summaryrefslogtreecommitdiffstats
path: root/net/tls
Commit message (Expand)AuthorAgeFilesLines
...
| * net/tls: fix the IV leaksJakub Kicinski2019-04-101-1/+4
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2019-04-051-0/+2
|\|
| * net: tls: prevent false connection termination with offloadJakub Kicinski2019-03-291-0/+2
* | net/tls: Replace kfree_skb() with consume_skb()Vakul Garg2019-03-211-3/+3
* | net/tls: Add support of AES128-CCM based ciphersVakul Garg2019-03-202-29/+69
|/
* net/tls: Inform user space about send buffer availabilityVakul Garg2019-03-132-4/+2
* tls: Fix tls_device receiveBoris Pismenny2019-03-031-11/+14
* tls: Fix mixing between async capable and asyncEran Ben Elisha2019-03-031-6/+9
* tls: Fix write space handlingBoris Pismenny2019-03-033-9/+36
* tls: Fix tls_device handling of partial recordsBoris Pismenny2019-03-032-17/+5
* tls: Return type of non-data records retrieved using MSG_PEEK in recvmsgVakul Garg2019-02-241-11/+67
* net/tls: Move protocol constants from cipher context to tls contextVakul Garg2019-02-193-93/+120
* net/tls: Do not use async crypto for non-data recordsVakul Garg2019-02-121-6/+12
* net/tls: Disable async decrytion for tls1.3Vakul Garg2019-02-091-2/+6
* net: tls: Set async_capable for tls zerocopy only if we see EINPROGRESSDave Watson2019-02-011-2/+2
* net: tls: Add tls 1.3 supportDave Watson2019-02-014-26/+101
* net: tls: Refactor control message handling on recvDave Watson2019-02-011-44/+44
* net: tls: Refactor tls aad space size calculationDave Watson2019-02-011-8/+9
* net: tls: Support 256 bit keysDave Watson2019-02-012-6/+56
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2019-01-291-1/+5
|\
| * net: tls: Fix deadlock in free_resources txDave Watson2019-01-281-0/+2
| * net: tls: Save iv in tls_rec for async crypto requestsDave Watson2019-01-281-1/+3
* | net/tls: free ctx in sock destructAtul Gupta2019-01-221-2/+17
* | net/tls: build_protos moved to common routineAtul Gupta2019-01-221-22/+32
* | tls: Fix recvmsg() to be able to peek across multiple recordsVakul Garg2019-01-171-70/+196
* | net/tls: Make function tls_sw_do_sendpage staticYueHaibing2019-01-171-2/+2
* | net/tls: remove unused function tls_sw_sendpage_lockedYueHaibing2019-01-171-10/+0
|/
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2018-12-211-4/+6
|\
| * tls: Do not call sk_memcopy_from_iter with zero lengthVakul Garg2018-12-211-4/+6
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-nextDavid S. Miller2018-12-202-15/+42
|\ \
| * | bpf: tls_sw, init TLS ULP removes BPF proto hooksJohn Fastabend2018-12-201-2/+12
| * | bpf: sk_msg, sock{map|hash} redirect through ULPJohn Fastabend2018-12-201-13/+30
* | | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2018-12-201-17/+27
|\ \ \ | |/ / |/| / | |/
| * net/tls: allocate tls context using GFP_ATOMICGanesh Goudar2018-12-191-1/+1
| * net/tls: sleeping function from invalid contextAtul Gupta2018-12-141-13/+23
| * net/tls: Init routines in create_ctxAtul Gupta2018-12-141-3/+3
* | bpf: helper to pop data from messagesJohn Fastabend2018-11-281-2/+9
|/
* Merge branch 'work.afs' of git://git.kernel.org/pub/scm/linux/kernel/git/viro...Linus Torvalds2018-11-012-4/+4
|\
| * iov_iter: Separate type from direction and use accessor functionsDavid Howells2018-10-241-2/+2
| * iov_iter: Use accessor functionDavid Howells2018-10-241-2/+2
* | ulp: remove uid and user_visible membersDaniel Borkmann2018-10-201-2/+0
* | bpf: sockmap, support for msg_peek in sk_msg with redirect ingressJohn Fastabend2018-10-171-1/+2
|/
* tls: add bpf support to sk_msg handlingJohn Fastabend2018-10-151-64/+375
* tls: replace poll implementation with read hookJohn Fastabend2018-10-152-18/+9
* tls: convert to generic sk_msg interfaceDaniel Borkmann2018-10-153-328/+186
* tls: Add support for inplace records encryptionVakul Garg2018-10-021-18/+73
* tls: Remove redundant vars from tls record structureVakul Garg2018-09-291-49/+43
* net/tls: Make function get_rec() staticWei Yongjun2018-09-281-1/+1
* tls: Fixed a memory leak during socket closeVakul Garg2018-09-251-2/+4
* tls: Fix socket mem accounting error under async encryptionVakul Garg2018-09-251-5/+16