From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40062.outbound.protection.outlook.com [40.107.4.62]) by dpdk.org (Postfix) with ESMTP id C12FB4C8C for ; Tue, 13 Nov 2018 12:28:23 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QKMJhXJ7tE4LE4Q+0yfzhZS0W2E4w/sJnUZPXwDrozA=; b=G2/jWzScEZY0I0lFyZrkaitPLdx5rgpy8cD3c+/7R06eMuO7UEtpag24z1DxuiOBhCI2qxeFuI/HqagdkSFm2tritDx9+IbTY8cB0eFJ3p9g3Pa0kiG8QuN2Z2KMGt+nB0EuG2dJCWwk3/Zuq7KY8W3Rv33+xjh/aJD387VNEOQ= Received: from VI1PR04MB4893.eurprd04.prod.outlook.com (20.177.49.154) by VI1PR04MB5567.eurprd04.prod.outlook.com (20.178.123.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.26; Tue, 13 Nov 2018 11:28:22 +0000 Received: from VI1PR04MB4893.eurprd04.prod.outlook.com ([fe80::70c8:7997:4cf:743f]) by VI1PR04MB4893.eurprd04.prod.outlook.com ([fe80::70c8:7997:4cf:743f%2]) with mapi id 15.20.1294.045; Tue, 13 Nov 2018 11:28:22 +0000 From: Akhil Goyal To: "dev@dpdk.org" CC: "thomas@monjalon.net" , "konstantin.ananyev@intel.com" , "jerin.jacob@caviumnetworks.com" , "anoob.joseph@caviumnetworks.com" , "radu.nicolau@intel.com" , "declan.doherty@intel.com" , Hemant Agrawal , Akhil Goyal Thread-Topic: [PATCH] security: remove experimental tag Thread-Index: AQHUe0P7pW07ouSgyEm8Cur4KLVhCA== Date: Tue, 13 Nov 2018 11:28:21 +0000 Message-ID: <20181113112255.20050-1-akhil.goyal@nxp.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: PN1PR01CA0112.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c00::28) To VI1PR04MB4893.eurprd04.prod.outlook.com (2603:10a6:803:56::26) authentication-results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [14.143.30.134] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; VI1PR04MB5567; 6:nHRNiWULtWdWjJHJ0ndq6r1qSiNrghtUYTd06bRgjvauuRuxjIA9r3FwvlCmn+kR1kO06S8vDPRbtf+XsG4Drlo8vEQxYNcPVSFBm9EkXtLkmP1n4McEfCuYilC2t0L96ynmze4rWqZL+OrEUn/XSdIsii9lNTItYx8O9SUSs7l4pq2j2/IJLvpKcMLk2ZGdz9PSoBpN/zWnVwxg8bVT8EK83lZfpl9gO83MdMNUWmANLGP/VdyM5C5R41ejByywpQGSQKZx4Yxbc1m4D3LbZkWl942IYGUJZ4AJNzqTVzCNC/6P9IAbiob1ubbI91FCfj1b7ndf9D2cl8Ajpk0r4YvhQXiPCKfBVpWP74U3ZDL39pW7oFgxcuZ4dzBXbD0ycrSmZw8w4jdiX5EkWgI/GlmX0MJJMg4qbSDu4LaItRF8Io9q0KDT46SdyB/unRnNT9bGX5/em2WgwLrk+ojD1Q==; 5:OQPq5d/wIqnsatFaO+vRs8x/BCFeV4qQL4Pb5+mFgjr/EHhjhHZf9XDzwD5q3EweRm1/iO59JnmOrTZUA+Z3L1C/dg+l2GmnSLRQdbUUdw4Vxwmz/ypDGCpfCyo8cUssSrI0zurbzg3bj4Q93uB3Ge6l0H8vYqHm7LhFINebbeA=; 7:wsqvrOH2e1kzvnHkkCNhzH2ThhRvsft5QD5tWSGZ+LpR+t7GwvskubBzqLvYYPpDRujQ1b+tfM9TqtqtgdOPs1srKeZRMwJgs73S89ykWeHaUZjKWvK3m3doMzRC+hLdy8yAfoJagWxkNtxvAgoBPg== x-ms-office365-filtering-correlation-id: 9a0be2de-ba85-4fc2-2ef9-08d6495b1e28 x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390060)(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:VI1PR04MB5567; x-ms-traffictypediagnostic: VI1PR04MB5567: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(192374486261705)(185117386973197)(228905959029699); x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3002001)(10201501046)(3231382)(944501410)(52105112)(93006095)(93001095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123558120)(20161123562045)(201708071742011)(7699051)(76991095); SRVR:VI1PR04MB5567; BCL:0; PCL:0; RULEID:; SRVR:VI1PR04MB5567; x-forefront-prvs: 085551F5A8 