From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <Ravi1.Kumar@amd.com>
Received: from NAM03-DM3-obe.outbound.protection.outlook.com
 (mail-dm3nam03on0046.outbound.protection.outlook.com [104.47.41.46])
 by dpdk.org (Postfix) with ESMTP id E72A91B198
 for <dev@dpdk.org>; Mon, 19 Mar 2018 13:24:54 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=amdcloud.onmicrosoft.com; s=selector1-amd-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
 bh=Cr+AK6uZvEKqYkc+A1pePFkirHKpNc6Fybx2g02kU7I=;
 b=DNnId0GoIWXhD/+QVONvYaxwjw+NWf/JxugGVxQgrG6vv7aA+FXotty1Hr+gZ8OTfUA0EHRgqkPL5iteIQ0agiBIfBD2r395wXAyxQootYEixDpeKskDUYAd8fA0R3YPn64y+7LA4I8X70yLILXJFkOuxj5ajVLi8o9xEzUChI4=
Authentication-Results: spf=none (sender IP is )
 smtp.mailfrom=Ravi1.Kumar@amd.com; 
Received: from wallaby-smavila.amd.com (202.56.249.162) by
 BN6PR12MB1505.namprd12.prod.outlook.com (10.172.24.146) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.588.14; Mon, 19 Mar 2018 12:24:51 +0000
From: Ravi Kumar <Ravi1.kumar@amd.com>
To: dev@dpdk.org
Cc: pablo.de.lara.guarch@intel.com,
	hemant.agrawal@nxp.com
Date: Mon, 19 Mar 2018 08:23:53 -0400
Message-Id: <1521462233-13590-19-git-send-email-Ravi1.kumar@amd.com>
X-Mailer: git-send-email 2.7.4
In-Reply-To: <1521462233-13590-1-git-send-email-Ravi1.kumar@amd.com>
References: <1520584520-130522-1-git-send-email-Ravi1.kumar@amd.com>
 <1521462233-13590-1-git-send-email-Ravi1.kumar@amd.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Originating-IP: [202.56.249.162]
X-ClientProxiedBy: MAXPR0101CA0025.INDPRD01.PROD.OUTLOOK.COM (10.174.62.139)
 To BN6PR12MB1505.namprd12.prod.outlook.com (10.172.24.146)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 6105cb1f-c48f-4185-8d66-08d58d946af4
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020);
 SRVR:BN6PR12MB1505; 
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505;
 3:gYbCpvv0oYmGYshrH8HZ5Lc6HXNvxs958MEg+nasd1/vsDOycbN1FUjKHsxaPX4MxN8zlyp34dz3ypMgDcWZFWdmFiYFZX2lKmUHITq10Yeq5pCWxzf2SLMHkBLGt+erjBn7zjMIiv3AJxriEaVGAlY6Q48LBIPsASWeDgDIH2dEoL1RYzfrMuvmtb1FNcBPpK9ZdD9HrHli5DKOEe7NBBrrWlqEZ3s0namwswmpmwa5Y9LM/Pdt5vpLQ3DK41pZ;
 25:y7c7mIEgiJeQGiPlDHkTEDleoG7ReW0MHFhlPhslJY1rspqxoOiDx5AYX/0gkMwK8ekX2sr7jwDtoeKO19otq+GFlxfzc3YAbEn6PacS8GDAwZYHryk2Ur3QWuErKZ79c6Rk7hGbWCDSa/5UZOZRlc9yJdhneJNSF9B+l5hbcfd10Oh8nYeG0ITi9nfHKXHtzB2pXcf/A50Dh8kXC8Gnb5IuXKkkir4H3nwKLnD5lyCOFSvrQPmS4cEDwiuCGunNA517mdAoNU8hZ7dAtyOR4nHfpuPJHdw5BI20DZlXGVeIOl1ynKgj0W/zQiBeJj1AdNvOQdk5j/vb4Skqz8bS9g==;
