[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190226121235.20784-5-borisp@mellanox.com>
Date: Tue, 26 Feb 2019 14:12:35 +0200
From: Boris Pismenny <borisp@...lanox.com>
To: aviadye@...lanox.com, davejwatson@...com, john.fastabend@...il.com,
daniel@...earbox.net, vakul.garg@....com, netdev@...r.kernel.org
Cc: eranbe@...lanox.com, borisp@...lanox.com
Subject: [PATCH net 4/4] tls: Fix tls_device receive
Currently, the receive function fails to handle records already
decrypted by the device due to the commit mentioned below.
This commit advances the TLS record sequence number and prepares the context
to handle the next record.
Fixes: fedf201e1296 ("net: tls: Refactor control message handling on recv")
Signed-off-by: Boris Pismenny <borisp@...lanox.com>
Reviewed-by: Eran Ben Elisha <eranbe@...lanox.com>
---
net/tls/tls_sw.c | 15 +++++++--------
1 file changed, 7 insertions(+), 8 deletions(-)
diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c
index f515cd7e984e..85da10182d8d 100644
--- a/net/tls/tls_sw.c
+++ b/net/tls/tls_sw.c
@@ -1481,18 +1481,17 @@ static int decrypt_skb_update(struct sock *sk, struct sk_buff *skb,
return err;
}
-
- rxm->full_len -= padding_length(ctx, tls_ctx, skb);
-
- rxm->offset += prot->prepend_size;
- rxm->full_len -= prot->overhead_size;
- tls_advance_record_sn(sk, &tls_ctx->rx, version);
- ctx->decrypted = true;
- ctx->saved_data_ready(sk);
} else {
*zc = false;
}
+ rxm->full_len -= padding_length(ctx, tls_ctx, skb);
+ rxm->offset += prot->prepend_size;
+ rxm->full_len -= prot->overhead_size;
+ tls_advance_record_sn(sk, &tls_ctx->rx, version);
+ ctx->decrypted = true;
+ ctx->saved_data_ready(sk);
+
return err;
}
--
2.12.2
Powered by blists - more mailing lists