From patchwork Wed Jul 4 09:05:13 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hemant Agrawal X-Patchwork-Id: 42202 X-Patchwork-Delegate: pablo.de.lara.guarch@intel.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 1378D1BF1C; Wed, 4 Jul 2018 11:06:55 +0200 (CEST) Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0074.outbound.protection.outlook.com [104.47.1.74]) by dpdk.org (Postfix) with ESMTP id CFB641BF01 for ; Wed, 4 Jul 2018 11:06:53 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zul9M5TLYHS/u/I5yhRT7T76saTHWqRmaIca5em+QB4=; b=K7YZQIwEnOyuRyh/5/YKBUCCzCc0tHeCXi3SuJivaMu/9IGe4gW79vMvUXLQT6ZCeejNDwS0zWezU9h4rf00rwlsAMth2gdVvkEoMWbg/pseWY7jQCP5buKPvbDSTrsBnvHaskWBsjeaaDbSzVNUqxA1erWkvNXHWDL5RvaJXGY= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=hemant.agrawal@nxp.com; Received: from bf-netperf1.ap.freescale.net (14.142.187.166) by DB3PR04MB0761.eurprd04.prod.outlook.com (2a01:111:e400:9440::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.930.19; Wed, 4 Jul 2018 09:06:49 +0000 From: Hemant Agrawal To: radu.nicolau@intel.com, akhil.goyal@nxp.com, declan.doherty@intel.com, pablo.de.lara.guarch@intel.com, borisp@mellanox.com Cc: dev@dpdk.org Date: Wed, 4 Jul 2018 14:35:13 +0530 Message-Id: <1530695113-12477-1-git-send-email-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1530690841-27356-1-git-send-email-hemant.agrawal@nxp.com> References: <1530690841-27356-1-git-send-email-hemant.agrawal@nxp.com> MIME-Version: 1.0 X-Originating-IP: [14.142.187.166] X-ClientProxiedBy: BM1PR01CA0071.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:1::11) To DB3PR04MB0761.eurprd04.prod.outlook.com (2a01:111:e400:9440::24) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 148e1f3c-9a45-4315-f061-08d5e18d7a8a X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:DB3PR04MB0761; X-Microsoft-Exchange-Diagnostics: 1; DB3PR04MB0761; 3:SH0gGGcBiGyRCWo2676OD5pQMK5V+eMvEEmJq2Bx7scFvZxYiVxkr8UwIYQxkhHrr+RRqPSMmCH+NJdgsY7zi/+vsp5oPSFL7wEm4KCJrixbDKBHuC1vwxCBvKzmCegKttvkZgo09u2sJ6g2PIUWAneOzFTUshMJz3L0VprNSp+La0MLNY9oLAO1Ec1BjBJFXDgQSZp36PaHzU0mk77kRW76e8AyTN0i2MD7mziszCY6atUs22fBjAMeBsJykP2m; 25:azt4+mPiDPOWOFJyxyi3nIbKeShzbJ/5qSEJE7s25MPmo4ldqbE0Wgi7+c1spKZiQ99H7xyrzGrAmD53xzUo5kwYhtl5qSY/qK5mtslduTOKf22n8ETTnf0sArLZzhxCpY9jcUp3K19OyUHyvSJQg3DP8JS+st2a6lo25YV9mgrFo1zRPSX+EpLCQ8/olrMv7ttp5X1qk3NitbpR9RMmQe8vzT/b6dBgHGbBBGxCDIXaxLQlY5gYprLffLkHFwTnlwKtfL5rxtdOjdYGD8fJwieNkrBJzbHnC4qpkgmUQ3/JZzVLjKpIfvkFnPdkfhWESHLWQWYr31boNzQegb9CFA==; 31:1ozFiDNnqpbxcf/cg9svQtLOOHp7jhNCiH+3LrrNnPxjS3Fp7NHI7EYwm99W620VgMA6QTyDbMJacMiT6WtnnNwnAwdUR628MCs0PVlXzraPk8GXmZ7oBCp9lDnWY9soUUZCls8RquqmKp40N/Bg336tXLfVJcO/2X8TsQa8EiSjTDOKO8R4fQlhvMExMP8qe1s4c5gvm6jLbmGkdomMhP8GL73KAOMdP21fWMdzyCQ= X-MS-TrafficTypeDiagnostic: DB3PR04MB0761: X-Microsoft-Exchange-Diagnostics: 1; DB3PR04MB0761; 20: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; 4:zj7HwNGDeZENpf3f94tgC9DMVGpSXOcpJdnY2LJr2RWshMd6YJABodiCJm6/d5QtydlSac8u2c6BeeQgoZa7to8F/s3Ij1At+Hm81CvrkXJWCfBFIeXGXKD+WIPUG3g2KW9tCARPAy1L6BlxirDrDh/iiUyHVT+AqgxRsYqRcYMiXLJ0CfdvK/oJBjC2284NrkRmtsb+5yGqMnXWXU34NE9TVz3L/eF83EGqYbYKUSAkmaudQTxJgXglAG/MkUIQQe1tPYjSk1eW2H9ussPlTA8thDYq3PuFotrrLtLiSTAilDeFlFPJEmiqpKc/+cXhrIcvyMBcidgZ1i/8ohz0+24qeT4XjffG4sCJ7iJI0rs= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231254)(944501410)(52105095)(3002001)(10201501046)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123564045)(20161123560045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:DB3PR04MB0761; BCL:0; PCL:0; RULEID:; SRVR:DB3PR04MB0761; X-Forefront-PRVS: 0723A02764 