 31:nEeW40kgHjIHS9Iu8dm1Cy4OueeHsh3pYpciP1DeorGOz2BTvmeImCZrpFdib2j5rFoT1pXEmuEJ709HkXQhDqDx4E3MlfHYa99BUAKy+mWk4ypa3Zx4rUaUy3aDuVdMVer0s2D/mT6rI813TUK98MyA6ZWVVBO8yy3LWLRApIly5pGNIEzbGBYlKI6ykg7IgTnKY7BKWeSs7l08T53bwBFVu5uOdPLd4MIYFgEvPe8=
X-MS-TrafficTypeDiagnostic: BN6PR12MB1505:
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505;
 20: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;
 4:FoGma3yOH6650LacKx5dFsovIW6uQJDBBq6Ioifmyy3dawPYdAUQaKi3TQ+W6UdN0imSnHIQRyrPDgv5Poc8WYV/q9OdJ8xrzIB9Alts00y7X9qE8/nXudIGp8q8/llNmoaYLwWq+MJTk/MwP4pt5C3MSibyHtWtXAa6+9Obmb1eALOyWajY9tzhYi+qrrmTeqLJQ+hq0Jv3px+IBDsb55V0Ie1cKxL0JfbLwA493mb9ZqgqZlhhXZEiE2V5xyJg9x+czsNQMegqV1nKNoS81OLUEcQMwWbBueFOxgD8i+tqqtphkAr+MEpBZkweZHyR
X-Microsoft-Antispam-PRVS: <BN6PR12MB1505A569EF008B068DAB9935AED40@BN6PR12MB1505.namprd12.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(767451399110);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0;
 RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231221)(944501300)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041310)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(6072148)(201708071742011);
 SRVR:BN6PR12MB1505; BCL:0; PCL:0; RULEID:; SRVR:BN6PR12MB1505; 
X-Forefront-PRVS: 06167FAD59
X-Forefront-Antispam-Report: SFV:NSPM;
 SFS:(10009020)(396003)(39380400002)(39860400002)(346002)(376002)(366004)(199004)(189003)(97736004)(105586002)(2361001)(2351001)(72206003)(4326008)(50226002)(76176011)(59450400001)(8676002)(26005)(316002)(8936002)(53936002)(106356001)(186003)(7696005)(16526019)(52116002)(386003)(81166006)(81156014)(8656006)(23676004)(25786009)(66066001)(68736007)(86362001)(47776003)(6486002)(5660300001)(7736002)(53416004)(6116002)(305945005)(3846002)(2870700001)(478600001)(2950100002)(36756003)(6916009)(2906002)(50466002)(217873001);
 DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR12MB1505; H:wallaby-smavila.amd.com; FPR:;
 SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
Received-SPF: None (protection.outlook.com: amd.com does not designate
 permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjZQUjEyTUIxNTA1OzIzOkFnc0czY1dXL3dPeFM4ZHlxYU1DVGY4bit2?=
 =?utf-8?B?RTBzdEhmZEo0eFd5R01FQURaMlBjNURIakpKSUltYk9uR01kMnk2QW1WeFpw?=
