From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2B6CD431EB; Tue, 24 Oct 2023 04:57:13 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 3C11342E5E; Tue, 24 Oct 2023 04:55:09 +0200 (CEST) Received: from mail-pf1-f176.google.com (mail-pf1-f176.google.com [209.85.210.176]) by mails.dpdk.org (Postfix) with ESMTP id 8FCFA402E4 for ; Tue, 24 Oct 2023 04:54:57 +0200 (CEST) Received: by mail-pf1-f176.google.com with SMTP id d2e1a72fcca58-6b77ab73c6fso2903106b3a.1 for ; Mon, 23 Oct 2023 19:54:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20230601.gappssmtp.com; s=20230601; t=1698116096; x=1698720896; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=DxE+zE3JKUDP7sSWJNABBC6brETUnucItdrA1SaTFvQ=; b=Rss1L+nhGTbwK75rMyidWLeT8kux2XEHQu3FPE9BX9rk3ak+81t/xsTYkQ0Mos6DV4 Zn3rWpA1FjLb5H/d6adziAIyasyG+KHByZ/6EM35tdwp36zRFqLTl0LijqPxvurYXYHb YP7OvPBE1nx5gksTfUiBYS5dYxeDWfkC5Jhd+sbkLORnGdzmqNEkbLVLrJN0a2enZC9V YrHLENnNjwe0VPtzLoFv6RcDRAOFs47ezXtB/4SLSGyOSujLPSfl/PhapRJUrbXSzuza JOVpIBp+HgqM8JD+J8yBInGBPC/HArCVTMhJvQ6AWYUGtN+M5i+1UP5eUmpAapiWoF+5 2rsg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698116096; x=1698720896; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=DxE+zE3JKUDP7sSWJNABBC6brETUnucItdrA1SaTFvQ=; b=KB2dn1cn2ICHkR86HWd16y05NKqTJ8QAyjoQkX2vP3Uqr5s26gt0feZz+b2PQiTTwt AGpg2US9dgXLaSddzgwY0SL5/t/zLtcHjHVy9oOLBvHarFbk7RT2tAqLyalDd+fORq+3 UwwiK/gGZ8Pi4iKqi0PMPayuz4t8GCvMeQpu9JhfgZSXJ1s4w5X4wZnWzB81OIb+PBFM pIrLGsp5ZdHMaXTDfYCw/4S9jzmBgw4YvnHT+aMuccrgkqk/eguE7GCDWJKHtJkhApf6 FJKxQv+tmVOg7FS5EniJuT3Mipe6am/CLzMbj/sua1eT2FoNqU/yo0OV3D7QASR6IwQl gE7Q== X-Gm-Message-State: AOJu0YwurUGtZj+trokCuTqkXFb/KfdWrZQe/OIhXldNApG/filj7JDe EjfNDy2FjDC6hm8d48rbg17nuPTBDEvIT6kinTheJQ== X-Google-Smtp-Source: AGHT+IE3hq2s05fBVzSxXFNI/eEYS0/cM94cF1pRp5ylWZXdDsxBXNN6DgU/nBqYfdM0k6uUbhdRFA== X-Received: by 2002:a05:6a00:4c86:b0:6bf:15fb:4b32 with SMTP id eb6-20020a056a004c8600b006bf15fb4b32mr16802091pfb.8.1698116096503; Mon, 23 Oct 2023 19:54:56 -0700 (PDT) Received: from hermes.local (204-195-126-68.wavecable.com. [204.195.126.68]) by smtp.gmail.com with ESMTPSA id b22-20020aa79516000000b0069b772c4325sm6802348pfp.87.2023.10.23.19.54.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Oct 2023 19:54:56 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger , Akhil Goyal , Fan Zhang Subject: [PATCH v7 25/25] cryptodev: mark older API's stable Date: Mon, 23 Oct 2023 19:54:22 -0700 Message-Id: <20231024025422.126021-26-stephen@networkplumber.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20231024025422.126021-1-stephen@networkplumber.org> References: <20230808173527.186042-1-stephen@networkplumber.org> <20231024025422.126021-1-stephen@networkplumber.