lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Apr 2022 12:19:07 -0700 From: Jakub Kicinski <kuba@...nel.org> To: davem@...emloft.net, pabeni@...hat.com Cc: netdev@...r.kernel.org, borisp@...dia.com, john.fastabend@...il.com, daniel@...earbox.net, vfedorenko@...ek.ru, Jakub Kicinski <kuba@...nel.org> Subject: [PATCH net-next 00/10] tls: rx: random refactoring part 3 TLS Rx refactoring. Part 3 of 3. This set is mostly around rx_list and async processing. The last two patches are minor optimizations. A couple of features to follow. Jakub Kicinski (10): tls: rx: consistently use unlocked accessors for rx_list tls: rx: reuse leave_on_list label for psock tls: rx: move counting TlsDecryptErrors for sync tls: rx: don't handle TLS 1.3 in the async crypto callback tls: rx: assume crypto always calls our callback tls: rx: treat process_rx_list() errors as transient tls: rx: return the already-copied data on crypto error tls: rx: use async as an in-out argument tls: rx: use MAX_IV_SIZE for allocations tls: rx: only copy IV from the packet for TLS 1.2 net/tls/tls_sw.c | 131 ++++++++++++++++++++++------------------------- 1 file changed, 60 insertions(+), 71 deletions(-) -- 2.34.1
Powered by blists - more mailing lists