From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 780EC43011; Wed, 9 Aug 2023 02:13:20 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 306E9432E6; Wed, 9 Aug 2023 02:11:03 +0200 (CEST) Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mails.dpdk.org (Postfix) with ESMTP id D67E5432CC for ; Wed, 9 Aug 2023 02:10:56 +0200 (CEST) Received: by mail-pl1-f179.google.com with SMTP id d9443c01a7336-1bbbbb77b38so39596135ad.3 for ; Tue, 08 Aug 2023 17:10:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20221208.gappssmtp.com; s=20221208; t=1691539856; x=1692144656; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=sAP6eb4OExYEj/59jvumCGPSBa3D08mVuuguabte7FM=; b=cFaqWEKZpevLz7Bs62SAjpgnT/mg/dxlTbgicl8ZP/szq5KimIX4MWG+Kmny2IuFYA GHt5zG5uM5kfFdkQSTUeokwAa00nXQ5/MHOIR7u5lXr0msic/K4hv4GlQl1mdGn6E4oA lfmiTV12QiWLSPL6VOY8kVE9ASXqb95f0VNp5sejq4FmBnyCoRQ5PZ3vMc/qXhZi4amM iwm3Qd1n/F+52dIvxLaFShLzXB359aLVioSpvPSlCT1i5bRT6BiviG1DJzX7aXoItNV2 8sxKd8iPPdGdsluX2gRD3dN6AXusfEjmwE3Bm9PGKtDfMC0pxyhmbY4E5c0cCRsRv/XR Ep1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691539856; x=1692144656; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=sAP6eb4OExYEj/59jvumCGPSBa3D08mVuuguabte7FM=; b=O6kP7IjtBTNaXKYeFZzoYs8yVGwj+KRkxSAGlbFReF1De08Xm9D5aKgeUrKmpom51+ 1VzmVhzKanwYKi9yleyimDtvL6WhhNvRG1eQR139pbqMPjmRjPVj87lPNO8CbRpeFR3P HQgCOs3ShbDfquPChVs/c3ZCy3LKD2/ddF6w9RMPSaHWSr8H2rU07UQYHl1Qxn0sS0Rq DtQntPjjW8Q8fb8Qu+0d/8zo1TMhP8lJdkLG0bQNvJkPlfRl+e+Z4/XXhRtqvhtCwdto SatZKcYGfJRotz0MnLhb734U+yDCKIZMoyTZrXRlfXceE+LaOE8VI9Sygcz1P6yPtDLh PmgQ== X-Gm-Message-State: AOJu0YxTUYp1kTx3fiGqY4SUDgD5EfOgUIs/HgGOUIpiAM2OhVPAU5i+ tWGfkweL66hupIqA0UAHfMnUXsZvYelARDKwKyv5vA== X-Google-Smtp-Source: AGHT+IEbAqFnCvnhU9sIfdTZwtqgOpzKtR7AG49+cnJeSCkNLEuw+NHl76sxXzeK8in7ELc9B+tVKA== X-Received: by 2002:a17:902:d717:b0:1b8:5a32:2345 with SMTP id w23-20020a170902d71700b001b85a322345mr1162881ply.22.1691539855734; Tue, 08 Aug 2023 17:10:55 -0700 (PDT) Received: from hermes.local (204-195-127-207.wavecable.com. [204.195.127.207]) by smtp.gmail.com with ESMTPSA id ix11-20020a170902f80b00b001bc676df6a9sm5745629plb.132.2023.08.08.17.10.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Aug 2023 17:10:55 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger , Akhil Goyal , Fan Zhang Subject: [PATCH v2 27/29] cryptodev: remove experimental from more API's Date: Tue, 8 Aug 2023 17:10:15 -0700 Message-Id: <20230809001017.293037-28-stephen@networkplumber.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230809001017.293037-1-stephen@networkplumber.org> References: <20230808173527.186042-1-stephen@networkplumber.org> <20230809001017.293037-1-stephen@networkplumber.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org All API's added before 23.03 should be non-experimental. Signed-off-by: Stephen Hemminger --- lib/cryptodev/rte_crypto_sym.h | 1 - lib/cryptodev/rte_cryptodev.h | 32 -------------- lib/cryptodev/version.map | 77 ++++++++++++++-------------------- 3 files changed, 32 insertions(+), 78 deletions(-) diff --git a/lib/cryptodev/rte_crypto_sym.h b/lib/cryptodev/rte_crypto_sym.h index 76c868c5038c..d60564c51541 100644 --- a/lib/cryptodev/rte_crypto_sym.h +++ b/lib/cryptodev/rte_crypto_sym.h @@ -972,7 +972,6 @@ __rte_crypto_sym_op_attach_sym_session(struct