[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220411191917.1240155-1-kuba@kernel.org>
Date: Mon, 11 Apr 2022 12:19:07 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: davem@...emloft.net, pabeni@...hat.com
Cc: netdev@...r.kernel.org, borisp@...dia.com,
john.fastabend@...il.com, daniel@...earbox.net,
vfedorenko@...ek.ru, Jakub Kicinski <kuba@...nel.org>
Subject: [PATCH net-next 00/10] tls: rx: random refactoring part 3
TLS Rx refactoring. Part 3 of 3. This set is mostly around rx_list
and async processing. The last two patches are minor optimizations.
A couple of features to follow.
Jakub Kicinski (10):
tls: rx: consistently use unlocked accessors for rx_list
tls: rx: reuse leave_on_list label for psock
tls: rx: move counting TlsDecryptErrors for sync
tls: rx: don't handle TLS 1.3 in the async crypto callback
tls: rx: assume crypto always calls our callback
tls: rx: treat process_rx_list() errors as transient
tls: rx: return the already-copied data on crypto error
tls: rx: use async as an in-out argument
tls: rx: use MAX_IV_SIZE for allocations
tls: rx: only copy IV from the packet for TLS 1.2
net/tls/tls_sw.c | 131 ++++++++++++++++++++++-------------------------
1 file changed, 60 insertions(+), 71 deletions(-)
--
2.34.1
Powered by blists - more mailing lists