From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B9403A0547; Sat, 31 Jul 2021 20:13:53 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id BD881410DA; Sat, 31 Jul 2021 20:13:51 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by mails.dpdk.org (Postfix) with ESMTP id 1F4C240DDB for ; Sat, 31 Jul 2021 20:13:51 +0200 (CEST) Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16VIDlTP025477; Sat, 31 Jul 2021 11:13:47 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=pfpt0220; bh=A0l+a0X7vBf3pDsiaaIp3iNj0+ym2e05Wl05huwZeIQ=; b=Co49ifOxxKA8Zms3oC+psQnPavobtcdc56qFBmG4LeiSyD2qH1WOXXjtQdXmvTbk3mMc 22g3QTBvPETR78EZS7Q2CgEfv+xFUmYJX3KMkwLqyBJS+P2E6bJNIBhli7qbpQ5BM055 MA2w3iWRJ8XQoUUl/tJ6lKKh7xKxRRQM8o6eBiUy0UUpRHZNeUyk6CZRaYOS3BrfWk2I Ie6VjxEpYfTc8VrprIDGuKZFH5jwJazDu9//oIWQCPEdTp47CqaE/zrb0QtcOw8scdTN xi3DZ/lRfK9FymjjWMu1bo/+z/AdAJh8lYSS9sprGpPLPdy3IkRvqk13YYsxlFELHMmn 5w== Received: from dc5-exch02.marvell.com ([199.233.59.182]) by mx0b-0016f401.pphosted.com with ESMTP id 3a561rrmre-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sat, 31 Jul 2021 11:13:47 -0700 Received: from DC5-EXCH01.marvell.com (10.69.176.38) by DC5-EXCH02.marvell.com (10.69.176.39) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Sat, 31 Jul 2021 11:13:45 -0700 Received: from maili.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.18 via Frontend Transport; Sat, 31 Jul 2021 11:13:44 -0700 Received: from localhost.localdomain (unknown [10.28.36.185]) by maili.marvell.com (Postfix) with ESMTP id F00333F7070; Sat, 31 Jul 2021 11:13:40 -0700 (PDT) From: Akhil Goyal To: CC: , , , , , , , , , , , , , Akhil Goyal Date: Sat, 31 Jul 2021 23:43:25 +0530 Message-ID: <20210731181327.660296-3-gakhil@marvell.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210731181327.660296-1-gakhil@marvell.com> References: <20210731181327.660296-1-gakhil@marvell.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Proofpoint-ORIG-GUID: zXQAaudfyazpbTtb31Tv85mwbKeqGWLk X-Proofpoint-GUID: zXQAaudfyazpbTtb31Tv85mwbKeqGWLk X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-07-31_05:2021-07-30, 2021-07-31 signatures=0 Subject: [dpdk-dev] [PATCH 2/4] cryptodev: promote asym APIs to stable X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Asymmetric crypto APIs have been stable from quite some time, hence moving them from experimental to stable in DPDK 21.11 Signed-off-by: Akhil Goyal --- lib/cryptodev/rte_cryptodev.h | 10 ---------- lib/cryptodev/version.map | 24 +++++++++++++----------- 2 files changed, 13 insertions(+), 21 deletions(-) diff --git a/lib/cryptodev/rte_cryptodev.h b/lib/cryptodev/rte_cryptodev.h index 11f4e6fdbf..425f459143 100644 --- a/lib/cryptodev/rte_cryptodev.h +++ b/lib/cryptodev/rte_cryptodev.h @@ -247,7 +247,6 @@ rte_cryptodev_sym_capability_get(uint8_t dev_id, * - Return description of the asymmetric crypto capability if exist. * - Return NULL if the capability not exist. */ -__rte_experimental const struct rte_cryptodev_asymmetric_xform_capability * rte_cryptodev_asym_capability_get(uint8_t dev_id, const struct rte_cryptodev_asym_capability_idx *idx); @@ -317,7 +316,6 @@ rte_cryptodev_sym_capability_check_aead( * - Return 1 if the op type is supported * - Return 0 if unsupported */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_optype( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -333,7 +331,6 @@ rte_cryptodev_asym_xform_capability_check_optype( * - Return 0 if the parameters are in range of the capability. * - Return -1 if the parameters are out of range of the