From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <Ravi1.Kumar@amd.com>
Received: from NAM02-BL2-obe.outbound.protection.outlook.com
 (mail-bl2nam02on0071.outbound.protection.outlook.com [104.47.38.71])
 by dpdk.org (Postfix) with ESMTP id BC5EA1B1AB
 for <dev@dpdk.org>; Thu, 30 Nov 2017 14:13:09 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=amdcloud.onmicrosoft.com; s=selector1-amd-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
 bh=AHBTkxnHczT5lefXUVLd/WBl9ZOaunExW1HO2cm98WA=;
 b=EMnzthr4Ed0UqlOdQ4fILs4iUZA5XA+POFjOuHepPUZyvdwNx49LMZWhTd3ZkoEU9V+g40HSWxCiLfwlhbW1m//KDpeVlkI/jKP6IgBiX9z/8w18cygv5+yIuLuTQZ7EUnyfyouOWgh4xk3pY4FB7BDPVPjOFVoAG6nV7GLk0EU=
Authentication-Results: spf=none (sender IP is )
 smtp.mailfrom=Ravi1.Kumar@amd.com; 
Received: from wallaby-smavila.amd.com (202.56.249.162) by
 BN6PR12MB1508.namprd12.prod.outlook.com (10.172.24.149) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id
 15.20.282.5; Thu, 30 Nov 2017 13:13:07 +0000
From: Ravi Kumar <Ravi1.kumar@amd.com>
To: dev@dpdk.org
Date: Thu, 30 Nov 2017 08:12:29 -0500
Message-Id: <1512047553-118101-7-git-send-email-Ravi1.kumar@amd.com>
X-Mailer: git-send-email 2.7.4
In-Reply-To: <1512047553-118101-1-git-send-email-Ravi1.kumar@amd.com>
References: <1512047553-118101-1-git-send-email-Ravi1.kumar@amd.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=y
Content-Transfer-Encoding: 8bit
X-Originating-IP: [202.56.249.162]
X-ClientProxiedBy: MA1PR0101CA0047.INDPRD01.PROD.OUTLOOK.COM (52.134.137.33)
 To BN6PR12MB1508.namprd12.prod.outlook.com (10.172.24.149)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 4e531e0d-8cec-4158-2a8e-08d537f41964
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(48565401081)(5600026)(4604075)(2017052603286);
 SRVR:BN6PR12MB1508; 
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508;
 3:9m/OgdaOXNLyZhj1ubMnJELCWhxPjjTy+BSX+hlL6xE2QcdQjl/fA9v6fk03aJ4NawnyS3O8aixpDDGpV2kAxsUif5TEkZ3LhNzFyYqsgowtFYBWBHOHcdJyxmS18XXIQKhuNmPMK7ZpDsBloh2qH9IuyS+o/azBYIpd/XVLt6YO26qF1R/EfoeI4Q++Flj+tbOz5R54IZSZk+VC006eRCk5gHx91cGTb6eNAZMB7toCKbt5oOfXbfsUv6DyYUG+;
 25:rrFQJwjWzILSZn6ki6mCYWb+D77D6x5+mg1kIIeIjyXFmKloaPMIcsna2GYdvaNwMwrEnzy4txx47GkGqdDvc4138VUJjhEz/6jwQVn8zeBznF82qOF0u4AM/GHbHsXW612Kh/mE5bPadZvLmVoR0mdxqCfVViwhnSJgQ1M98qIhE3kUksJ2eTENboLPkbyKIL2nTvuQH7Nf95zkiUfkDFkJk6E0Odd1I3pHr4YQssqS6rqdEYG6LGOot755RwDij2HF1Zj+1k1g3Z4g/KYUtRJ5hQCmaRxnMERec02MqjrUmoL4Zj5j++chbwLLQ5tbU8wuUO7Qj9sOm3zJm2GZmQ==;
 31:yicCU/j9fUTDPz6n3VpXwJ9/tSyaV8aVAR9DSwb7+BZybM0OG8LLvkDyA1LyhthUiO9lpHivH2l0SJpNBZznl1O4WDNfGpPQtbs40MatETaL0IFv8+JUFnmhpL8VcLyQi9b1rlkZxQ3PNa5JqzVb/hxiUUP5h9Uk/5lGGYwElzPPq30p/xTtLKx4ZuXnLhoAuP+BtCkW8r/6Yx0FcAAH6T7SO1A8K64ue4JSCXh6gFY=
X-MS-TrafficTypeDiagnostic: BN6PR12MB1508:
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508;