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(136003)(366004)(346002)(39860400002)(396003)(376002)(189003)(199004)(76176011)(186003)(478600001)(48376002)(7736002)(5009440100003)(50466002)(8936002)(8676002)(15650500001)(81156014)(81166006)(305945005)(476003)(2616005)(6116002)(956004)(446003)(3846002)(11346002)(16526019)(16586007)(575784001)(86362001)(6486002)(2906002)(486006)(97736004)(6512007)(14444005)(5024004)(316002)(53936002)(66066001)(44832011)(4326008)(47776003)(25786009)(68736007)(50226002)(51416003)(5660300001)(36756003)(105586002)(6666003)(52116002)(386003)(55236004)(6506007)(106356001)(26005)(110426005); DIR:OUT; SFP:1101; SCL:1; SRVR:DB3PR04MB0761; H:bf-netperf1.ap.freescale.net; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DB3PR04MB0761; 23:7srY8zArJYRXzDVLG+G6YENeTnsLHG31Pv0MwCRdo?= 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 X-Microsoft-Antispam-Message-Info: lWPdEoWbYZ5lY+/khlyQ78x0Oh5RKgRf/ZGnZos/nwiR1Gztk/uRpUUaF3R3ijqsvUBNneM1MjUwkSZ2/LnZVDCb3a3iUrgjV0aT0l/0lTOMru4DoV+j3pHoBvssozgwP/07AEds9+onAh0FGOyHOlgHppN5Rsr48/75/DSlxARlLeYwi21aGQq+ZwLoE+gVmlSH34MJX3fmXUKIXKgkduiEd03uEXFT3k2k1ryFwCrumCWgHNw6hDbR2u7W9rbE2rfSarOlqTtI6jRwlA386hShhjMcNSa9Bre7MN74LyBUMEpI8q2i+ScgYD5PzsBLg5ULv7l7rCpla8wxeJSvB/GHJajyc4qm0JpBkLPfmWU= X-Microsoft-Exchange-Diagnostics: 1; DB3PR04MB0761; 6:ZoUIVjfh+Zn/3BlZDWHx8ocqQAlKJ02jS0wXiZaqYLptZ2BVTrH2MkYuLGSQC/0ZcBOQKkgCvfaIDcIf0fe6Z5u8QMdVV8KfWwEybU2HL3CS4IGiUuJOdpn9HP6iY/J30huPH/niaAagtsf6UqzxIwKLnhKngmwb0VlDJJhMvE5zLNITJCk68CuvNm/obs8s3E0Gn8m8Pr/nHveYm4eUNRcwtybKN1O3Jd9vJe0dTnv3mEqpJGJiSwPzc3tqHlokW9im8lDt6CR+3kx4ucsDLcFlTAn9cfMEtN8g+NHOovhfmz6KAVhLp0lCoUU8om06hgLFm8u/zMNR/dJFCeFPP6BsX7D0Voo4AFtzc6Iw36bpOg6rL7MK37w0e/cgDxK6fGDQmj4/yyPaqlkMNcZMleSuB/8Xolirxxa/xoFWOhMQUJnyQBNf7QsxAQ7XGU0Uo4j2JpP0JaYWnW6INbBKbA==; 5:xUIzFMRRZwx1I4WHqWKE8T1oYdkQMJ0IrKXfCJxBpw4wrrZNCwcClZ6x0CbkbPLkxs50Ollv0Rpg2KN9BNrlqJGF/33WLmGS3IhtbzBGN/gAKPHxp8P9f+p8hqH6ALmMUHr7WpeGj7YE3pdC2R/XNk9hS6CBejZ9gou3b2dqoW4=; 24:jCBDzHScMTpMrkOwN1nCoZhFRnHmTLvRn5c5uWROxv3cIM5fw2AUbr63qDX1kTX2LNnDQ7cLzfE16KSrcvj4vmCmUvMCD9/jJImv+19piOU= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DB3PR04MB0761; 7:rE2HmDxChXAZekbocebIRKch9HupNZYUvsBJ1kZbZSFqHB5Fo4pTvdxX0yMw+NcIeyiCSERRbc3o962fOtKVa8NymnMwwSFpkd+krtIqzxAfQQf5Xk50cb7YBE46JzWKAs88IHVai7GQqOzB5R+r8JH8uOZxSABIYko4VF9m0lEcVlwygPoQwgaJupqjjMh0dwmxHAL+eznKM3iB8xG1iZNPmHCUHqYgaNFt9VwgGs/iswcgpp/6tlRy5WHxPkbO X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jul 2018 09:06:49.2617 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 148e1f3c-9a45-4315-f061-08d5e18d7a8a X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR04MB0761 Subject: [dpdk-dev] [PATCH v2] security: remove experimental tag from security APIs X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Signed-off-by: Hemant Agrawal Acked-by: Radu Nicolau Acked-by: Boris Pismenny --- v2: fix the release version doc/guides/rel_notes/release_18_08.rst | 7 +++++++ lib/librte_security/rte_security.c | 18 +++++++++--------- lib/librte_security/rte_security.h | 28 +++++++++++++--------------- lib/librte_security/rte_security_driver.h | 2 -- lib/librte_security/rte_security_version.map | 2 +- 5 files changed, 30 insertions(+), 27 deletions(-) diff --git a/doc/guides/rel_notes/release_18_08.rst b/doc/guides/rel_notes/release_18_08.rst index bc01242..355e8e2 100644 --- a/doc/guides/rel_notes/release_18_08.rst +++ b/doc/guides/rel_notes/release_18_08.rst @@ -60,6 +60,13 @@ API Changes Also, make sure to start the actual text at the margin. ========================================================= +* security : No longer marked as experimental. + + The security functions are no longer marked as experimental, and have + become part of