 =?utf-8?B?N1k0SzM3R2VrZDh5dlRBV2hTNXdEOFJlcU1QdUNvMTl4SndoSGhTbHZRWThG?=
 =?utf-8?B?SXh5MFJIZlBycElFYklUNXQzYVdyNzE3aUVWT0RlQU84bEswaEQ0RGdXdk9s?=
 =?utf-8?B?L09IQU04WXhtekZDeUh4Mmc0SC84Q01MaTJUZ3VTSVpZOEVhYlBWdWxKbHZk?=
 =?utf-8?B?ZExKTXpJb2w0d3puekk0SEpSc1pCZXBDTVI4VUUyNFdBUHlwTWJxYy85MGs5?=
 =?utf-8?B?aWVLVkN4RDluZURxNjBsN29Ic1VXeGVNK1MrT09BNmpGK1A0NlR2R0FocEFy?=
 =?utf-8?B?ZU51YXJXZ1ZxMW9GWTR2SGRUZW9KOUpIWnZLS3Y0cmxOOVlKR1ZRSGovSHNn?=
 =?utf-8?B?aVcwcXJMRjg3MldZK1JwR3R6NFlTNzVoNC9hY2xKekJYei9leDNZa0RXVXRW?=
 =?utf-8?B?VTNmY3V0WW9DOFpaR0xkdDZvZUxNdWZYM1BCbnQwK3RndFF3R0FjNlM2UUY2?=
 =?utf-8?B?NmthY0hTc2pVbGN2dnlxTjMvMzFxVldIQjVrVWFyb3kwOVlGSE0xSmdhZnVp?=
 =?utf-8?B?RkNDWkt3U2VGQmFrOVdhN1R2bi9ydGlWaHJIQWZMdUFzUXB6NU1OazFuZjlh?=
 =?utf-8?B?dkhac1hMRlA1amNlWitVRkYrdnNyaEU2Y3VCdHVNUXYxcDg4eTVZWGw5RDJM?=
 =?utf-8?B?Y3c1dWIyWGI5MGlReUtUeVArYnNsUU9kbEpZTThGTzhDMlpveUlRTmVhWDFS?=
 =?utf-8?B?N25KeXZMZG90dHVpd20yeW82QzRUcXN1ZFhvb1owanBxTllnRmdTdkppQm9r?=
 =?utf-8?B?TzlGTzVuTjdLQk9tSFdncEl0WlFLZ29VdkphZkdYRjNDYzRjVmFBSHREWUVX?=
 =?utf-8?B?bWx1NXkwckJyOW8wODRQZWc4aWZIejdKKzlBOTJrWm9jRjN1c1VjQUdGVGlm?=
 =?utf-8?B?eEZGSUpSTWp1MWR0OEdpellsREZsMGZUMmc5b2tKR0wvQ2FuYVEzcE56WVFz?=
 =?utf-8?B?KzJjenJrS1k3R01SZVhRZzZCUlpUV2ZZOEI4Y1o3NHZ6OXYrTVQ4MlNPOXpE?=
 =?utf-8?B?SHFTOTFQZnlLaTh3dWNmQUdiM2NvNTE0TnBXVEptYm15UWgrS1YrUHd1SUpG?=
 =?utf-8?B?WWRlYzRnOERCekR5UlEvVkRtSFQxL1BnWnU2cmUrVTNudCtjN3dOcU9nSURj?=
 =?utf-8?B?WGRwWEpvSU15OGVVTmlWNTBRUVZmcVVQOHo5UlNsQklKN0cxZnZFVUdzb0hN?=
 =?utf-8?B?eFlyT3hWYlN1YlZlUWdQeUFqY1VNZHMya0tMMmR3Y3JYeFAxK2F1ZFlaT2ZC?=
 =?utf-8?B?MGNhdE5WajMxTmFlemc3c2VsTkVIWkVpcVBQcWUyRUc1TU16VE9pYUFDOVJK?=
 =?utf-8?B?Sy9FcWpGbkRVVFNxTnB2ZHRTVjFmaFl1YXZrSVJJeXFudlkzYzdtRE5pMW1P?=
 =?utf-8?B?YWZ5d01EZVRPWC9MK0tpRkFJR1BMWnNUR0MzUEJMWGVQbE8xK00yNmVSdUJF?=
 =?utf-8?Q?NrIOrkM4rfqcdiyMXQxycVhh6HQGBf6lIZXzTrn3rbos=3D?=
X-Microsoft-Antispam-Message-Info: xcWaQ3Awc/+SXSmb6nc9LUxM/SLsOuu2JXUdzK75o56LmlPVRpmj8M+HzGI3eQR5kFUyWKzQYZAgLrr1onrht8bO7kfjDOLwpZaInxquoC1Uy8ZgfDidEDRJ5MBqqcEX8tVR9wfy4npBaysT/tk4Pt26tGVMEG0tLkGSzLtWmSdubh64d996ngkqQRh10OlR
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505;
 6:J1faVZ0HE0VhipSThBWEgfesD2xWigS1WKWiw2yKkaF2YHrnEU7INCb4yi4bqWPkp5fIzH1fshisDKWSRMkFflS/FKdIUriwmY/TcGGgEfmfwtiQOVvqqTCu6Ob1YIIdxTqh4Y+G0odN5h3TfQAlQr7onfpjD512ndYyjrnPUBVn1lCAQEME/fNEBfUYAdTlK7ZSWAtSGJSDwz1WebkeU0MTOol8Kuqyx6SPy/gYp7e/kn3jXfBaz8p5nsuJidwlvYgkBiRT2RFC3pxTw8EYNPTNCRbGc+OTsRimVx5SckWYXVrb4/7Mo5rYKyvJi82A8I1NrYF3xV2vnWFwaAsspEPAtO1fyz06jTQJEGgBh6o=;