rte_crypto_sym_op *sym_op, void *s * - number of successfully filled entries in *vec* array. * - negative number of elements in *vec* array required. */ -__rte_experimental static inline int rte_crypto_mbuf_to_vec(const struct rte_mbuf *mb, uint32_t ofs, uint32_t len, struct rte_crypto_vec vec[], uint32_t num) diff --git a/lib/cryptodev/rte_cryptodev.h b/lib/cryptodev/rte_cryptodev.h index ba730373fbe1..50061663194b 100644 --- a/lib/cryptodev/rte_cryptodev.h +++ b/lib/cryptodev/rte_cryptodev.h @@ -250,7 +250,6 @@ rte_cryptodev_sym_capability_get(uint8_t dev_id, * - Return description of the asymmetric crypto capability if exist. * - Return NULL if the capability not exist. */ -__rte_experimental const struct rte_cryptodev_asymmetric_xform_capability * rte_cryptodev_asym_capability_get(uint8_t dev_id, const struct rte_cryptodev_asym_capability_idx *idx); @@ -320,7 +319,6 @@ rte_cryptodev_sym_capability_check_aead( * - Return 1 if the op type is supported * - Return 0 if unsupported */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_optype( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -336,7 +334,6 @@ rte_cryptodev_asym_xform_capability_check_optype( * - Return 0 if the parameters are in range of the capability. * - Return -1 if the parameters are out of range of the capability. */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_modlen( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -398,7 +395,6 @@ rte_cryptodev_get_aead_algo_enum(enum rte_crypto_aead_algorithm *algo_enum, * - Return -1 if string is not valid * - Return 0 if the string is valid */ -__rte_experimental int rte_cryptodev_asym_get_xform_enum(enum rte_crypto_asym_xform_type *xform_enum, const char *xform_string); @@ -835,7 +831,6 @@ rte_cryptodev_queue_pair_setup(uint8_t dev_id, uint16_t queue_pair_id, * - 1: qp was configured * - -EINVAL: device was not configured */ -__rte_experimental int rte_cryptodev_get_qp_status(uint8_t dev_id, uint16_t queue_pair_id); @@ -926,9 +921,6 @@ rte_cryptodev_callback_unregister(uint8_t dev_id, rte_cryptodev_cb_fn cb_fn, void *cb_arg); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice. - * * Query a cryptodev queue pair if there are pending RTE_CRYPTODEV_EVENT_ERROR * events. * @@ -1005,7 +997,6 @@ rte_cryptodev_get_sec_ctx(uint8_t dev_id); * - On success returns the created session mempool pointer * - On failure returns NULL */ -__rte_experimental struct rte_mempool * rte_cryptodev_sym_session_pool_create(const char *name, uint32_t nb_elts, uint32_t elt_size, uint32_t cache_size, uint16_t priv_size, @@ -1032,7 +1023,6 @@ rte_cryptodev_sym_session_pool_create(const char *name, uint32_t nb_elts, * - On success return mempool * - On failure returns NULL */ -__rte_experimental struct rte_mempool * rte_cryptodev_asym_session_pool_create(const char *name, uint32_t nb_elts, uint32_t cache_size, uint16_t user_data_size, int socket_id); @@ -1074,7 +1064,6 @@ rte_cryptodev_sym_session_create(uint8_t dev_id, * - -ENOMEM on memory error for session allocation. * - -ENOTSUP if device doesn't support session configuration. */ -__rte_experimental int rte_cryptodev_asym_session_create(uint8_t dev_id, struct rte_crypto_asym_xform *xforms, struct rte_mempool *mp, @@ -1107,7 +1096,6 @@ rte_cryptodev_sym_session_free(uint8_t dev_id, * - 0 if successful. * - -EINVAL if device is invalid or session is NULL. */ -__rte_experimental int rte_cryptodev_asym_session_free(uint8_t dev_id, void *sess); @@ -1117,7 +1105,6 @@ rte_cryptodev_asym_session_free(uint8_t dev_id, void *sess); * @return * Size of the asymmetric header session. */ -__rte_experimental unsigned int rte_cryptodev_asym_get_header_session_size(void); @@ -1145,7 +1132,6 @@ rte_cryptodev_sym_get_private_session_size(uint8_t dev_id); * - Size of the asymmetric private data, if successful * - 0 if device is invalid or does not have private session */ -__rte_experimental unsigned int rte_cryptodev_asym_get_private_session_size(uint8_t dev_id); @@ -1192,7 +1178,6 @@ const char *rte_cryptodev_driver_name_get(uint8_t driver_id); * - On success, zero. * - On failure, a negative value. */ -__rte_experimental int rte_cryptodev_sym_session_set_user_data(void *sess, void *data, @@ -1229,7 +1214,6 @@ rte_cryptodev_sym_session_opaque_data_set(void *sess, uint64_t opaque) * - On success return pointer to user data. * - On failure returns NULL. */ -__rte_experimental void * rte_cryptodev_sym_session_get_user_data(void *sess); @@ -1246,7 +1230,6 @@ rte_cryptodev_sym_session_get_user_data(void *sess); * - -EINVAL if the session pointer is invalid. * - -ENOMEM if the available user data size is smaller than the size parameter. */ -__rte_experimental int rte_cryptodev_asym_session_set_user_data(void *sess, void *data, uint16_t size); @@ -1260,7 +1243,6 @@ rte_cryptodev_asym_session_set_user_data(void *sess, void *data, uint16_t size); * - On success return pointer to user data. * - On failure returns NULL. */ -__rte_experimental void * rte_cryptodev_asym_session_get_user_data(void *sess); @@ -1276,7 +1258,6 @@ rte_cryptodev_asym_session_get_user_data(void *sess); * @return * - Returns number of successfully processed packets. */ -__rte_experimental uint32_t rte_cryptodev_sym_cpu_crypto_process(uint8_t dev_id, void *sess, union rte_crypto_sym_ofs ofs, @@ -1291,7 +1272,6 @@ rte_cryptodev_sym_cpu_crypto_process(uint8_t dev_id, * - If the device supports raw data-path APIs, return the context size. * - If the device does not support the APIs, return -1. */ -__rte_experimental int rte_cryptodev_get_raw_dp_ctx_size(uint8_t dev_id); @@ -1310,7 +1290,6 @@ rte_cryptodev_get_raw_dp_ctx_size(uint8_t dev_id); * - On success, zero. * - On failure, a negative value. */ -__rte_experimental int rte_cryptodev_session_event_mdata_set(uint8_t dev_id, void *sess, enum rte_crypto_op_type op_type, @@ -1536,7 +1515,6 @@ struct rte_crypto_raw_dp_ctx { * - -ENOTSUP if crypto device does not support raw DP operations with the * provided session. */ -__rte_experimental int rte_cryptodev_configure_raw_dp_ctx(uint8_t dev_id, uint16_t qp_id, struct rte_crypto_raw_dp_ctx *ctx, @@ -1568,7 +1546,6 @@ rte_cryptodev_configure_raw_dp_ctx(uint8_t dev_id, uint16_t qp_id, * cached into the queue but not enqueued yet, depends on the * "enqueue_status" value. */ -__rte_experimental uint32_t rte_cryptodev_raw_enqueue_burst(struct rte_crypto_raw_dp_ctx *ctx, struct rte_crypto_sym_vec *vec, union rte_crypto_sym_ofs ofs, @@ -1594,7 +1571,6 @@ rte_cryptodev_raw_enqueue_burst(struct rte_crypto_raw_dp_ctx *ctx, * until rte_cryptodev_raw_enqueue_done() is called. * - negative integer: failure. */ -__rte_experimental static __rte_always_inline int rte_cryptodev_raw_enqueue(struct rte_crypto_raw_dp_ctx *ctx, struct rte_crypto_vec *data_vec, uint16_t n_data_vecs, @@ -1618,7 +1594,6 @@ rte_cryptodev_raw_enqueue(struct rte_crypto_raw_dp_ctx *ctx, * - On success return 0. * - On failure return negative integer. */ -__rte_experimental int rte_cryptodev_raw_enqueue_done(struct rte_crypto_raw_dp_ctx *ctx, uint32_t n); @@ -1664,7 +1639,6 @@ rte_cryptodev_raw_enqueue_done(struct rte_crypto_raw_dp_ctx *ctx, * - The number of operations dequeued or completed but not freed from the * queue, depends on "dequeue_status" value. */ -__rte_experimental uint32_t rte_cryptodev_raw_dequeue_burst(struct rte_crypto_raw_dp_ctx *ctx, rte_cryptodev_raw_get_dequeue_count_t get_dequeue_count, @@ -1696,7 +1670,6 @@ rte_cryptodev_raw_dequeue_burst(struct rte_crypto_raw_dp_ctx *ctx, * - The user data pointer retrieved from device queue or NULL if no * operation is ready for dequeue. */ -__rte_experimental static __rte_always_inline void * rte_cryptodev_raw_dequeue(struct rte_crypto_raw_dp_ctx *ctx, int *dequeue_status, enum rte_crypto_op_status *op_status) @@ -1714,7 +1687,6 @@ rte_cryptodev_raw_dequeue(struct rte_crypto_raw_dp_ctx *ctx, * - On success return 0. * - On failure return negative integer. */ -__rte_experimental int rte_cryptodev_raw_dequeue_done(struct rte_crypto_raw_dp_ctx *ctx, uint32_t n); @@ -1755,7 +1727,6 @@ rte_cryptodev_raw_dequeue_done(struct rte_crypto_raw_dp_ctx *ctx, * callback. */ -__rte_experimental struct rte_cryptodev_cb * rte_cryptodev_add_enq_callback(uint8_t dev_id, uint16_t qp_id, @@ -1784,7 +1755,6 @@ rte_cryptodev_add_enq_callback(uint8_t dev_id, * is NULL or not found for the crypto device queue pair. */ -__rte_experimental int rte_cryptodev_remove_enq_callback(uint8_t dev_id, uint16_t qp_id, struct rte_cryptodev_cb *cb); @@ -1824,7 +1794,6 @@ int rte_cryptodev_remove_enq_callback(uint8_t dev_id, * callback. */ -__rte_experimental struct rte_cryptodev_cb * rte_cryptodev_add_deq_callback(uint8_t dev_id, uint16_t qp_id, @@ -1852,7 +1821,6 @@ rte_cryptodev_add_deq_callback(uint8_t dev_id, * - <0: The dev_id or the qp_id is out of range, or the callback * is NULL or not found for the crypto device queue pair. */ -__rte_experimental int rte_cryptodev_remove_deq_callback(uint8_t dev_id, uint16_t qp_id, struct rte_cryptodev_cb *cb); diff --git a/lib/cryptodev/version.map b/lib/cryptodev/version.map index ae8d9327b4f4..ee8ee7f88263 100644 --- a/lib/cryptodev/version.map +++ b/lib/cryptodev/version.map @@ -1,18 +1,37 @@ DPDK_24 { global: + __rte_cryptodev_trace_dequeue_burst; + __rte_cryptodev_trace_enqueue_burst; rte_crypto_aead_algorithm_strings; rte_crypto_aead_operation_strings; + rte_crypto_asym_ke_strings; + rte_crypto_asym_op_strings; + rte_crypto_asym_xform_strings; rte_crypto_auth_algorithm_strings; rte_crypto_auth_operation_strings; rte_crypto_cipher_algorithm_strings; rte_crypto_cipher_operation_strings; rte_crypto_fp_ops; rte_crypto_op_pool_create; + rte_cryptodev_add_deq_callback; + rte_cryptodev_add_enq_callback; + rte_cryptodev_asym_capability_get; + rte_cryptodev_asym_get_header_session_size