summaryrefslogtreecommitdiffstats
path: root/net/tls/tls_main.c
AgeCommit message (Expand)AuthorFilesLines
2020-01-15bpf: Sockmap/tls, push write_space updates through ulp updatesJohn Fastabend1-3/+7
2019-12-06net/tls: Fix return values to avoid ENOTSUPPValentin Vidic1-2/+2
2019-11-28net/tls: use sg_next() to walk sg entriesJakub Kicinski1-11/+2
2019-11-22Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski1-0/+1
2019-11-19net/tls: enable sk_msg redirect to tls socket egressWillem de Bruijn1-0/+1
2019-11-09Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netDavid S. Miller1-0/+2
2019-11-06net/tls: add a TX lockJakub Kicinski1-0/+2
2019-10-05net/tls: add statistics for installed sessionsJakub Kicinski1-4/+19
2019-10-05net/tls: add skeleton of MIB statisticsJakub Kicinski1-0/+37
2019-10-04net/tls: allow compiling TLS TOE outJakub Kicinski1-1/+4
2019-10-04net/tls: rename tls_hw_* functions tls_toe_*Jakub Kicinski1-3/+3
2019-10-04net/tls: move TOE-related code to a separate fileJakub Kicinski1-102/+3
2019-10-04net/tls: move tls_build_proto() on init pathJakub Kicinski1-5/+2
2019-10-04net/tls: rename tls_device to tls_toe_deviceJakub Kicinski1-7/+7
2019-10-04net/tls: move TOE-related structures to a separate headerJakub Kicinski1-0/+1
2019-09-05net/tls: clean up the number of #ifdefs for CONFIG_TLS_DEVICEJakub Kicinski1-18/+1
2019-09-05net/tls: use the full sk_proto pointerJakub Kicinski1-17/+10
2019-08-31net: tls: export protocol version, cipher, tx_conf/rx_conf to socket diagDavide Caratti1-0/+64
2019-08-31net/tls: use RCU protection on icsk->icsk_ulp_dataJakub Kicinski1-7/+19
2019-08-15net: tls, fix sk_write_space NULL write when tx disabledJohn Fastabend1-1/+2
2019-08-09net/tls: swap sk_write_space on closeJakub Kicinski1-0/+1
2019-08-05net/tls: partially revert fix transition through disconnect with closeJakub Kicinski1-55/+0
2019-07-22bpf: sockmap/tls, close can race with map freeJohn Fastabend1-5/+28
2019-07-22net/tls: fix transition through disconnect with closeJohn Fastabend1-0/+55
2019-07-22net/tls: remove sock unlock/lock around strp_done()John Fastabend1-31/+30
2019-07-22net/tls: remove close callback sock unlock/lock around TX work flushJohn Fastabend1-0/+3
2019-07-22net/tls: don't call tls_sk_proto_close for hw record offloadJakub Kicinski1-4/+0
2019-07-22net/tls: don't arm strparser immediately in tls_set_sw_offload()Jakub Kicinski1-3/+5
2019-07-01net/tls: make sure offload also gets the keys wipedJakub Kicinski1-2/+2
2019-06-24net/tls: fix page double free on TX cleanupDirk van der Merwe1-1/+2
2019-04-25Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-4/+1
2019-04-20net/tls: don't leak IV and record seq when offload failsJakub Kicinski1-4/+1
2019-04-17Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-0/+24
2019-04-10net/tls: fix build without CONFIG_TLS_DEVICEJakub Kicinski1-0/+2
2019-04-10net/tls: don't leak partially sent record in device modeJakub Kicinski1-0/+22
2019-03-20net/tls: Add support of AES128-CCM based ciphersVakul Garg1-13/+18
2019-03-13net/tls: Inform user space about send buffer availabilityVakul Garg1-1/+2
2019-03-03tls: Fix write space handlingBoris Pismenny1-9/+6
2019-03-03tls: Fix tls_device handling of partial recordsBoris Pismenny1-13/+0
2019-02-19net/tls: Move protocol constants from cipher context to tls contextVakul Garg1-2/+15
2019-02-01net: tls: Add tls 1.3 supportDave Watson1-1/+2
2019-02-01net: tls: Support 256 bit keysDave Watson1-2/+31
2019-01-22net/tls: free ctx in sock destructAtul Gupta1-2/+17
2019-01-22net/tls: build_protos moved to common routineAtul Gupta1-22/+32
2018-12-20Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-nextDavid S. Miller1-2/+12
2018-12-20bpf: tls_sw, init TLS ULP removes BPF proto hooksJohn Fastabend1-2/+12
2018-12-19net/tls: allocate tls context using GFP_ATOMICGanesh Goudar1-1/+1
2018-12-14net/tls: sleeping function from invalid contextAtul Gupta1-13/+23
2018-12-14net/tls: Init routines in create_ctxAtul Gupta1-3/+3
2018-10-20ulp: remove uid and user_visible membersDaniel Borkmann1-2/+0