capability. */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_modlen( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -395,7 +392,6 @@ rte_cryptodev_get_aead_algo_enum(enum rte_crypto_aead_algorithm *algo_enum, * - Return -1 if string is not valid * - Return 0 if the string is valid */ -__rte_experimental int rte_cryptodev_asym_get_xform_enum(enum rte_crypto_asym_xform_type *xform_enum, const char *xform_string); @@ -1192,7 +1188,6 @@ rte_cryptodev_sym_session_create(struct rte_mempool *mempool); * - On success return pointer to asym-session * - On failure returns NULL */ -__rte_experimental struct rte_cryptodev_asym_session * rte_cryptodev_asym_session_create(struct rte_mempool *mempool); @@ -1223,7 +1218,6 @@ rte_cryptodev_sym_session_free(struct rte_cryptodev_sym_session *sess); * - -EINVAL if session is NULL. * - -EBUSY if not all device private data has been freed. */ -__rte_experimental int rte_cryptodev_asym_session_free(struct rte_cryptodev_asym_session *sess); @@ -1264,7 +1258,6 @@ rte_cryptodev_sym_session_init(uint8_t dev_id, * - -ENOTSUP if crypto device does not support the crypto transform. * - -ENOMEM if the private session could not be allocated. */ -__rte_experimental int rte_cryptodev_asym_session_init(uint8_t dev_id, struct rte_cryptodev_asym_session *sess, @@ -1299,7 +1292,6 @@ rte_cryptodev_sym_session_clear(uint8_t dev_id, * - 0 if successful. * - -EINVAL if device is invalid or session is NULL. */ -__rte_experimental int rte_cryptodev_asym_session_clear(uint8_t dev_id, struct rte_cryptodev_asym_session *sess); @@ -1336,7 +1328,6 @@ rte_cryptodev_sym_get_existing_header_session_size( * @return * Size of the asymmetric header session. */ -__rte_experimental unsigned int rte_cryptodev_asym_get_header_session_size(void); @@ -1364,7 +1355,6 @@ rte_cryptodev_sym_get_private_session_size(uint8_t dev_id); * - Size of the asymmetric private data, if successful * - 0 if device is invalid or does not have private session */ -__rte_experimental unsigned int rte_cryptodev_asym_get_private_session_size(uint8_t dev_id); diff --git a/lib/cryptodev/version.map b/lib/cryptodev/version.map index 9f04737aed..707a2e32d3 100644 --- a/lib/cryptodev/version.map +++ b/lib/cryptodev/version.map @@ -1,4 +1,4 @@ -DPDK_21 { +DPDK_22 { global: rte_crypto_aead_algorithm_strings; @@ -9,6 +9,18 @@ DPDK_21 { rte_crypto_cipher_operation_strings; rte_crypto_op_pool_create; rte_cryptodev_allocate_driver; + + rte_cryptodev_asym_capability_get; + rte_cryptodev_asym_get_header_session_size; + rte_cryptodev_asym_get_private_session_size; + rte_cryptodev_asym_get_xform_enum; + rte_cryptodev_asym_session_clear; + rte_cryptodev_asym_session_create; + rte_cryptodev_asym_session_free; + rte_cryptodev_asym_session_init; + rte_cryptodev_asym_xform_capability_check_modlen; + rte_cryptodev_asym_xform_capability_check_optype; + rte_cryptodev_callback_register; rte_cryptodev_callback_unregister; rte_cryptodev_close; @@ -61,16 +73,6 @@ DPDK_21 { EXPERIMENTAL { global: - rte_cryptodev_asym_capability_get; - rte_cryptodev_asym_get_header_session_size; - rte_cryptodev_asym_get_private_session_size; - rte_cryptodev_asym_get_xform_enum; - rte_cryptodev_asym_session_clear; - rte_cryptodev_asym_session_create; - rte_cryptodev_asym_session_free; - rte_cryptodev_asym_session_init; - rte_cryptodev_asym_xform_capability_check_modlen; - rte_cryptodev_asym_xform_capability_check_optype; rte_cryptodev_sym_cpu_crypto_process; rte_cryptodev_sym_get_existing_header_session_size; rte_cryptodev_sym_session_get_user_data; -- 2.25.1