1. Introduction
2. Interface Overview
3. Parameters
4. Designing with the IP Core
5. Block Description
6. Cryptographic IP Data Profiles
7. Configuration Registers
8. Design Example
9. Symmetric Cryptographic Intel FPGA Hard IP User Guide Archives
10. Document Revision History for the Symmetric Cryptographic Intel FPGA Hard IP User Guide
4.1. Installing and Licensing Intel® FPGA IP Cores
4.2. Specifying the IP Core Parameters and Options
4.3. Generated File Structure
4.4. Symmetric Cryptographic IP Core Flow
4.5. Dynamically Disabling SM4 Capability
4.6. Error Handling
4.7. Error Reporting
4.8. Resetting the IP Core
4.9. Channel Definition and Allocation
4.10. Byte Ordering
4.11. AXI-ST Single Packet Mode
4.12. AXI-ST Multiple Packet Mode
5.5.2. GCM Depadding
This block implements the idle byte depadding to the AAD, Bypass, Text, and MAC fields which are 16 bytes aligned when "Enable Gen. GCM egress depadding" is selected in the IP GUI. You are required to send in the real AAD and Bypass field lengths, regardless of whether the GCM padding on ingress is enabled or disabled. When GCM padding on ingress is disabled, the AAD and Bypass fields are 16 byte-aligned, and the IP routes the real AAD and Bypass lengths to Crypto egress logic for depadding.
The egress decryption MAC is dropped if "Drop the MAC on applicable profile decryption" on the IP GUI is also checked.
When "Enable Gen. GCM egress depadding" is not selected in the IP GUI, the depadding logic within the IP is optimized away in order to save device resources. In this case, the egress data still passes through the ICV and MAC packing blocks.
Figure 16. GCM Depadding
Note: The MAC(16B) in the dash-line box indicates that the MAC is removed from the decryption packets when "Drop the MAC on applicable profile decryption" is enabled on the IP GUI.