 5:y9rKyt3uHkZKh9+zK86G44CE167BuaN4PSwHC1k2aDIMWG23gzHTfNn9V/6DNWzr+HjvWdgmRVn/pXa04bk8GiUjvj9dw0eMHk6FOMFP0LexCYGUlmCEcIu0TWAKlco2e5PVInHly6YUPuChspnir2qnO7meRMNgi+KdguX5pdo=;
 24:/oO8rd8QBserRIkiJAZiceR+0+AiOP2E9EbZo0Vl9jI2uw2q8EAeWIhFoeguVNKZO76UtaSX385uGdIdFqIXLV9LFXHUzDS1Nx/+4HWpL14=;
 7:9FZfvIzrLnMuCoI+dmAZJaLe2aC0fRIRmCHMjmFob96Uaki3jTGW53sMtOZdoGkTIBHtOvwBXR1jvmoLfkXXBzeLQMnxRhg2H1eviXLqubpNjz6eqnjUjaSPGdIeX+mZ3SczxFg7iDCAfBXxgZ2y+La8tbgHmNXPSHXzudNzCAbvcrJXrlhyRcN3CiAThblJUdcGWVNDctUReNi+mb1y9hFH9Gm63LNaAN9Ko8gH1QIQ68/9Fz4boxsr8XpWV06u
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BN6PR12MB1505;
 20:OqV6YfGeRlUGaEMjWtbm7nvGzE51vDhnFscZOmx8g+j+SQU+vzGyC2FY/LGApiQFNLkrfzPBLzjUCMmLv3/2y0tt1UlWm91gh+IziAq+C5mhilOIx0C4LIyPQ4dRPeY/JaTdyVYdaoDdD/GyQBwwnRdvFbL4UoheLg52rGEFMQnifaJl0SbJ76OuFRNgKxyZpxwPkjevgjpF3/JMGrq7kZ8EwyFJY5SS/FV3hIBb8+URZIj1xZ3diHxwq0Bp2Ea0
X-OriginatorOrg: amd.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Mar 2018 12:24:51.9040 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6105cb1f-c48f-4185-8d66-08d58d946af4
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1505
Subject: [dpdk-dev] [PATCH v5 19/19] doc: add document for AMD CCP crypto
	poll mode driver
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <https://dpdk.org/ml/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://dpdk.org/ml/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <https://dpdk.org/ml/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Mar 2018 12:24:55 -0000

Signed-off-by: Ravi Kumar <Ravi1.kumar@amd.com>
---
 doc/guides/cryptodevs/ccp.rst              | 102 +++++++++++++++++++++++++++++
 doc/guides/cryptodevs/features/ccp.ini     |  57 ++++++++++++++++
 doc/guides/cryptodevs/features/default.ini |  12 ++++
 doc/guides/cryptodevs/index.rst            |   1 +
 4 files changed, 172 insertions(+)
 create mode 100644 doc/guides/cryptodevs/ccp.rst
 create mode 100644 doc/guides/cryptodevs/features/ccp.ini

diff --git a/doc/guides/cryptodevs/ccp.rst b/doc/guides/cryptodevs/ccp.rst
new file mode 100644
index 0000000..1fcd462
--- /dev/null
+++ b/doc/guides/cryptodevs/ccp.rst
@@ -0,0 +1,102 @@
+.. SPDX-License-Identifier: BSD-3-Clause
+   Copyright(c) 2018 Advanced Micro Devices, Inc. All rights reserved.