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org All the cryptodev API's from 2022 backwards should be stable at this point. Signed-off-by: Stephen Hemminger --- lib/cryptodev/rte_cryptodev.h | 31 -------------- lib/cryptodev/version.map | 77 +++++++++++++++-------------------- 2 files changed, 32 insertions(+), 76 deletions(-) diff --git a/lib/cryptodev/rte_cryptodev.h b/lib/cryptodev/rte_cryptodev.h index be0698ce9fc6..aa5b5529f44c 100644 --- a/lib/cryptodev/rte_cryptodev.h +++ b/lib/cryptodev/rte_cryptodev.h @@ -257,7 +257,6 @@ rte_cryptodev_sym_capability_get(uint8_t dev_id, * - Return description of the asymmetric crypto capability if exist. * - Return NULL if the capability not exist. */ -__rte_experimental const struct rte_cryptodev_asymmetric_xform_capability * rte_cryptodev_asym_capability_get(uint8_t dev_id, const struct rte_cryptodev_asym_capability_idx *idx); @@ -327,7 +326,6 @@ rte_cryptodev_sym_capability_check_aead( * - Return 1 if the op type is supported * - Return 0 if unsupported */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_optype( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -343,7 +341,6 @@ rte_cryptodev_asym_xform_capability_check_optype( * - Return 0 if the parameters are in range of the capability. * - Return -1 if the parameters are out of range of the capability. */ -__rte_experimental int rte_cryptodev_asym_xform_capability_check_modlen( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -359,7 +356,6 @@ rte_cryptodev_asym_xform_capability_check_modlen( * - Return true if the hash algorithm is supported. * - Return false if the hash algorithm is not supported. */ -__rte_experimental bool rte_cryptodev_asym_xform_capability_check_hash( const struct rte_cryptodev_asymmetric_xform_capability *capability, @@ -421,7 +417,6 @@ rte_cryptodev_get_aead_algo_enum(enum rte_crypto_aead_algorithm *algo_enum, * - Return -1 if string is not valid * - Return 0 if the string is valid */ -__rte_experimental int rte_cryptodev_asym_get_xform_enum(enum rte_crypto_asym_xform_type *xform_enum, const char *xform_string); @@ -860,7 +855,6 @@ rte_cryptodev_queue_pair_setup(uint8_t dev_id, uint16_t queue_pair_id, * - 1: qp was configured * - -EINVAL: device was not configured */ -__rte_experimental int rte_cryptodev_get_qp_status(uint8_t dev_id, uint16_t queue_pair_id); @@ -1039,7 +1033,6 @@ rte_cryptodev_get_sec_ctx(uint8_t dev_id); * - On success returns the created session mempool pointer * - On failure returns NULL */ -__rte_experimental struct rte_mempool * rte_cryptodev_sym_session_pool_create(const char *name, uint32_t nb_elts, uint32_t elt_size, uint32_t cache_size, uint16_t priv_size, @@ -1066,7 +1059,6 @@ rte_cryptodev_sym_session_pool_create(const char *name, uint32_t nb_elts, * - On success return mempool * - On failure returns NULL */ -__rte_experimental struct rte_mempool * rte_cryptodev_asym_session_pool_create(const char *name, uint32_t nb_elts, uint32_t cache_size, uint16_t user_data_size, int socket_id); @@ -1108,7 +1100,6 @@ rte_cryptodev_sym_session_create(uint8_t dev_id, * - -ENOMEM on memory error for session allocation. * - -ENOTSUP if device doesn't support session configuration. */ -__rte_experimental int rte_cryptodev_asym_session_create(uint8_t dev_id, struct rte_crypto_asym_xform *xforms, struct rte_mempool *mp, @@ -1141,7 +1132,6 @@ rte_cryptodev_sym_session_free(uint8_t dev_id, * - 0 if