From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 0BD91431BE; Fri, 20 Oct 2023 23:01:51 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 17E2F42E4F; Fri, 20 Oct 2023 22:58:46 +0200 (CEST) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mails.dpdk.org (Postfix) with ESMTP id C3EFE42E0D for ; Fri, 20 Oct 2023 22:58:36 +0200 (CEST) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1c9de3f66e5so9452115ad.3 for ; Fri, 20 Oct 2023 13:58:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20230601.gappssmtp.com; s=20230601; t=1697835516; x=1698440316; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Z3bLnsEP2tsULGJLS3HM8kDA7DXD0lIMRYA8cSkRNOc=; b=w5EGXcMqd3DQ60kaGOTxrd4Hf9kMroUOl5W4uRD7OzXk82eZ1uDalrCSseBSyI7xF6 cVWajzd2O666/KfDyjwHsjHhLPjb17XGifYqOog49zqGqvvzTpzdcyWdsvxIFh9AeIy+ DFiC616O1EJSL9Ce+A6TjlH120ffAbqEPUNhahaoAa55KTyczVqmEhwiHxJ6waFXYNkJ gDzC9IcGUpVhTS2Qo3O95YijN48gDPw5e3Jw6k9V3JxKXjb7CF+/IEL6HJ/Q1H9T13f2 UnAsgtwZAgZGaFcPdwYHwgD41eEKCL2fGzIClegdzgXyO+AR4ZleO73UOF3FYy9XSMLk y7DQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697835516; x=1698440316; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Z3bLnsEP2tsULGJLS3HM8kDA7DXD0lIMRYA8cSkRNOc=; b=XGuipk2Rniq2g1DikegxJRY8ci7yvlDx4hgG6o0DMBoh3lMSZiAiVpRR1nYOz7hHWX IKaHJvHUiWKMkTDxuETsSICuledPQH9WHReEl0AF4xHfV+8+yVZ4QI7hJfRTGdccbi8J Zvht+Fp1QyV+hzqTtc5erUVrzkVD1mGEY/UfoPnkvRhHRnJnJ2o/gIQrbcmO+c1k+fbK G2m3u/CK8TWSG7M+q5KpF3OQi2Nn/78AplZP6z1Nql83aH3Wg5K+ojfgqHy0+jXAlCEl +kMzRfFIhR72cOTtBdLmFrdikIn1QROSPAktvYNoCI2jT0Ro6CTZ0t2dEZu0jt4i7e4M WSpg== X-Gm-Message-State: AOJu0Yzwoxx9fxH6c2m8qMvWbdn8BOVoWzIKQumRO7kCaLezTptVIqZC +Oly41+yLC+dVjN2lHdaQ2O9gxfQvVo+n8rZUDVxXw== X-Google-Smtp-Source: AGHT+IGkeFlnovapFpqSr+3i94rvPDAiiCYI8ozETm80YJjJp5DnqGLxAB0oHAm0wzXIsDiTTqx+OA== X-Received: by 2002:a17:902:c792:b0:1ca:8541:e1fe with SMTP id w18-20020a170902c79200b001ca8541e1femr2819870pla.62.1697835515627; Fri, 20 Oct 2023 13:58:35 -0700 (PDT) Received: from hermes.local (204-195-126-68.wavecable.com. [204.195.126.68]) by smtp.gmail.com with ESMTPSA id u17-20020a170902e5d100b001c61512f2a6sm1930961plf.220.2023.10.20.13.58.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 20 Oct 2023 13:58:35 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger , Akhil Goyal , Fan Zhang Subject: [PATCH v5 26/26] cryptodev: mark older API's stable Date: Fri, 20 Oct 2023 13:57:59 -0700 Message-Id: <20231020205759.195126-27-stephen@networkplumber.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20231020205759.195126-1-stephen@networkplumber.org> References: <20230808173527.186042-1-stephen@networkplumber.org> <20231020205759.195126-1-stephen@networkplumber.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org All the cryptodev API's from 2022 backwards shoudl be stable at this point. Signed-off-by: Stephen Hemminger --- lib/cryptodev/rte_cryptodev.h | 31 -------------- lib/cryptodev/version.map | 77 +++++++++++++++-------------------- 2 files changed, 32 insertions(+), 76 deletions(-) diff --git a/lib/cryptodev/rte_cryptodev.h b/lib/cryptodev/rte_cryptodev.h index be0698ce9fc6..aa5b5529f44c 100644 --- a/lib/cryptodev/rte_cryptodev.h +++ b/lib/cryptodev/rte_cryptodev.h @@ -257,7 +257,6 @@ rte_cryptodev_sym_capability_get(uint8_t dev_id, * - Return description of the asymmetric crypto capability if exist. * - Return NULL if the capability not exist. */ -__rte_experimental const struct rte_cryptodev_asymmetric_xform_capability * rte_cryptodev_asym_capability_get(uint8_t dev_id, const struct rte_cryptodev_asym_capability_idx *idx); @@ -327,7 +326,6 @@ rte_cryptodev_sym_capability_check_aead( * - Return 1 if the op type is supported * - Return 0 if unsupported */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_optype( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -343,7 +341,6 @@ rte_cryptodev_asym_xform_capability_check_optype( * - Return 0 if the parameters are in range of the capability. * - Return -1 if the parameters are out of range of the capability. */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_modlen( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -359,7 +356,6 @@ rte_cryptodev_asym_xform_capability_check_modlen( * - Return true if the hash algorithm is supported. * - Return false if the hash algorithm is not supported. */ -__rte_experimental bool rte_cryptodev_asym_xform_capability_check_hash( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -421,7 +417,6 @@ rte_cryptodev_get_aead_algo_enum(enum rte_crypto_aead_algorithm *algo_enum, * - Return -1 if string is not valid * - Return 0 if the string is valid */ -__rte_experimental int rte_cryptodev_asym_get_xform_enum(enum rte_crypto_asym_xform_type *xform_enum, const char *xform_string); @@ -860,7 +855,6 @@ rte_cryptodev_queue_pair_setup(uint8_t dev_id, uint16_t queue_pair_id, * - 1: qp was configured * - -EINVAL: device was not configured */ -__rte_experimental int rte_cryptodev_get_qp_status(uint8_t dev_id, uint16_t queue_pair_id); @@ -1039,7 +1033,6 @@ rte_cryptodev_get_sec_ctx(uint8_t dev_id); * - On success returns the created session mempool pointer * - On failure returns NULL */ -__rte_experimental struct rte_mempool * rte_cryptodev_sym_session_pool_create(const char *name, uint32_t nb_elts, uint32_t elt_size, uint32_t cache_size, uint16_t priv_size, @@ -1066,7 +1059,6 @@ rte_cryptodev_sym_session_pool_create(const char *name, uint32_t nb_elts, * - On success return mempool * - On failure returns NULL */ -__rte_experimental struct rte_mempool * rte_cryptodev_asym_session_pool_create(const char *name, uint32_t nb_elts, uint32_t cache_size, uint16_t user_data_size, int socket_id); @@ -1108,7 +1100,6 @@ rte_cryptodev_sym_session_create(uint8_t dev_id, * - -ENOMEM on memory error for session allocation. * - -ENOTSUP if device doesn't support session configuration. */ -__rte_experimental int rte_cryptodev_asym_session_create(uint8_t dev_id, struct rte_crypto_asym_xform *xforms, struct rte_mempool *mp, @@ -1141,7 +1132,6 @@ rte_cryptodev_sym_session_free(uint8_t dev_id, * - 0 if successful. * - -EINVAL if device is invalid or session is NULL. */ -__rte_experimental int rte_cryptodev_asym_session_free(uint8_t dev_id, void *sess); @@ -1151,7 +1141,6 @@ rte_cryptodev_asym_session_free(uint8_t dev_id, void *sess); * @return * Size of the asymmetric header session. */ -__rte_experimental unsigned int rte_cryptodev_asym_get_header_session_size(void); @@ -1179,7 +1168,6 @@ rte_cryptodev_sym_get_private_session_size(uint8_t dev_id); * - Size of the asymmetric private data, if successful * - 0 if device is invalid or does not have private session */ -__rte_experimental unsigned int rte_cryptodev_asym_get_private_session_size(uint8_t dev_id); @@ -1226,7 +1214,6 @@ const char *rte_cryptodev_driver_name_get(uint8_t driver_id); * - On success, zero. * - On failure, a negative value. */ -__rte_experimental int rte_cryptodev_sym_session_set_user_data(void *sess, void *data, @@ -1263,7 +1250,6 @@ rte_cryptodev_sym_session_opaque_data_set(void *sess, uint64_t opaque) * - On success return pointer to user data. * - On failure returns NULL. */ -__rte_experimental void * rte_cryptodev_sym_session_get_user_data(void *sess); @@ -1280,7 +1266,6 @@ rte_cryptodev_sym_session_get_user_data(void *sess); * - -EINVAL if the session pointer is invalid. * - -ENOMEM if the available user data size is smaller than the size parameter. */ -__rte_experimental int rte_cryptodev_asym_session_set_user_data(void *sess, void *data, uint16_t size); @@ -1294,7 +1279,6 @@ rte_cryptodev_asym_session_set_user_data(void *sess, void *data, uint16_t size); * - On