+
+AMD CCP Poll Mode Driver
+========================
+
+This code provides the initial implementation of the ccp poll mode driver.
+The CCP poll mode driver library (librte_pmd_ccp) implements support for
+AMD’s cryptographic co-processor (CCP). The CCP PMD is a virtual crypto
+poll mode driver which schedules crypto operations to one or more available
+CCP hardware engines on the platform. The CCP PMD provides poll mode crypto
+driver support for the following hardware accelerator devices::
+
+	AMD Cryptographic Co-processor (0x1456)
+	AMD Cryptographic Co-processor (0x1468)
+
+Features
+--------
+
+CCP crypto PMD has support for:
+
+Cipher algorithms:
+
+* ``RTE_CRYPTO_CIPHER_AES_CBC``
+* ``RTE_CRYPTO_CIPHER_AES_ECB``
+* ``RTE_CRYPTO_CIPHER_AES_CTR``
+* ``RTE_CRYPTO_CIPHER_3DES_CBC``
+
+Hash algorithms:
+
+* ``RTE_CRYPTO_AUTH_SHA1``
+* ``RTE_CRYPTO_AUTH_SHA1_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA224``
+* ``RTE_CRYPTO_AUTH_SHA224_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA256``
+* ``RTE_CRYPTO_AUTH_SHA256_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA384``
+* ``RTE_CRYPTO_AUTH_SHA384_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA512``
+* ``RTE_CRYPTO_AUTH_SHA512_HMAC``
+* ``RTE_CRYPTO_AUTH_MD5_HMAC``
+* ``RTE_CRYPTO_AUTH_AES_CMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_224``
+* ``RTE_CRYPTO_AUTH_SHA3_224_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_256``
+* ``RTE_CRYPTO_AUTH_SHA3_256_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_384``
+* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC``
+* ``RTE_CRYPTO_AUTH_SHA3_512``
+* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC``
+
+AEAD algorithms:
+
+* ``RTE_CRYPTO_AEAD_AES_GCM``
+
+Installation
+------------
+
+To compile CCP PMD, it has to be enabled in the config/common_base file.
+* ``CONFIG_RTE_LIBRTE_PMD_CCP=y``
+
+The CCP PMD also supports computing authentication over CPU with cipher offloaded
+to CCP. To enable this feature, enable following in the configuration.
+* ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y``
+
+This code was verified on Ubuntu 16.04.
+
+Initialization
+--------------
+
+Bind the CCP devices to DPDK UIO driver module before running the CCP PMD stack.
+e.g. for the 0x1456 device::
+
+	cd to the top-level DPDK directory
+	modprobe uio
+	insmod ./build/kmod/igb_uio.ko
+	echo "1022 1456" > /sys/bus/pci/drivers/igb_uio/new_id
+
+Another way to bind the CCP devices to DPDK UIO driver is by using the ``dpdk-devbind.py`` script.
