From patchwork Tue Aug 8 17:35:27 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Hemminger X-Patchwork-Id: 129965 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 8E2264300E; Tue, 8 Aug 2023 19:38:03 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 0A262432BA; Tue, 8 Aug 2023 19:36:04 +0200 (CEST) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mails.dpdk.org (Postfix) with ESMTP id B68BC432AE for ; Tue, 8 Aug 2023 19:35:59 +0200 (CEST) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-686b879f605so4205070b3a.1 for ; Tue, 08 Aug 2023 10:35:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20221208.gappssmtp.com; s=20221208; t=1691516158; x=1692120958; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=gJFKFBGHO9s8ps17YOhZzVWxMzHgUavVurJ+ZKKI9iE=; b=2girqE25cvLIffaGEZnMTTLlcoHKw8rqjziNc6enodxlCuUGzbBDDWodOG9mrQFaD5 Hrr0lG0TJbOexjzIXiqJoggWhyZkOAikSo/xTuuNa4CFmpKqo2cPtfEhj+87rMj3u21y 3wwUz7a/iS4M9ABRtTCqVcb7epOzWl6iNC26qUIMWfrGNSh0z02YRdWV1QP+3GDJcjZB Og2LvRLeawkQPurwWud5m4DfSQ4LIyUA5JyVrWn+IN3OECXjkSR0KNjnJxyiYh4UNhhm oXdhoPiqIvAh+omdftQael7ssFf3CY9IoIKMabMVbEh2UcGgNUUubGi+RDYnGnwICOR6 5eSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691516158; x=1692120958; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=gJFKFBGHO9s8ps17YOhZzVWxMzHgUavVurJ+ZKKI9iE=; b=UM/uK3uhDM0gJdHNZTWVpbWTRvi/iSrDlGoCARInh+zhwLCFVHk6PEzHUX4sAZ/b+0 oFFzsxLVST3uYHZEDkg+tnNBswh4tYiBG0i/SuE/Wxvb3JEgxHwGW9hhTd6YMxtvyWmC PC9Uy7UyxUSrFQjwfqJFfvKQmsKejmMoKH23WH0sEtRaHs2bG52OjbSg6Hil91qceZej gOT9rGZILYyW9GxPdVzzW8vluZFtT1qHTzfp8qjMzY/66hSefhfpHsJjRD/i+w70qzOL KMc8aGrDrRVaKj/E+ICLCxeqq0CnTXXuTfq5u0r+TfTIM38FRSuQHBUxPiumdgpI5Fyf BFgg== X-Gm-Message-State: AOJu0YxJjlJF0Fb3W6d2wavlMbbehpbRkj0AdMlcktzyNRwe3IizkB2+ k5BMRUyB9za+drA43w5CQebSpZIRA6wFmaUmfwerGw== X-Google-Smtp-Source: AGHT+IEk3TWkfhvxEiWHGj726oUSuv41SE36Q5gEIadLNEpkbqzpFejoxzhtLVs7mmForaLQtVQ5og== X-Received: by 2002:a05:6a00:1806:b0:682:4de1:adcc with SMTP id y6-20020a056a00180600b006824de1adccmr231189pfa.12.1691516158637; Tue, 08 Aug 2023 10:35:58 -0700 (PDT) Received: from hermes.local (204-195-127-207.wavecable.com. [204.195.127.207]) by smtp.gmail.com with ESMTPSA id m13-20020aa7900d000000b00682562bf479sm8328945pfo.53.2023.08.08.10.35.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Aug 2023 10:35:58 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger , Akhil Goyal Subject: [PATCH 20/20] security: remove experimental flag Date: Tue, 8 Aug 2023 10:35:27 -0700 Message-Id: <20230808173527.186042-21-stephen@networkplumber.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230808173527.186042-1-stephen@networkplumber.org> References: <20230808173527.186042-1-stephen@networkplumber.org> MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org The rte_security API's were last updated in 22.11. Therefore remove the experimental tag. Signed-off-by: Stephen Hemminger --- lib/security/rte_security.h | 35 ----------------------------------- lib/security/version.map | 17 ++++++----------- 2 files changed, 6 insertions(+), 46 deletions(-) diff --git a/lib/security/rte_security.h b/lib/security/rte_security.h index 3b2df526ba35..f70fc601a2a3 100644 --- a/lib/security/rte_security.h +++ b/lib/security/rte_security.h @@ -703,7 +703,6 @@ rte_security_session_create(struct rte_security_ctx *instance, * - On success returns 0 * - On failure returns a negative errno value. */ -__rte_experimental int rte_security_session_update(struct rte_security_ctx *instance, void *sess, @@ -739,9 +738,6 @@ int rte_security_session_destroy(struct rte_security_ctx *instance, void *sess); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Create MACsec security channel (SC). * * @param instance security instance @@ -753,15 +749,11 @@ rte_security_session_destroy(struct rte_security_ctx *instance, void *sess); * - -ENOMEM if PMD is not capable to create more SC. * - other negative value for other errors. */ -__rte_experimental int rte_security_macsec_sc_create(struct rte_security_ctx *instance, struct rte_security_macsec_sc *conf); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Destroy MACsec security channel (SC). * * @param instance security instance @@ -772,15 +764,11 @@ rte_security_macsec_sc_create(struct rte_security_ctx *instance, * - -EINVAL if sc_id is invalid or instance is NULL. * - -EBUSY