success return pointer to user data. * - On failure returns NULL. */ -__rte_experimental void * rte_cryptodev_asym_session_get_user_data(void *sess); @@ -1310,7 +1294,6 @@ rte_cryptodev_asym_session_get_user_data(void *sess); * @return * - Returns number of successfully processed packets. */ -__rte_experimental uint32_t rte_cryptodev_sym_cpu_crypto_process(uint8_t dev_id, void *sess, union rte_crypto_sym_ofs ofs, @@ -1325,7 +1308,6 @@ rte_cryptodev_sym_cpu_crypto_process(uint8_t dev_id, * - If the device supports raw data-path APIs, return the context size. * - If the device does not support the APIs, return -1. */ -__rte_experimental int rte_cryptodev_get_raw_dp_ctx_size(uint8_t dev_id); @@ -1344,7 +1326,6 @@ rte_cryptodev_get_raw_dp_ctx_size(uint8_t dev_id); * - On success, zero. * - On failure, a negative value. */ -__rte_experimental int rte_cryptodev_session_event_mdata_set(uint8_t dev_id, void *sess, enum rte_crypto_op_type op_type, @@ -1570,7 +1551,6 @@ struct rte_crypto_raw_dp_ctx { * - -ENOTSUP if crypto device does not support raw DP operations with the * provided session. */ -__rte_experimental int rte_cryptodev_configure_raw_dp_ctx(uint8_t dev_id, uint16_t qp_id, struct rte_crypto_raw_dp_ctx *ctx, @@ -1602,7 +1582,6 @@ rte_cryptodev_configure_raw_dp_ctx(uint8_t dev_id, uint16_t qp_id, * cached into the queue but not enqueued yet, depends on the * "enqueue_status" value. */ -__rte_experimental uint32_t rte_cryptodev_raw_enqueue_burst(struct rte_crypto_raw_dp_ctx *ctx, struct rte_crypto_sym_vec *vec, union rte_crypto_sym_ofs ofs, @@ -1652,7 +1631,6 @@ rte_cryptodev_raw_enqueue(struct rte_crypto_raw_dp_ctx *ctx, * - On success return 0. * - On failure return negative integer. */ -__rte_experimental int rte_cryptodev_raw_enqueue_done(struct rte_crypto_raw_dp_ctx *ctx, uint32_t n); @@ -1698,7 +1676,6 @@ rte_cryptodev_raw_enqueue_done(struct rte_crypto_raw_dp_ctx *ctx, * - The number of operations dequeued or completed but not freed from the * queue, depends on "dequeue_status" value. */ -__rte_experimental uint32_t rte_cryptodev_raw_dequeue_burst(struct rte_crypto_raw_dp_ctx *ctx, rte_cryptodev_raw_get_dequeue_count_t get_dequeue_count, @@ -1748,7 +1725,6 @@ rte_cryptodev_raw_dequeue(struct rte_crypto_raw_dp_ctx *ctx, * - On success return 0. * - On failure return negative integer. */ -__rte_experimental int rte_cryptodev_raw_dequeue_done(struct rte_crypto_raw_dp_ctx *ctx, uint32_t n); @@ -1788,8 +1764,6 @@ rte_cryptodev_raw_dequeue_done(struct rte_crypto_raw_dp_ctx *ctx, * - On success, a pointer value which can later be used to remove the * callback. */ - -__rte_experimental struct rte_cryptodev_cb * rte_cryptodev_add_enq_callback(uint8_t dev_id, uint16_t qp_id, @@ -1817,8 +1791,6 @@ rte_cryptodev_add_enq_callback(uint8_t dev_id, * - <0: The dev_id or the qp_id is out of range, or the callback * is NULL or not found for the crypto device queue pair. */ - -__rte_experimental int rte_cryptodev_remove_enq_callback(uint8_t dev_id, uint16_t qp_id, struct rte_cryptodev_cb *cb); @@ -1857,8 +1829,6 @@ int rte_cryptodev_remove_enq_callback(uint8_t dev_id, * - On success, a pointer value which can later be used to remove the * callback. */ - -__rte_experimental struct rte_cryptodev_cb * rte_cryptodev_add_deq_callback(uint8_t dev_id, uint16_t qp_id, @@ -1886,7 +1856,6 @@ rte_cryptodev_add_deq_callback(uint8_t dev_id, * - <0: The dev_id or the qp_id is out of range, or the callback * is NULL or not found for the crypto device queue pair. */ -__rte_experimental int rte_cryptodev_remove_deq_callback(uint8_t dev_id, uint16_t qp_id, struct rte_cryptodev_cb *cb); diff --git a/lib/cryptodev/version.map b/lib/cryptodev/version.map index 208919b81950..c39199be54f5 100644 --- a/lib/cryptodev/version.map +++ b/lib/cryptodev/version.map @@ -1,15 +1,34 @@ DPDK_24 { global: + __rte_cryptodev_trace_dequeue_burst; + __rte_cryptodev_trace_enqueue_burst; rte_crypto_aead_operation_strings; + rte_crypto_asym_ke_strings; + rte_crypto_asym_op_strings; rte_crypto_auth_operation_strings; rte_crypto_cipher_operation_strings; rte_crypto_fp_ops; rte_crypto_op_pool_create; + rte_cryptodev_add_deq_callback; + rte_cryptodev_add_enq_callback; + rte_cryptodev_asym_capability_get; + rte_cryptodev_asym_get_header_session_size; + rte_cryptodev_asym_get_private_session_size; + rte_cryptodev_asym_get_xform_enum; + rte_cryptodev_asym_session_create; + rte_cryptodev_asym_session_free; + rte_cryptodev_asym_session_get_user_data; + rte_cryptodev_asym_session_pool_create; + rte_cryptodev_asym_session_set_user_data; + rte_cryptodev_asym_xform_capability_check_hash; + rte_cryptodev_asym_xform_capability_check_modlen; + rte_cryptodev_asym_xform_capability_check_optype; rte_cryptodev_callback_register; rte_cryptodev_callback_unregister; rte_cryptodev_close; rte_cryptodev_configure; + rte_cryptodev_configure_raw_dp_ctx; rte_cryptodev_count; rte_cryptodev_device_count_by_driver; rte_cryptodev_devices_get; @@ -20,12 +39,21 @@ DPDK_24 { rte_cryptodev_get_cipher_algo_enum; rte_cryptodev_get_dev_id; rte_cryptodev_get_feature_name; + rte_cryptodev_get_qp_status; + rte_cryptodev_get_raw_dp_ctx_size; rte_cryptodev_get_sec_ctx; rte_cryptodev_info_get; rte_cryptodev_is_valid_dev; rte_cryptodev_name_get; rte_cryptodev_queue_pair_count; rte_cryptodev_queue_pair_setup; + rte_cryptodev_raw_dequeue_burst; + rte_cryptodev_raw_dequeue_done; + rte_cryptodev_raw_enqueue_burst; + rte_cryptodev_raw_enqueue_done; + rte_cryptodev_remove_deq_callback; + rte_cryptodev_remove_enq_callback; + rte_cryptodev_session_event_mdata_set; rte_cryptodev_socket_id; rte_cryptodev_start; rte_cryptodev_stats_get; @@ -35,9 +63,13 @@ DPDK_24 { rte_cryptodev_sym_capability_check_auth; rte_cryptodev_sym_capability_check_cipher; rte_cryptodev_sym_capability_get; + rte_cryptodev_sym_cpu_crypto_process; rte_cryptodev_sym_get_private_session_size; rte_cryptodev_sym_session_create; rte_cryptodev_sym_session_free; + rte_cryptodev_sym_session_get_user_data; + rte_cryptodev_sym_session_pool_create; + rte_cryptodev_sym_session_set_user_data; local: *; }; @@ -45,51 +77,6 @@ DPDK_24 { EXPERIMENTAL { global: - rte_cryptodev_asym_capability_get; - rte_cryptodev_asym_get_header_session_size; - rte_cryptodev_asym_get_private_session_size; - rte_cryptodev_asym_get_xform_enum; - rte_cryptodev_asym_session_create; - rte_cryptodev_asym_session_free; - rte_cryptodev_asym_xform_capability_check_hash; - rte_cryptodev_asym_xform_capability_check_modlen; - rte_cryptodev_asym_xform_capability_check_optype; - rte_cryptodev_sym_cpu_crypto_process; - rte_cryptodev_sym_session_get_user_data; - rte_cryptodev_sym_session_pool_create; - rte_cryptodev_sym_session_set_user_data; - rte_crypto_asym_op_strings; - - # added in 20.05 - __rte_cryptodev_trace_dequeue_burst; - __rte_cryptodev_trace_enqueue_burst; - - # added in 20.08 - rte_cryptodev_get_qp_status; - - # added in 20.11 - rte_cryptodev_configure_raw_dp_ctx; - rte_cryptodev_get_raw_dp_ctx_size; - rte_cryptodev_raw_dequeue_burst; - rte_cryptodev_raw_dequeue_done; - rte_cryptodev_raw_enqueue_burst; - rte_cryptodev_raw_enqueue_done; - - # added in 21.02 - rte_cryptodev_add_deq_callback; - rte_cryptodev_add_enq_callback; - rte_cryptodev_remove_deq_callback; - rte_cryptodev_remove_enq_callback; - - # added in 22.03 - rte_cryptodev_asym_session_get_user_data; - rte_cryptodev_asym_session_pool_create; - rte_cryptodev_asym_session_set_user_data; - - # added in 22.07 - rte_cryptodev_session_event_mdata_set; - rte_crypto_asym_ke_strings; - # added in 23.03 rte_cryptodev_asym_get_xform_string; rte_cryptodev_get_aead_algo_string; -- 2.39.2