+The following command assumes ``BFD`` of ``0000:09:00.2``::
+
+	cd to the top-level DPDK directory
+	./usertools/dpdk-devbind.py -b igb_uio 0000:09:00.2
+
+To verify real traffic l2fwd-crypto example can be used with following command:
+
+.. code-block:: console
+
+	sudo ./build/l2fwd-crypto -l 1 -n 4 --vdev "crypto_ccp" -- -p 0x1
+	--chain CIPHER_HASH --cipher_op ENCRYPT --cipher_algo AES_CBC
+	--cipher_key 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f
+	--iv 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:ff
+	--auth_op GENERATE --auth_algo SHA1_HMAC
+	--auth_key 11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11
+	:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11
+	:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11:11
+
+Limitations
+-----------
+
+* Chained mbufs are not supported
+* MD5_HMAC is supported only if ``CONFIG_RTE_LIBRTE_PMD_CCP_CPU_AUTH=y`` is enabled in configuration
diff --git a/doc/guides/cryptodevs/features/ccp.ini b/doc/guides/cryptodevs/features/ccp.ini
new file mode 100644
index 0000000..add4bd8
--- /dev/null
+++ b/doc/guides/cryptodevs/features/ccp.ini
@@ -0,0 +1,57 @@
+;
+; Supported features of the 'ccp' crypto poll mode driver.
+;
+; Refer to default.ini for the full list of available PMD features.
+;
+[Features]
+Symmetric crypto       = Y
+Sym operation chaining = Y
+HW Accelerated         = Y
+
+;
+; Supported crypto algorithms of the 'ccp' crypto driver.
+;
+[Cipher]
+AES CBC (128)  = Y
+AES CBC (192)  = Y
+AES CBC (256)  = Y
+AES ECB (128)  = Y
+AES ECB (192)  = Y
+AES ECB (256)  = Y
+AES CTR (128)  = Y
+AES CTR (192)  = Y
+AES CTR (256)  = Y
+3DES CBC       = Y
+
+;
+; Supported authentication algorithms of the 'ccp' crypto driver.
+;
+[Auth]
+MD5 HMAC       = Y
+SHA1           = Y
+SHA1 HMAC      = Y
+SHA224	       = Y
+SHA224 HMAC    = Y
+SHA256         = Y
+SHA256 HMAC    = Y
+SHA384         = Y
+SHA384 HMAC    = Y
+SHA512         = Y
+SHA512 HMAC    = Y
+AES CMAC       = Y
+SHA3_224       = Y
+SHA3_224 HMAC  = Y
+SHA3_256       = Y
+SHA3_256 HMAC  = Y
+SHA3_384       = Y
+SHA3_384 HMAC  = Y
+SHA3_512       = Y
+SHA3_512 HMAC  = Y
+
+;
+; Supported AEAD algorithms of the 'ccp' crypto driver.
+;
+[AEAD]
+AES GCM (128) = Y
+AES GCM (192) = Y
+AES GCM (256) = Y
diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini
index 728ce3b..aa1ca31 100644
--- a/doc/guides/cryptodevs/features/default.ini
+++ b/doc/guides/cryptodevs/features/default.ini
@@ -28,6 +28,9 @@ NULL           =
 AES CBC (128)  =
 AES CBC (192)  =
 AES CBC (256)  =
+AES ECB (128)  =
+AES ECB (192)  =
+AES ECB (256)  =
 AES CTR (128)  =
 AES CTR (192)  =
 AES CTR (256)  =
@@ -62,6 +65,15 @@ AES GMAC     =
 SNOW3G UIA2  =
 KASUMI F9    =
 ZUC EIA3     =
+AES CMAC     =
+SHA3_224       =
+SHA3_224 HMAC  =
+SHA3_256       =
+SHA3_256 HMAC  =
+SHA3_384       =
+SHA3_384 HMAC  =
+SHA3_512       =
+SHA3_512 HMAC  =
 
 ;
 ; Supported AEAD algorithms of a default crypto driver.
diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst
index 558c926..8a921dd 100644
--- a/doc/guides/cryptodevs/index.rst
+++ b/doc/guides/cryptodevs/index.rst
@@ -13,6 +13,7 @@ Crypto Device Drivers
     aesni_mb
     aesni_gcm
     armv8
+    ccp
     dpaa2_sec
     dpaa_sec
     kasumi
-- 
2.7.4