summaryrefslogtreecommitdiff
path: root/net/tls
AgeCommit message (Expand)AuthorFilesLines
2020-01-20Merge ra.kernel.org:/pub/scm/linux/kernel/git/netdev/netDavid S. Miller2-12/+39
2020-01-16Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpfDavid S. Miller2-7/+34
2020-01-16bpf: Sockmap/tls, fix pop data with SK_DROP return codeJohn Fastabend1-4/+1
2020-01-16bpf: Sockmap/tls, skmsg can have wrapped skmsg that needs extra chainingJohn Fastabend1-0/+6
2020-01-16bpf: Sockmap/tls, tls_sw can create a plaintext buf > encrypt bufJohn Fastabend1-0/+20
2020-01-16bpf: Sockmap/tls, push write_space updates through ulp updatesJohn Fastabend1-3/+7
2020-01-10net/tls: fix async operationJakub Kicinski1-2/+2
2020-01-10net/tls: avoid spurious decryption error with HW resyncJakub Kicinski1-3/+3
2019-12-20net/tls: add helper for testing if socket is RX offloadedJakub Kicinski1-2/+3
2019-12-07net/tls: Fix return values to avoid ENOTSUPPValentin Vidic3-10/+10
2019-11-29net/tls: use sg_next() to walk sg entriesJakub Kicinski2-12/+4
2019-11-29net/tls: remove the dead inplace_crypto codeJakub Kicinski1-5/+1
2019-11-29net/tls: free the record on encryption errorJakub Kicinski1-2/+8
2019-11-29net/tls: take into account that bpf_exec_tx_verdict() may free the recordJakub Kicinski1-5/+8
2019-11-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski2-0/+12
2019-11-20net/tls: enable sk_msg redirect to tls socket egressWillem de Bruijn2-0/+12
2019-11-15net/tls: Fix unused function warningYueHaibing1-0/+2
2019-11-09Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netDavid S. Miller3-21/+21
2019-11-07net/tls: add a TX lockJakub Kicinski3-14/+15
2019-11-07net/tls: don't pay attention to sk_write_pending when pushing partial recordsJakub Kicinski2-7/+6
2019-10-07net/tls: store decrypted on a single bitJakub Kicinski1-3/+3
2019-10-07net/tls: store async_capable on a single bitJakub Kicinski1-2/+3
2019-10-07net/tls: pass context to tls_device_decrypted()Jakub Kicinski2-4/+3
2019-10-07net/tls: make allocation failure unlikelyJakub Kicinski1-3/+2
2019-10-07net/tls: mark sk->err being set as unlikelyJakub Kicinski1-1/+1
2019-10-06net/tls: add TlsDeviceRxResync statisticJakub Kicinski2-0/+2
2019-10-06net/tls: add TlsDecryptError statJakub Kicinski2-0/+6
2019-10-06net/tls: add statistics for installed sessionsJakub Kicinski2-4/+27
2019-10-06net/tls: add skeleton of MIB statisticsJakub Kicinski3-1/+75
2019-10-06net/tls: add device decrypted trace pointJakub Kicinski2-0/+38
2019-10-06net/tls: add tracing for device/offload eventsJakub Kicinski4-3/+210
2019-10-05net/tls: allow compiling TLS TOE outJakub Kicinski3-2/+16
2019-10-05net/tls: rename tls_hw_* functions tls_toe_*Jakub Kicinski2-9/+9
2019-10-05net/tls: move TOE-related code to a separate fileJakub Kicinski3-103/+143
2019-10-05net/tls: move tls_build_proto() on init pathJakub Kicinski1-5/+2
2019-10-05net/tls: rename tls_device to tls_toe_deviceJakub Kicinski1-7/+7
2019-10-05net/tls: move TOE-related structures to a separate headerJakub Kicinski1-0/+1
2019-09-07net/tls: align non temporal copy to cache linesJakub Kicinski1-5/+28
2019-09-07net/tls: remove the record tail optimizationJakub Kicinski1-20/+47
2019-09-07net/tls: use RCU for the adder to the offload record listJakub Kicinski1-8/+13
2019-09-07net/tls: unref frags in orderJakub Kicinski1-6/+3
2019-09-05net/tls: dedup the record cleanupJakub Kicinski1-5/+1
2019-09-05net/tls: clean up the number of #ifdefs for CONFIG_TLS_DEVICEJakub Kicinski2-22/+3
2019-09-05net/tls: narrow down the critical area of device_offload_lockJakub Kicinski1-24/+22
2019-09-05net/tls: don't jump to returnJakub Kicinski1-13/+13
2019-09-05net/tls: use the full sk_proto pointerJakub Kicinski1-17/+10
2019-09-01net: tls: export protocol version, cipher, tx_conf/rx_conf to socket diagDavide Caratti1-0/+64
2019-09-01net/tls: use RCU protection on icsk->icsk_ulp_dataJakub Kicinski2-8/+20
2019-08-19Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netDavid S. Miller2-2/+9
2019-08-15net: tls, fix sk_write_space NULL write when tx disabledJohn Fastabend1-1/+2