if sc is being used by some session. */ -__rte_experimental int rte_security_macsec_sc_destroy(struct rte_security_ctx *instance, uint16_t sc_id, enum rte_security_macsec_direction dir); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Create MACsec security association (SA). * * @param instance security instance @@ -792,15 +780,11 @@ rte_security_macsec_sc_destroy(struct rte_security_ctx *instance, uint16_t sc_id * - -ENOMEM if PMD is not capable to create more SAs. * - other negative value for other errors. */ -__rte_experimental int rte_security_macsec_sa_create(struct rte_security_ctx *instance, struct rte_security_macsec_sa *conf); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Destroy MACsec security association (SA). * * @param instance security instance @@ -811,7 +795,6 @@ rte_security_macsec_sa_create(struct rte_security_ctx *instance, * - -EINVAL if sa_id is invalid or instance is NULL. * - -EBUSY if sa is being used by some session. */ -__rte_experimental int rte_security_macsec_sa_destroy(struct rte_security_ctx *instance, uint16_t sa_id, enum rte_security_macsec_direction dir); @@ -822,9 +805,6 @@ typedef uint64_t rte_security_dynfield_t; extern int rte_security_dynfield_offset; /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Get pointer to mbuf field for device-specific metadata. * * For performance reason, no check is done, @@ -834,7 +814,6 @@ extern int rte_security_dynfield_offset; * @param mbuf packet to access * @return pointer to mbuf field */ -__rte_experimental static inline rte_security_dynfield_t * rte_security_dynfield(struct rte_mbuf *mbuf) { @@ -844,14 +823,10 @@ rte_security_dynfield(struct rte_mbuf *mbuf) } /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Check whether the dynamic field is registered. * * @return true if rte_security_dynfield_register() has been called. */ -__rte_experimental static inline bool rte_security_dynfield_is_registered(void) { return rte_security_dynfield_offset >= 0; @@ -900,7 +875,6 @@ rte_security_session_fast_mdata_set(void *sess, uint64_t fdata) } /** Function to call PMD specific function pointer set_pkt_metadata() */ -__rte_experimental int __rte_security_set_pkt_metadata(struct rte_security_ctx *instance, void *sess, struct rte_mbuf *m, void *params); @@ -1072,16 +1046,12 @@ struct rte_security_stats { * - On success, return 0 * - On failure, a negative value */ -__rte_experimental int rte_security_session_stats_get(struct rte_security_ctx *instance, void *sess, struct rte_security_stats *stats); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Get MACsec SA statistics. * * @param instance security instance @@ -1092,16 +1062,12 @@ rte_security_session_stats_get(struct rte_security_ctx *instance, * - On success, return 0. * - On failure, a negative value. */ -__rte_experimental int rte_security_macsec_sa_stats_get(struct rte_security_ctx *instance, uint16_t sa_id, enum rte_security_macsec_direction dir, struct rte_security_macsec_sa_stats *stats); /** - * @warning - * @b EXPERIMENTAL: this API may change without prior notice - * * Get MACsec SC statistics. * * @param instance security instance @@ -1112,7 +1078,6 @@ rte_security_macsec_sa_stats_get(struct rte_security_ctx *instance, * - On success, return 0. * - On failure, a negative value. */ -__rte_experimental int rte_security_macsec_sc_stats_get(struct rte_security_ctx *instance, uint16_t sc_id, enum rte_security_macsec_direction dir, diff --git a/lib/security/version.map b/lib/security/version.map index b2097a969d1c..06eceb5c0558 100644 --- a/lib/security/version.map +++ b/lib/security/version.map @@ -1,19 +1,9 @@ DPDK_24 { global: + __rte_security_set_pkt_metadata; rte_security_capabilities_get; rte_security_capability_get; - rte_security_session_create; - rte_security_session_destroy; - rte_security_session_get_size; - - local: *; -}; - -EXPERIMENTAL { - global: - - __rte_security_set_pkt_metadata; rte_security_dynfield_offset; rte_security_macsec_sa_create; rte_security_macsec_sa_destroy; @@ -21,8 +11,13 @@ EXPERIMENTAL { rte_security_macsec_sc_create; rte_security_macsec_sc_destroy; rte_security_macsec_sc_stats_get; + rte_security_session_create; + rte_security_session_destroy; + rte_security_session_get_size; rte_security_session_stats_get; rte_security_session_update; + + local: *; }; INTERNAL {