 20:vZnGs2jqzPrxw3RovATwTlZivPIp29Du9dyD1C6WBojuCa2q8UFGdgnyKzpWha+E+AlYQyr7THBmBxWpEm2wUuN5JwlS6dqgLv/vGAaYShDFqFfu0+G8vx3NZPvxai5DmC/Fej7dsWt09n33RCA33810w85c/LlZ1XBHQDVVz/MsGCOjRv1H8GwEhoGr404y4+sijAg8rEg9WJXFO3CDZG19jAyoNpgyBSTh2blY25xKIk8Rh8HHAcCSNdLbMZKvkPaVjbk/LsizPLMXyuliR8Rayzp/N6RljnxkHt075vc1TtfQJs7FmdyR3ZAr6+frRsStzDy9GFwuTW//7pefYM8crE05lsOAoJhysIvvmj+wnmQT5ucdLl6nl3W8PjjMt4BDz87V5+IT7kqSeYk5MgVhMnJYOhituubkWZvKV3p2Q8kGIIXajn2QzV+d+CKWSsSha90qpvFL7NfRGwDFzukxcRS0gmOZhzHBptdvUfHWOq9FaqXW0MJfGvjOg3kz;
 4:pgeI6Ur4YsvblIEMT8z5UdufcP+DQJHijJPX8yWIwHXOgrmGB2ad0HNMg4sc4yQIhbH6skxY6OvxouC0SmAFZWWgo11Guhl5oDtXFdDFstczW39ReApPh21gOM1h2Fh7L9wo9dqQXiWMIntMj5Pzy9wUZfXvDGNKImdbVzvIrrtHzhbaCFXinkYo//L36wWeUM/irtDnT9dyt/G3/L2TRrHmRUWB+Z/CEix6IhvwOnL3kgn/1q52flI5n7JDry7SENjPp3zoqsYw8nExZl3WJDyEkr7rpdLFoLNn4+YRUbGhkRULcbo8eYPgdX3H4XwX
X-Microsoft-Antispam-PRVS: <BN6PR12MB150857246D56156EE8B31D3FAE380@BN6PR12MB1508.namprd12.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(767451399110);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0;
 RULEID:(6040450)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(3231022)(10201501046)(6055026)(6041248)(20161123558100)(20161123555025)(20161123562025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(6072148)(201708071742011);
 SRVR:BN6PR12MB1508; BCL:0; PCL:0; RULEID:(100000803101)(100110400095);
 SRVR:BN6PR12MB1508; 
X-Forefront-PRVS: 05079D8470
X-Forefront-Antispam-Report: SFV:NSPM;
 SFS:(10009020)(6009001)(346002)(376002)(366004)(39860400002)(189002)(199003)(36756003)(72206003)(6486002)(16526018)(5660300001)(101416001)(50226002)(97736004)(8936002)(50986010)(76176010)(8676002)(81156014)(105586002)(81166006)(53936002)(53416004)(6666003)(478600001)(106356001)(7736002)(6916009)(2906002)(50466002)(2950100002)(52116002)(2361001)(305945005)(2351001)(86362001)(68736007)(7696005)(47776003)(25786009)(316002)(3846002)(2870700001)(6116002)(189998001)(66066001)(217873001);
 DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1508; H:wallaby-smavila.amd.com; FPR:;
 SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
Received-SPF: None (protection.outlook.com: amd.com does not designate
 permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN6PR12MB1508;
 23:37wZUyy/VqGQCpyJGCIz4hY/IVVFcA2MO/e3IPIHS?=
 =?us-ascii?Q?oYSsDuwr7b8c9NSeSFl1wJGAHGTa+j7luvHa2AC/Xrc5KaV+TI+tbhqQ8iy0?=
 =?us-ascii?Q?ySptkuNDeMnCpOXllNLDRvVRlkvKUepzLB58aOl03i2w85LJ7Q4OujKiIuJ5?=
 =?us-ascii?Q?eex1p1gcQ/C+paufZdnUpbJIsA/jSGnh+BOe0SzRDFZbmvTVp/oX/NWbD/i7?=
 =?us-ascii?Q?mlZ1xaY/XpqU5744lRtj1I34CDokzHhHfQP4Qlx+jc9wLjE6ra0nSBx8uB5y?=
 =?us-ascii?Q?X0dVmD34dG5Scz2itlIA6AvXaE+23i7SmTM83z5AL0AAbE8gimscomXcCCwQ?=
 =?us-ascii?Q?qeQmigo792J4Bs49wonivR6O5MWg57xK8aPFckTg1ktBYRMzHDlx1IpQmXj/?=
 =?us-ascii?Q?ceNzsaBZV4XFAiJr6pZVYWjy6HWDfH3LMnXNt04kq+fAhzBTq9AuWoy7fk7l?=
 =?us-ascii?Q?0f7cwpCBe0HSgrDuvVqgr0eryjPN1JP9okkki7LYyJLTIKLRPjB5c1CNeepJ?=
 =?us-ascii?Q?peeBaMw69mCe6AJkoV7WkXdH417iXAz9GV0A3DtmZyPG/ag19eWEXtExZIXE?=
 =?us-ascii?Q?CKF2GROlbakRIaxQE6bdx4hjzCkTc3yPQH2NIHhTUp9f2jDTTKtOwXCNchET?=
