[EXT] [dpdk-dev v5] crypto/openssl: openssl 3.0 support on sym crypto routine
Ji, Kai
kai.ji at intel.com
Fri Feb 25 11:19:30 CET 2022
The warning messages are deprecated APIs warnings from openssl , not compiler warnings from gcc, the integrity of DPDK remain the same.
Alongside openssl pmd, the ccp and qat pmd also raise the same type of warnings once openssl 3.0 installed.
In the current intel roadmap, we will try to support 3.0 API fully for openssl and qat pmds by the end of year, so this patch is the first step.
I think the warning messages are safe to stay, Unfortunately the fix ccp pmd driver is out of our reach.
Regards
Kai
> -----Original Message-----
> From: Akhil Goyal <gakhil at marvell.com>
> Sent: Friday, February 25, 2022 3:56 AM
> To: Ji, Kai <kai.ji at intel.com>; dev at dpdk.org
> Cc: Zhang, Roy Fan <roy.fan.zhang at intel.com>
> Subject: RE: [EXT] [dpdk-dev v5] crypto/openssl: openssl 3.0 support on sym
> crypto routine
>
> Hi Kai,
> > Hi Akhil,
> >
> > This patch was intend to support Openssl 3.0 on symmetric crypto
> > algorithms only, where the deprecated APIs, compile warnings and
> > failing test cases were fixed.
> > All the asymmetric crypto related issues stay untreated and will be
> > fixed in the next patch.
> >
> How can one verify if the driver is openssl 3.0 compliant?
> Is there a way to bypass those warnings?
> We cannot have build with warnings or we can have something in meson.build to
> bypass those for openssl pmd.
More information about the dev
mailing list