the normal DPDK API and ABI. Any future ABI changes will be + announced at least one release before the ABI change is made. There are no + ABI breaking changes planned. + ABI Changes ----------- diff --git a/lib/librte_security/rte_security.c b/lib/librte_security/rte_security.c index f36a8a0..9f848a2 100644 --- a/lib/librte_security/rte_security.c +++ b/lib/librte_security/rte_security.c @@ -10,7 +10,7 @@ #include "rte_security_driver.h" struct rte_security_session * -__rte_experimental rte_security_session_create(struct rte_security_ctx *instance, +rte_security_session_create(struct rte_security_ctx *instance, struct rte_security_session_conf *conf, struct rte_mempool *mp) { @@ -33,7 +33,7 @@ __rte_experimental rte_security_session_create(struct rte_security_ctx *instance return sess; } -int __rte_experimental +int rte_security_session_update(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_session_conf *conf) @@ -42,14 +42,14 @@ rte_security_session_update(struct rte_security_ctx *instance, return instance->ops->session_update(instance->device, sess, conf); } -unsigned int __rte_experimental +unsigned int rte_security_session_get_size(struct rte_security_ctx *instance) { RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_get_size, 0); return instance->ops->session_get_size(instance->device); } -int __rte_experimental +int rte_security_session_stats_get(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_stats *stats) @@ -58,7 +58,7 @@ rte_security_session_stats_get(struct rte_security_ctx *instance, return instance->ops->session_stats_get(instance->device, sess, stats); } -int __rte_experimental +int rte_security_session_destroy(struct rte_security_ctx *instance, struct rte_security_session *sess) { @@ -77,7 +77,7 @@ rte_security_session_destroy(struct rte_security_ctx *instance, return ret; } -int __rte_experimental +int rte_security_set_pkt_metadata(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_mbuf *m, void *params) @@ -87,7 +87,7 @@ rte_security_set_pkt_metadata(struct rte_security_ctx *instance, sess, m, params); } -void * __rte_experimental +void * rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md) { void *userdata = NULL; @@ -99,14 +99,14 @@ rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md) return userdata; } -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capabilities_get(struct rte_security_ctx *instance) { RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->capabilities_get, NULL); return instance->ops->capabilities_get(instance->device); } -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capability_get(struct rte_security_ctx *instance, struct rte_security_capability_idx *idx) { diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h index b0d1b97..89dd073 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h @@ -8,8 +8,6 @@ /** * @file rte_security.h - * @b EXPERIMENTAL: this API may change without prior notice - * * RTE Security Common Definitions * */ @@ -269,7 +267,7 @@ struct rte_security_session { * - On success, pointer to session * - On failure, NULL */ -struct rte_security_session * __rte_experimental +struct rte_security_session * rte_security_session_create(struct rte_security_ctx *instance, struct rte_security_session_conf *conf, struct rte_mempool *mp); @@ -284,7 +282,7 @@ rte_security_session_create(struct rte_security_ctx *instance, * - On success returns 0 * - On failure return errno */ -int __rte_experimental +int rte_security_session_update(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_session_conf *conf); @@ -298,7 +296,7 @@ rte_security_session_update(struct rte_security_ctx *instance, * - Size