 =?us-ascii?Q?hsk0xYf7EL5D9iipSAeH8vrJJxHFvaJVn76I48dASQ+EtQuCxyAAhxEno+48?=
 =?us-ascii?Q?h0X71FXdwnLSIOAiNkBAkPqD8wTDkho/9BGit1mjlaAEXzccJT+WSdRYTQtc?=
 =?us-ascii?Q?7fV/+hoaElyEUJ2mRf/5UYDiJm6k04yPdeqfHnkbO94Dn8zjDKpIm9d6JqPx?=
 =?us-ascii?Q?ajbkc/P6hntna+mZ2MFnIx8YCb7hHgENYLvvUtR3L87IcEX+gmQeIDHdJTcJ?=
 =?us-ascii?Q?wCvDleQ1Yu/awf6sboCzBe2bVQLPqGAnJ5Dy1OYZKnzFuKtGSkqEKXn7burf?=
 =?us-ascii?Q?3d3DTQyqC689eiVXXbO7NgwvRhsmv6oQhsko+bz+maHxOpqOTjGRfYtg0FrV?=
 =?us-ascii?Q?MwMwHx6/ENuTWv9DJ68eKRFScpxbxVkJ/sTQIXEs9k+fi6DpjlJT92w8rS6e?=
 =?us-ascii?Q?q+rpSQMXrHiG9nvSB43WnvM/Ge7t5q0IWDUBkxZ+GgeSqUFsSjFSRcye1d2F?=
 =?us-ascii?Q?3y0E6SQEU4=3D?=
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508;
 6:pxeu4H840KEdhFhbGOCmEQU5SSVFpm17EUMA1+ApjmU8e2209COMHsuGzuMl+SVJwAmZ9V1grQw54lGmjgigp3ywKpaEQNvj9BjhSiqivA2eVaqjZUadVZ+1uNP/8vf7D++tbyn8UKXhH7y7zZWgEkr+Z3V4V7RgmO0/3ZWns0ZfyHDCsaaQmeL1eU8+e+VWiRvchRZAOW4x4dcVz4AulqqE5l5ROZMBjMyO9m8bnXlVJE4QKrEEtYxvkwjgdg+V2gEJG3THj6oFbzomdU1FLFIlIDnBLagf0m/OG7eqp9Gik7MKsedOSLd7OtONQDUFuEMuEM+DKnqJvxxEVUlNH0/1WFCy6w1yTj1zjfgOd4A=;
 5:aIORbbxNp3vHhW0qwumfLuhpfaxxBB23aGGXb1oxVUT0UMyVUzdIqcSS3+TRvnAsKucP5RYvK0+gdAgFf70SBruo/da6jo586Opf2UErMGzs1WCRxGLHJPNjlUAdj0+W71oIwaPv4Wq+NcUo1pXdyfZEwHAxb5QL7UkfZCfEXDg=;
 24:pK9kJtiqP1Mz5dcE9OhMYgxZuXQwHm99FSEjwKOa/OytKoxeinGg1gSorAH91HoLfsE2OyiG6YRrH6Dhtt9RDOlBJz4ZvQztUfXooYzj+xY=;
 7:fhfPKEIDFgMwZsqEKsUpRLTdGytljk4W/8Ci8JDkY0MwPnWjo/igsvlJ140TRU9HMXl6FlmUgiOLu2uYB92ztJI7ty2rJVKRHdwgexs08t7XqIKdSRdc2hC8KSCPlwH5ZWdbEQnx3Gh4459P5OAfLbeYeYNSGQf9Dh1owgnSDighsZ33JLTWUcFnPOpGS7qvdAVgIikBxAYyvUmzECrnP8rra1LqsjmeO2/a/Q4VcRaNx9t8Prg2951R2KWpgPb6
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1508;
 20:qzc53w/4XsGh6Eghf/2MMbpCRZF7fyb+Jn3CeralstaFkjOKUxht/wruARmoooYZzdTuAwA7bffYpGOtL55ojY3Nr2YhmcKkfvyw7kAAZM/kDD9jux0B1JPzTiTt4UjCRHyePrWfeV8XwVhiRcamXidWaWZIFRIHfYa0UQtssETLHHMN50nYj+uHC9dTr/l9yfvXPs258NwrwTHBdK6hOQnq24UHJOkurcQJOKAg71ucqYXnK3UiqL7qOEVpAKox
X-OriginatorOrg: amd.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Nov 2017 13:13:07.1273 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4e531e0d-8cec-4158-2a8e-08d537f41964
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1508
Subject: [dpdk-dev] [PATCH 07/11] doc: add document for AMD CCP crypto PMD
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <http://dpdk.org/ml/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://dpdk.org/ml/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <http://dpdk.org/ml/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Nov 2017 13:13:10 -0000

Signed-off-by: Ravi Kumar <Ravi1.kumar@amd.com>
---
 doc/guides/cryptodevs/ccp.rst          | 124 +++++++++++++++++++++++++++++++++
 doc/guides/cryptodevs/features/ccp.ini |  57 +++++++++++++++
 doc/guides/cryptodevs/index.rst        |   1 +
 3 files changed, 182 insertions(+)
 create mode 100644 doc/guides/cryptodevs/ccp.rst
 create mode 100644 doc/guides/cryptodevs/features/ccp.ini