; + rte_cryptodev_asym_get_private_session_size; + rte_cryptodev_asym_get_xform_enum; + rte_cryptodev_asym_session_create; + rte_cryptodev_asym_session_free; + rte_cryptodev_asym_session_get_user_data; + rte_cryptodev_asym_session_pool_create; + rte_cryptodev_asym_session_set_user_data; + rte_cryptodev_asym_xform_capability_check_modlen; + rte_cryptodev_asym_xform_capability_check_optype; rte_cryptodev_callback_register; rte_cryptodev_callback_unregister; rte_cryptodev_close; rte_cryptodev_configure; + rte_cryptodev_configure_raw_dp_ctx; rte_cryptodev_count; rte_cryptodev_device_count_by_driver; rte_cryptodev_devices_get; @@ -23,12 +42,21 @@ DPDK_24 { rte_cryptodev_get_cipher_algo_enum; rte_cryptodev_get_dev_id; rte_cryptodev_get_feature_name; + rte_cryptodev_get_qp_status; + rte_cryptodev_get_raw_dp_ctx_size; rte_cryptodev_get_sec_ctx; rte_cryptodev_info_get; rte_cryptodev_is_valid_dev; rte_cryptodev_name_get; rte_cryptodev_queue_pair_count; rte_cryptodev_queue_pair_setup; + rte_cryptodev_raw_dequeue_burst; + rte_cryptodev_raw_dequeue_done; + rte_cryptodev_raw_enqueue_burst; + rte_cryptodev_raw_enqueue_done; + rte_cryptodev_remove_deq_callback; + rte_cryptodev_remove_enq_callback; + rte_cryptodev_session_event_mdata_set; rte_cryptodev_socket_id; rte_cryptodev_start; rte_cryptodev_stats_get; @@ -38,9 +66,13 @@ DPDK_24 { rte_cryptodev_sym_capability_check_auth; rte_cryptodev_sym_capability_check_cipher; rte_cryptodev_sym_capability_get; + rte_cryptodev_sym_cpu_crypto_process; rte_cryptodev_sym_get_private_session_size; rte_cryptodev_sym_session_create; rte_cryptodev_sym_session_free; + rte_cryptodev_sym_session_get_user_data; + rte_cryptodev_sym_session_pool_create; + rte_cryptodev_sym_session_set_user_data; local: *; }; @@ -48,51 +80,6 @@ DPDK_24 { EXPERIMENTAL { global: - rte_cryptodev_asym_capability_get; - rte_cryptodev_asym_get_header_session_size; - rte_cryptodev_asym_get_private_session_size; - rte_cryptodev_asym_get_xform_enum; - rte_cryptodev_asym_session_create; - rte_cryptodev_asym_session_free; - rte_cryptodev_asym_xform_capability_check_modlen; - rte_cryptodev_asym_xform_capability_check_optype; - rte_cryptodev_sym_cpu_crypto_process; - rte_cryptodev_sym_session_get_user_data; - rte_cryptodev_sym_session_pool_create; - rte_cryptodev_sym_session_set_user_data; - rte_crypto_asym_op_strings; - rte_crypto_asym_xform_strings; - - # added in 20.05 - __rte_cryptodev_trace_dequeue_burst; - __rte_cryptodev_trace_enqueue_burst; - - # added in 20.08 - rte_cryptodev_get_qp_status; - - # added in 20.11 - rte_cryptodev_configure_raw_dp_ctx; - rte_cryptodev_get_raw_dp_ctx_size; - rte_cryptodev_raw_dequeue_burst; - rte_cryptodev_raw_dequeue_done; - rte_cryptodev_raw_enqueue_burst; - rte_cryptodev_raw_enqueue_done; - - # added in 21.02 - rte_cryptodev_add_deq_callback; - rte_cryptodev_add_enq_callback; - rte_cryptodev_remove_deq_callback; - rte_cryptodev_remove_enq_callback; - - # added in 22.03 - rte_cryptodev_asym_session_get_user_data; - rte_cryptodev_asym_session_pool_create; - rte_cryptodev_asym_session_set_user_data; - - # added in 22.07 - rte_cryptodev_session_event_mdata_set; - rte_crypto_asym_ke_strings; - # added in 23.03 rte_cryptodev_asym_get_xform_string; rte_cryptodev_get_aead_algo_string; -- 2.39.2