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(136003)(376002)(39860400002)(346002)(396003)(189003)(199004)(4326008)(15650500001)(1730700003)(36756003)(44832011)(2501003)(6916009)(25786009)(86362001)(68736007)(97736004)(8676002)(8936002)(7736002)(305945005)(5024004)(256004)(14444005)(6486002)(81156014)(478600001)(81166006)(5660300001)(55236004)(106356001)(6116002)(71200400001)(52116002)(3846002)(71190400001)(2900100001)(2906002)(78486014)(1076002)(54906003)(316002)(53936002)(105586002)(102836004)(99286004)(386003)(6506007)(486006)(66066001)(6512007)(2616005)(476003)(14454004)(2351001)(5640700003)(6436002)(26005)(1857600001)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR04MB5567; H:VI1PR04MB4893.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: w+dsnUSKgsb9m81Yw1Ph+ySAhwaHmlFljVQ6Qqc9OwwB+2coPCX1YihEVwL9IBRGVrFRaxqhvOBpeBtqB+O8W4XidAhb9FZjenOA8XP8uHw+Iujh0ceH9KIVdFIw982TFTzKlzjzf8HV5cJCKSb6gW+Mctf73a5oVpOk0Y/0O9o5I4LR+brTvOCShNzTiD+ZT/kJrUVeJJF7XMb90EBJKRE7ji9biMFTWnFwCAVIP3t0djmSnbQlHlbc7To3Gib9oxmzeLJSpuFiZxW8gL6vqq5EMcbDqeT4NMPkxghKH1oF0vBhg2Xn70QXMOpnHhYuAdhV6I3mOgCK9EZvFhZq1Vyvt6xREplfV1t1+VDTPHs= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9a0be2de-ba85-4fc2-2ef9-08d6495b1e28 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Nov 2018 11:28:21.9737 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5567 Subject: [dpdk-dev] [PATCH] security: remove experimental tag X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Nov 2018 11:28:24 -0000 rte_security has been experimental since DPDK 17.11 release. Now the library has matured and expermental tag is removed in this patch. Signed-off-by: Akhil Goyal --- MAINTAINERS | 2 +- lib/librte_security/Makefile | 1 - lib/librte_security/meson.build | 1 - lib/librte_security/rte_security.c | 18 +++++++++--------- lib/librte_security/rte_security.h | 27 +++++++++++++-----------= --- lib/librte_security/rte_security_driver.h | 1 - lib/librte_security/rte_security_version.map | 2 +- 7 files changed, 24 insertions(+), 28 deletions(-) diff --git a/MAINTAINERS b/MAINTAINERS index 19353ac..bdd6747 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -347,7 +347,7 @@ F: lib/librte_cryptodev/ F: test/test/test_cryptodev* F: examples/l2fwd-crypto/ =20 -Security API - EXPERIMENTAL +Security API M: Akhil Goyal M: Declan Doherty T: git://dpdk.org/next/dpdk-next-crypto diff --git a/lib/librte_security/Makefile b/lib/librte_security/Makefile index 8daebea..bd92343 100644 --- a/lib/librte_security/Makefile +++ b/lib/librte_security/Makefile @@ -10,7 +10,6 @@ LIB =3D librte_security.a LIBABIVER :=3D 1 =20 # build flags -CFLAGS +=3D -DALLOW_EXPERIMENTAL_API CFLAGS +=3D -O3 CFLAGS +=3D $(WERROR_FLAGS) LDLIBS +=3D -lrte_eal -lrte_mempool diff --git a/lib/librte_security/meson.build b/lib/librte_security/meson.bu= ild index 4c85894..532953f 100644 --- a/lib/librte_security/meson.build +++ b/lib/librte_security/meson.build @@ -1,7 +1,6 @@ # SPDX-License-Identifier: BSD-3-Clause # Copyright(c) 2017 Intel Corporation =20 -allow_experimental_apis =3D true sources =3D files('rte_security.c') headers =3D files('rte_security.h', 'rte_security_driver.h') deps +=3D ['mempool', 'cryptodev'] diff --git a/lib/librte_security/rte_security.c b/lib/librte_security/rte_s= ecurity.c index c6355de..bc81ce1 100644 --- a/lib/librte_security/rte_security.c +++ b/lib/librte_security/rte_security.c @@ -10,7 +10,7 @@ #include "rte_security_driver.h" =20 struct rte_security_session * -__rte_experimental rte_security_session_create(struct rte_security_ctx *in= stance, +rte_security_session_create(struct