of the private data, if successful * - 0 if device is invalid or does not support the operation. */ -unsigned int __rte_experimental +unsigned int rte_security_session_get_size(struct rte_security_ctx *instance); /** @@ -313,7 +311,7 @@ rte_security_session_get_size(struct rte_security_ctx *instance); * - -EINVAL if session is NULL. * - -EBUSY if not all device private data has been freed. */ -int __rte_experimental +int rte_security_session_destroy(struct rte_security_ctx *instance, struct rte_security_session *sess); @@ -330,7 +328,7 @@ rte_security_session_destroy(struct rte_security_ctx *instance, * - On success, zero. * - On failure, a negative value. */ -int __rte_experimental +int rte_security_set_pkt_metadata(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_mbuf *mb, void *params); @@ -352,7 +350,7 @@ rte_security_set_pkt_metadata(struct rte_security_ctx *instance, * - On success, userdata * - On failure, NULL */ -void * __rte_experimental +void * rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md); /** @@ -361,7 +359,7 @@ rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md); * @param sym_op crypto operation * @param sess security session */ -static inline int __rte_experimental +static inline int __rte_security_attach_session(struct rte_crypto_sym_op *sym_op, struct rte_security_session *sess) { @@ -370,13 +368,13 @@ __rte_security_attach_session(struct rte_crypto_sym_op *sym_op, return 0; } -static inline void * __rte_experimental +static inline void * get_sec_session_private_data(const struct rte_security_session *sess) { return sess->sess_private_data; } -static inline void __rte_experimental +static inline void set_sec_session_private_data(struct rte_security_session *sess, void *private_data) { @@ -392,7 +390,7 @@ set_sec_session_private_data(struct rte_security_session *sess, * @param op crypto operation * @param sess security session */ -static inline int __rte_experimental +static inline int rte_security_attach_session(struct rte_crypto_op *op, struct rte_security_session *sess) { @@ -434,7 +432,7 @@ struct rte_security_stats { * - On success return 0 * - On failure errno */ -int __rte_experimental +int rte_security_session_stats_get(struct rte_security_ctx *instance, struct rte_security_session *sess, struct rte_security_stats *stats); @@ -518,7 +516,7 @@ struct rte_security_capability_idx { * - Returns array of security capabilities. * - Return NULL if no capabilities available. */ -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capabilities_get(struct rte_security_ctx *instance); /** @@ -532,7 +530,7 @@ rte_security_capabilities_get(struct rte_security_ctx *instance); * index criteria. * - Return NULL if the capability not matched on security instance. */ -const struct rte_security_capability * __rte_experimental +const struct rte_security_capability * rte_security_capability_get(struct rte_security_ctx *instance, struct rte_security_capability_idx *idx); diff --git a/lib/librte_security/rte_security_driver.h b/lib/librte_security/rte_security_driver.h index 42f42ff..b627b0c 100644 --- a/lib/librte_security/rte_security_driver.h +++ b/lib/librte_security/rte_security_driver.h @@ -8,8 +8,6 @@ /** * @file rte_security_driver.h - * @b EXPERIMENTAL: this API may change without prior notice - * * RTE Security Common Definitions * */ diff --git a/lib/librte_security/rte_security_version.map b/lib/librte_security/rte_security_version.map index 5a1c8ae..6aaabe4 100644 --- a/lib/librte_security/rte_security_version.map +++ b/lib/librte_security/rte_security_version.map @@ -1,4 +1,4 @@ -EXPERIMENTAL { +DPDK_18.08 { global: rte_security_attach_session;