diff --git a/doc/guides/cryptodevs/ccp.rst b/doc/guides/cryptodevs/ccp.rst
new file mode 100644
index 0000000..b39af1d
--- /dev/null
+++ b/doc/guides/cryptodevs/ccp.rst
@@ -0,0 +1,124 @@
+.. Copyright(c) 2017 Advanced Micro Devices, Inc.
+   All rights reserved.
+
+   Redistribution and use in source and binary forms, with or without
+   modification, are permitted provided that the following conditions
+   are met:
+
+   * Redistributions of source code must retain the above copyright
+   notice, this list of conditions and the following disclaimer.
+   * Redistributions in binary form must reproduce the above copyright
+   notice, this list of conditions and the following disclaimer in the
+   documentation and/or other materials provided with the distribution.
+   * Neither the name of the copyright holder nor the names of its
+   contributors may be used to endorse or promote products derived from
+   this software without specific prior written permission.
+
+   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+   HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+AMD CCP Poll Mode Driver
+========================
+
+This code provides the initial implementation of the ccp poll mode driver.
+The CCP poll mode driver library (librte_pmd_ccp) implements support for
+AMD’s cryptographic co-processor (CCP). The CCP PMD is a virtual crypto
+poll mode driver which schedules crypto operations to one or more available
+CCP hardware engines on the platform. The CCP PMD provides poll mode crypto
+driver support for the following hardware accelerator devices::
+
+	AMD Cryptographic Co-processor (0x1456)
+	AMD Cryptographic Co-processor (0x1468)
+
+Features
+--------
+
+CCP PMD has support for:
+
+Supported cipher algorithms:
+* ``RTE_CRYPTO_CIPHER_AES_CBC``
+* ``RTE_CRYPTO_CIPHER_AES_ECB``
+* ``RTE_CRYPTO_CIPHER_AES_CTR``
+* ``RTE_CRYPTO_CIPHER_3DES_CBC``
+
+Supported authentication algorithms:
+* ``RTE_CRYPTO_AUTH_SHA1``
+* ``RTE_CRYPTO_AUTH_SHA1_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA224``
+* ``RTE_CRYPTO_AUTH_SHA224_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA256``
+* ``RTE_CRYPTO_AUTH_SHA256_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA384``
+* ``RTE_CRYPTO_AUTH_SHA384_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA512``
+* ``RTE_CRYPTO_AUTH_SHA512_HMAC``
+* ``RTE_CRYPTO_AUTH_MD5_HMAC``
+* ``RTE_CRYPTO_AUTH_AES_CMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_224``
+* ``RTE_CRYPTO_AUTH_SHA3_224_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_256``
+* ``RTE_CRYPTO_AUTH_SHA3_256_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_384``
+* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_512``
+* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC``
+
+Supported AEAD algorithms:
+* ``RTE_CRYPTO_AEAD_AES_GCM``
+
+Installation
+------------
+
+To compile CCP PMD, it has to be enabled in the config/common_base file.