successful. * - -EINVAL if device is invalid or session is NULL. */ -__rte_experimental int rte_cryptodev_asym_session_free(uint8_t dev_id, void *sess); @@ -1151,7 +1141,6 @@ rte_cryptodev_asym_session_free(uint8_t dev_id, void *sess); * @return * Size of the asymmetric header session. */ -__rte_experimental unsigned int rte_cryptodev_asym_get_header_session_size(void); @@ -1179,7 +1168,6 @@ rte_cryptodev_sym_get_private_session_size(uint8_t dev_id); * - Size of the asymmetric private data, if successful * - 0 if device is invalid or does not have private session */ -__rte_experimental unsigned int rte_cryptodev_asym_get_private_session_size(uint8_t dev_id); @@ -1226,7 +1214,6 @@ const char *rte_cryptodev_driver_name_get(uint8_t driver_id); * - On success, zero. * - On failure, a negative value. */ -__rte_experimental int rte_cryptodev_sym_session_set_user_data(void *sess, void *data, @@ -1263,7 +1250,6 @@ rte_cryptodev_sym_session_opaque_data_set(void *sess, uint64_t opaque) * - On success return pointer to user data. * - On failure returns NULL. */ -__rte_experimental void * rte_cryptodev_sym_session_get_user_data(void *sess); @@ -1280,7 +1266,6 @@ rte_cryptodev_sym_session_get_user_data(void *sess); * - -EINVAL if the session pointer is invalid. * - -ENOMEM if the available user data size is smaller than the size parameter. */ -__rte_experimental int rte_cryptodev_asym_session_set_user_data(void *sess, void *data, uint16_t size); @@ -1294,7 +1279,6 @@ rte_cryptodev_asym_session_set_user_data(void *sess, void *data, uint16_t size); * - On success return pointer to user data. * - On failure returns NULL. */ -__rte_experimental void * rte_cryptodev_asym_session_get_user_data(void *sess); @@ -1310,7 +1294,6 @@ rte_cryptodev_asym_session_get_user_data(void *sess); * @return * - Returns number of successfully processed packets. */ -__rte_experimental uint32_t rte_cryptodev_sym_cpu_crypto_process(uint8_t dev_id, void *sess, union rte_crypto_sym_ofs ofs, @@ -1325,7 +1308,6 @@ rte_cryptodev_sym_cpu_crypto_process(uint8_t dev_id, * - If the device supports raw data-path APIs, return the context size. * - If the device does not support the APIs, return -1. */ -__rte_experimental int rte_cryptodev_get_raw_dp_ctx_size(uint8_t dev_id); @@ -1344,7 +1326,6 @@ rte_cryptodev_get_raw_dp_ctx_size(uint8_t dev_id); * - On success, zero. * - On failure, a negative value. */ -__rte_experimental int rte_cryptodev_session_event_mdata_set(uint8_t dev_id, void *sess, enum rte_crypto_op_type op_type, @@ -1570,7 +1551,6 @@ struct rte_crypto_raw_dp_ctx { * - -ENOTSUP if crypto device does not support raw DP operations with the * provided session. */ -__rte_experimental int rte_cryptodev_configure_raw_dp_ctx(uint8_t dev_id, uint16_t qp_id, struct rte_crypto_raw_dp_ctx *ctx, @@ -1602,7 +1582,6 @@ rte_cryptodev_configure_raw_dp_ctx(uint8_t dev_id, uint16_t qp_id, * cached into the queue but not enqueued yet, depends on the * "enqueue_status" value. */ -__rte_experimental uint32_t rte_cryptodev_raw_enqueue_burst(struct rte_crypto_raw_dp_ctx *ctx, struct rte_crypto_sym_vec *vec, union rte_crypto_sym_ofs ofs, @@ -1652,7 +1631,6 @@ rte_cryptodev_raw_enqueue(struct rte_crypto_raw_dp_ctx *ctx, * - On success return 0. * - On failure return negative integer. */ -__rte_experimental int rte_cryptodev_raw_enqueue_done(struct rte_crypto_raw_dp_ctx *ctx, uint32_t n); @@ -1698,7 +1676,6 @@ rte_cryptodev_raw_enqueue_done(struct rte_crypto_raw_dp_ctx *ctx, * - The number of operations dequeued or completed but not freed from the * queue, depends on "dequeue_status" value. */ -__rte_experimental uint32_t rte_cryptodev_raw_dequeue_burst(struct rte_crypto_raw_dp_ctx *ctx, rte_cryptodev_raw_get_dequeue_count_t get_dequeue_count, @@ -1748,7 +1725,6 @@ rte_cryptodev_raw_dequeue(struct rte_crypto_raw_dp_ctx *ctx, * - On success return 0. * - On failure return negative integer. */ -__rte_experimental int rte_cryptodev_raw_dequeue_done(struct rte_crypto_raw_dp_ctx *ctx, uint32_t n); @@ -1788,8 +1764,6 @@ rte_cryptodev_raw_dequeue_done(struct rte_crypto_raw_dp_ctx *ctx, * - On success, a pointer value which can later be used to remove the * callback. */ - -__rte_experimental struct rte_cryptodev_cb * rte_cryptodev_add_enq_callback(uint8_t dev_id, uint16_t qp_id, @@ -1817,8 +1791,6 @@ rte_cryptodev_add_enq_callback(uint8_t dev_id, * - <0: The dev_id or the qp_id is out of range, or the callback * is NULL or not found for the crypto device queue pair. */ - -__rte_experimental int rte_cryptodev_remove_enq_callback(uint8_t dev_id, uint16_t qp_id, struct rte_cryptodev_cb *cb); @@ -1857,8 +1829,6 @@ int rte_cryptodev_remove_enq_callback(uint8_t dev_id, * - On success, a pointer value which can later be used to remove the * callback. */ - -__rte_experimental struct rte_cryptodev_cb * rte_cryptodev_add_deq_callback(uint8_t dev_id, uint16_t qp_id, @@ -1886,7 +1856,6 @@ rte_cryptodev_add_deq_callback(uint8_t dev_id, * - <0: The dev_id or the qp_id is out of range, or the callback * is NULL or not found for the crypto device queue pair. */ -__rte_experimental int rte_cryptodev_remove_deq_callback(uint8_t dev_id, uint16_t qp_id, struct rte_cryptodev_cb *cb); diff --git a/lib/cryptodev/version.map b/lib/cryptodev/version.map index 208919b81950..c39199be54f5 100644 --- a/lib/cryptodev/version.map +++ b/lib/cryptodev/version.map @@ -1,15 +1,34 @@ DPDK_24 { global: + __rte_cryptodev_trace_dequeue_burst; + __rte_cryptodev_trace_enqueue_burst; rte_crypto_aead_operation_strings; + rte_crypto_asym_ke_strings; + rte_crypto_asym_op_strings; rte_crypto_auth_operation_strings; rte_crypto_cipher_operation_strings; rte_crypto_fp_ops; rte_crypto_op_pool_create; + rte_cryptodev_add_deq_callback; + rte_cryptodev_add_enq_callback; + rte_cryptodev_asym_capability_get; + rte_cryptodev_asym_get_header_session_size; + rte_cryptodev_asym_get_private_session_size; + rte_cryptodev_asym_get_xform_enum; + rte_cryptodev_asym_session_create; + rte_cryptodev_asym_session_free; + rte_cryptodev_asym_session_get_user_data; + rte_cryptodev_asym_session_pool_create; + rte_cryptodev_asym_session_set_user_data; + rte_cryptodev_asym_xform_capability_check_hash; + rte_cryptodev_asym_xform_capability_check_modlen; + rte_cryptodev_asym_xform_capability_check_optype; rte_cryptodev_callback_register; rte_cryptodev_callback_unregister; rte_cryptodev_close; rte_cryptodev_configure; + rte_cryptodev_configure_raw_dp_ctx; rte_cryptodev_count; rte_cryptodev_device_count_by_driver; rte_cryptodev_devices_get; @@ -20,12 +39,21 @@ DPDK_24 { rte_cryptodev_get_cipher_algo_enum; rte_cryptodev_get_dev_id; rte_cryptodev_get_feature_name; + rte_cryptodev_get_qp_status; + rte_cryptodev_get_raw_dp_ctx_size; rte_cryptodev_get_sec_ctx; rte_cryptodev_info_get; rte_cryptodev_is_valid_dev; rte_cryptodev_name_get; rte_cryptodev_queue_pair_count; rte_cryptodev_queue_pair_setup; + rte_cryptodev_raw_dequeue_burst; + rte_cryptodev_raw_dequeue_done; + rte_cryptodev_raw_enqueue_burst; + rte_cryptodev_raw_enqueue_done; + rte_cryptodev_remove_deq_callback; + rte_cryptodev_remove_enq_callback; + rte_cryptodev_session_event_mdata_set; rte_cryptodev_socket_id; rte_cryptodev_start; rte_cryptodev_stats_get; @@ -35,9 +63,13 @@ DPDK_24 { rte_cryptodev_sym_capability_check_auth; rte_cryptodev_sym_capability_check_cipher; rte_cryptodev_sym_capability_get; + rte_cryptodev_sym_cpu_crypto_process; rte_cryptodev_sym_get_private_session_size; rte_cryptodev_sym_session_create; rte_cryptodev_sym_session_free; + rte_cryptodev_sym_session_get_user_data; + rte_cryptodev_sym_session_pool_create; + rte_cryptodev_sym_session_set_user_data; local: *; }; @@ -45,51 +77,6 @@ DPDK_24 { EXPERIMENTAL { global: - rte_cryptodev_asym_capability_get; - rte_cryptodev_asym_get_header_session_size; - rte_cryptodev_asym_get_private_session_size; - rte_cryptodev_asym_get_xform_enum; - rte_cryptodev_asym_session_create; - rte_cryptodev_asym_session_free; - rte_cryptodev_asym_xform_capability_check_hash; - rte_cryptodev_asym_xform_capability_check_modlen; - rte_cryptodev_asym_xform_capability_check_optype; - rte_cryptodev_sym_cpu_crypto_process; - rte_cryptodev_sym_session_get_user_data; - rte_cryptodev_sym_session_pool_create; - rte_cryptodev_sym_session_set_user_data; - rte_crypto_asym_op_strings; - - # added in 20.05 - __rte_cryptodev_trace_dequeue_burst; - __rte_cryptodev_trace_enqueue_burst; - - # added in 20.08 - rte_cryptodev_get_qp_status; - - # added in 20.11 - rte_cryptodev_configure_raw_dp_ctx; - rte_cryptodev_get_raw_dp_ctx_size; - rte_cryptodev_raw_dequeue_burst; - rte_cryptodev_raw_dequeue_done; - rte_cryptodev_raw_enqueue_burst; - rte_cryptodev_raw_enqueue_done; - - # added in 21.02 - rte_cryptodev_add_deq_callback; - rte_cryptodev_add_enq_callback; - rte_cryptodev_remove_deq_callback; - rte_cryptodev_remove_enq_callback; - - # added in 22.03 - rte_cryptodev_asym_session_get_user_data; - rte_cryptodev_asym_session_pool_create; - rte_cryptodev_asym_session_set_user_data; - - # added in 22.07 - rte_cryptodev_session_event_mdata_set; - rte_crypto_asym_ke_strings; - # added in 23.03 rte_cryptodev_asym_get_xform_string; rte_cryptodev_get_aead_algo_string; -- 2.39.2