|
|
| AES GMAC |
Y |
|
|
|
|
|
Y |
|
Y |
Y |
|
|
| SNOW3G UIA2 |
|
|
|
|
|
|
|
|
|
Y |
Y |
|
| KASUMI F9 |
|
|
|
|
|
Y |
|
|
|
Y |
|
|
| ZUC EIA3 |
|
|
|
|
|
|
|
|
|
Y |
|
Y |
1.4. Supported AEAD Algorithms
Table 1.6 AEAD algorithms in crypto drivers
| AEAD algorithm |
a
e
s
n
i
_
g
c
m |
a
e
s
n
i
_
m
b |
a
r
m
v
8 |
d
p
a
a
2
_
s
e
c |
d
p
a
a
_
s
e
c |
k
a
s
u
m
i |
m
r
v
l |
n
u
l
l |
o
p
e
n
s
s
l |
q
a
t |
s
n
o
w
3
g |
z
u
c |
| AES GCM (128) |
Y |
|
|
Y |
Y |
|
Y |
|
Y |
Y |
|
|
| AES GCM (192) |
Y |
|
|
Y |
Y |
|
|
|
Y |
Y |
|
|
| AES GCM (256) |
Y |
|
|
Y |
Y |
|
|
|
Y |
Y |
|
|
| AES CCM (128) |
|
|
|
|
|
|
|
|
Y |
Y |
|
|
| AES CCM (192) |
|
|
|
|
|
|
|
|
Y |
Y |
|
|
| AES CCM (256) |
|
|
|
|
|
|
|
|
Y |
Y |
|
|