+* ``CONFIG_RTE_LIBRTE_PMD_CCP=y``
+
+The CCP PMD also supports computing authentication over CPU with cipher offloaded
+to CCP. To enable this feature, enable following in the configuration.
+* ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y``
+
+This code was verified on Ubuntu 16.04.
+
+Initialization
+--------------
+
+Bind the CCP devices to DPDK UIO driver module before running the CCP PMD stack.
+e.g. for the 0x1456 device::
+
+	cd to the top-level DPDK directory
+	modprobe uio
+	insmod ./build/kmod/igb_uio.ko
+	echo "1022 1456" > /sys/bus/pci/drivers/igb_uio/new_id
+
+Another way to bind the CCP devices to DPDK UIO driver is by using the ``dpdk-devbind.py`` script.
+The following command assumes ``BFD`` of ``0000:09:00.2``::
+
+	cd to the top-level DPDK directory
+	./usertools/dpdk-devbind.py -b igb_uio 0000:09:00.2
+
+To verify real traffic l2fwd-crypto example can be used with following command:
+
+.. code-block:: console
+
+	sudo ./build/l2fwd-crypto -l 1 -n 4 --vdev "crypto_ccp" -- -p 0x1
+	--chain CIPHER_HASH --cipher_op ENCRYPT --cipher_algo AES_CBC
+	--cipher_key 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f
+	--iv 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:ff
+	--auth_op GENERATE --auth_algo SHA1_HMAC
+	--auth_key 11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11
+	:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11
+	:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11
+
+Limitations
+-----------
+
+* Chained mbufs are not supported
+* MD5_HMAC is supported only if ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` is enabled in configuration
diff --git a/doc/guides/cryptodevs/features/ccp.ini b/doc/guides/cryptodevs/features/ccp.ini
new file mode 100644
index 0000000..6184a67
--- /dev/null
+++ b/doc/guides/cryptodevs/features/ccp.ini
@@ -0,0 +1,57 @@
+;
+; Supported features of the 'ccp' crypto driver.
+;
+; Refer to default.ini for the full list of available PMD features.
+;
+[Features]
+Symmetric crypto       = Y
+Sym operation chaining = Y
+HW Accelerated         = Y
+
+;
+; Supported crypto algorithms of the 'ccp' crypto driver.
+;
+[Cipher]
+AES CBC (128)  = Y
+AES CBC (192)  = Y
+AES CBC (256)  = Y
+AES ECB (128)  = Y
+AES ECB (192)  = Y
+AES ECB (256)  = Y
+AES CTR (128)  = Y
+AES CTR (192)  = Y
+AES CTR (256)  = Y
+3DES CBC       = Y
+
+;
+; Supported authentication algorithms of the 'ccp' crypto driver.
+;
+[Auth]
+MD5 HMAC       = Y
+SHA1           = Y
+SHA1 HMAC      = Y
+SHA224	       = Y
+SHA224 HMAC    = Y
+SHA256         = Y
+SHA256 HMAC    = Y
+SHA384         = Y
+SHA384 HMAC    = Y
+SHA512         = Y
+SHA512 HMAC    = Y
+AES CMAC       = Y
+SHA3_224       = Y
+SHA3_224 HMAC  = Y
+SHA3_256       = Y
+SHA3_256 HMAC  = Y
+SHA3_384       = Y
+SHA3_384 HMAC  = Y
+SHA3_512       = Y
+SHA3_512 HMAC  = Y
+
+;
+; Supported AEAD algorithms of the 'ccp' crypto driver.
+;
+[AEAD]
+AES GCM (128) = Y
+AES GCM (192) = Y
+AES GCM (256) = Y
diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst
index 6d4e15b..3202b48 100644
--- a/doc/guides/cryptodevs/index.rst
+++ b/doc/guides/cryptodevs/index.rst
@@ -39,6 +39,7 @@ Crypto Device Drivers
     aesni_mb
     aesni_gcm
     armv8
+    ccp
     dpaa2_sec
     dpaa_sec
     kasumi
-- 
2.7.4