rte_security_ctx *instance, struct rte_security_session_conf *conf, struct rte_mempool *mp) { @@ -33,7 +33,7 @@ __rte_experimental rte_security_session_create(struct rte= _security_ctx *instance return sess; } =20 -int __rte_experimental +int rte_security_session_update(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_session_conf *conf) @@ -42,14 +42,14 @@ rte_security_session_update(struct rte_security_ctx *in= stance, return instance->ops->session_update(instance->device, sess, conf); } =20 -unsigned int __rte_experimental +unsigned int rte_security_session_get_size(struct rte_security_ctx *instance) { RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_get_size, 0); return instance->ops->session_get_size(instance->device); } =20 -int __rte_experimental +int rte_security_session_stats_get(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_stats *stats) @@ -58,7 +58,7 @@ rte_security_session_stats_get(struct rte_security_ctx *i= nstance, return instance->ops->session_stats_get(instance->device, sess, stats); } =20 -int __rte_experimental +int rte_security_session_destroy(struct rte_security_ctx *instance, struct rte_security_session *sess) { @@ -76,7 +76,7 @@ rte_security_session_destroy(struct rte_security_ctx *ins= tance, return ret; } =20 -int __rte_experimental +int rte_security_set_pkt_metadata(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_mbuf *m, void *params) @@ -86,7 +86,7 @@ rte_security_set_pkt_metadata(struct rte_security_ctx *in= stance, sess, m, params); } =20 -void * __rte_experimental +void * rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md) { void *userdata =3D NULL; @@ -98,14 +98,14 @@ rte_security_get_userdata(struct rte_security_ctx *inst= ance, uint64_t md) return userdata; } =20 -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capabilities_get(struct rte_security_ctx *instance) { RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->capabilities_get, NULL); return instance->ops->capabilities_get(instance->device); } =20 -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capability_get(struct rte_security_ctx *instance, struct rte_security_capability_idx *idx) { diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_s= ecurity.h index 1431b4d..e07b132 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h @@ -8,7 +8,6 @@ =20 /** * @file rte_security.h - * @b EXPERIMENTAL: this API may change without prior notice * * RTE Security Common Definitions * @@ -330,7 +329,7 @@ struct rte_security_session { * - On success, pointer to session * - On failure, NULL */ -struct rte_security_session * __rte_experimental +struct rte_security_session * rte_security_session_create(struct rte_security_ctx *instance, struct rte_security_session_conf *conf, struct rte_mempool *mp); @@ -345,7 +344,7 @@ rte_security_session_create(struct rte_security_ctx *in= stance, * - On success returns 0 * - On failure return errno */ -int __rte_experimental +int rte_security_session_update(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_session_conf *conf); @@ -359,7 +358,7 @@ rte_security_session_update(struct rte_security_ctx *in= stance, * - Size of the private data, if successful * - 0 if device is invalid or does not support the operation. */ -unsigned int __rte_experimental +unsigned int rte_security_session_get_size(struct rte_security_ctx *instance); =20 /** @@ -374,7 +373,7 @@ rte_security_session_get_size(struct rte_security_ctx *= instance); * - -EINVAL if session is NULL. * - -EBUSY if not all device private data has been freed. */ -int __rte_experimental +int rte_security_session_destroy(struct rte_security_ctx *instance, struct rte_security_session *sess); =20 @@ -391,7 +390,7 @@ rte_security_session_destroy(struct rte_security_ctx *i= nstance, * - On success, zero. * - On failure, a negative value. */ -int __rte_experimental +int rte_security_set_pkt_metadata(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_mbuf *mb, void *params); @@ -413,7 +412,7 @@ rte_security_set_pkt_metadata(struct rte_security_ctx *= instance, * - On success, userdata * - On failure, NULL */ -void * __rte_experimental +void * rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md); =20 /** @@ -422,7 +421,7 @@ rte_security_get_userdata(struct rte_security_ctx *inst= ance, uint64_t md); * @param sym_op crypto operation * @param sess security session */ -static inline int __rte_experimental +static inline int __rte_security_attach_session(struct rte_crypto_sym_op *sym_op, struct rte_security_session *sess) { @@ -431,13 +430,13 @@ __rte_security_attach_session(struct rte_crypto_sym_o= p *sym_op, return 0; } =20 -static inline void * __rte_experimental +static inline void * get_sec_session_private_data(const struct rte_security_session *sess) { return sess->sess_private_data; } =20 -static inline void __rte_experimental +static inline void set_sec_session_private_data(struct rte_security_session *sess, void *private_data) { @@ -453,7 +452,7 @@ set_sec_session_private_data(struct rte_security_sessio= n *sess, * @param op crypto operation * @param sess security session */ -static inline int __rte_experimental +static inline int rte_security_attach_session(struct rte_crypto_op *op, struct rte_security_session *sess) { @@ -500,7 +499,7 @@ struct rte_security_stats { * - On success return 0 * - On failure errno */ -int __rte_experimental +int rte_security_session_stats_get(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_stats *stats); @@ -608,7 +607,7 @@ struct rte_security_capability_idx { * - Returns array of security capabilities. * - Return NULL if no capabilities available. */ -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capabilities_get(struct rte_security_ctx *instance); =20 /** @@ -622,7 +621,7 @@ rte_security_capabilities_get(struct rte_security_ctx *= instance); * index criteria. * - Return NULL if the capability not matched on security instance. */ -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capability_get(struct rte_security_ctx *instance, struct rte_security_capability_idx *idx); =20 diff --git a/lib/librte_security/rte_security_driver.h b/lib/librte_securit= y/rte_security_driver.h index 42f42ff..1b561f8 100644 --- a/lib/librte_security/rte_security_driver.h +++ b/lib/librte_security/rte_security_driver.h @@ -8,7 +8,6 @@ =20 /** * @file rte_security_driver.h - * @b EXPERIMENTAL: this API may change without prior notice * * RTE Security Common Definitions * diff --git a/lib/librte_security/rte_security_version.map b/lib/librte_secu= rity/rte_security_version.map index 5a1c8ae..a77ca4b 100644 --- a/lib/librte_security/rte_security_version.map +++ b/lib/librte_security/rte_security_version.map @@ -1,4 +1,4 @@ -EXPERIMENTAL { +DPDK_18.11 { global: =20 rte_security_attach_session; --=20 2.7.4