The documentation for the AM335x Crytographic features at http://processors.wiki.ti.com/index.php/Cryptography_Users_Guide discusses how to include the driver and Open Container Format (OCF) in buildroot and how to use it via OpenSSL. We are trying to access the crypto accelerator from a non-SSL application.
Is there a way to directly invoke system calls via IOCTL() against /dev/crypto? The man page for /dev/crypto (http://processors.wiki.ti.com/index.php/Cryptography_Users_Guide) only generically lists the potential features available, e.g. CRYPTO_AES_CBC. What are the exact list of features available when used with omap4-aes and omap4-sham? Does it support all the encrpytions listed in the TRM (e2e.ti.com/.../571404 )
We are currently using AES_CCM and perhaps SHA256, and would like to understand how to take advantage of the accelerator. To refine my questions: we are trying to use aes-ecb on the AM335x’s crypto hardware. This driver is being registered in the TI’s kernel patch, but it is not accessible from the OCF (does it support ECB?). How can we access aes-ecb on the crypto hardware? given that it’s not accessible by OpenSSL via OCF?