cxgb4: fill IPsec state validation failure reasonRely on extack to return failure reason.Signed-off-by: Leon Romanovsky <leonro@nvidia.com>Signed-off-by: Jakub Kicinski <kuba@kernel.org>
xfrm: extend add state callback to set failure reasonAlmost all validation logic is in the drivers, but they aremissing reliable way to convey failure reason to userspaceapplications.Let's use
xfrm: extend add state callback to set failure reasonAlmost all validation logic is in the drivers, but they aremissing reliable way to convey failure reason to userspaceapplications.Let's use extack to return this information to users.Signed-off-by: Leon Romanovsky <leonro@nvidia.com>Signed-off-by: Jakub Kicinski <kuba@kernel.org>
show more ...
xfrm: allow state packet offload modeAllow users to configure xfrm states with packet offload mode.The packet mode must be requested both for policy and state, andsuch requires us to do not imple
xfrm: allow state packet offload modeAllow users to configure xfrm states with packet offload mode.The packet mode must be requested both for policy and state, andsuch requires us to do not implement fallback.We explicitly return an error if requested packet mode can'tbe configured.Reviewed-by: Raed Salem <raeds@nvidia.com>Signed-off-by: Leon Romanovsky <leonro@nvidia.com>Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
ch_ipsec: Remove initialization of rxq related dataRemoving initialization of nrxq and rxq_size in uld_info. Asipsec uses nic queues only, there is no need to create uldrx queues for ipsec.Sign
ch_ipsec: Remove initialization of rxq related dataRemoving initialization of nrxq and rxq_size in uld_info. Asipsec uses nic queues only, there is no need to create uldrx queues for ipsec.Signed-off-by: Ayush Sawal <ayush.sawal@chelsio.com>Link: https://lore.kernel.org/r/20210113044302.25522-1-ayush.sawal@chelsio.comSigned-off-by: Jakub Kicinski <kuba@kernel.org>
crypto: sha - split sha.h into sha1.h and sha2.hCurrently <crypto/sha.h> contains declarations for both SHA-1 and SHA-2,and <crypto/sha3.h> contains declarations for SHA-3.This organization is i
crypto: sha - split sha.h into sha1.h and sha2.hCurrently <crypto/sha.h> contains declarations for both SHA-1 and SHA-2,and <crypto/sha3.h> contains declarations for SHA-3.This organization is inconsistent, but more importantly SHA-1 is nolonger considered to be cryptographically secure. So to the extentpossible, SHA-1 shouldn't be grouped together with any of the other SHAversions, and usage of it should be phased out.Therefore, split <crypto/sha.h> into two headers <crypto/sha1.h> and<crypto/sha2.h>, and make everyone explicitly specify whether they wantthe declarations for SHA-1, SHA-2, or both.This avoids making the SHA-1 declarations visible to files that don'twant anything to do with SHA-1. It also prepares for potentially movingsha1.h into a new insecure/ or dangerous/ directory.Signed-off-by: Eric Biggers <ebiggers@google.com>Acked-by: Ard Biesheuvel <ardb@kernel.org>Acked-by: Jason A. Donenfeld <Jason@zx2c4.com>Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
cxgb4/ch_ipsec: Replace the module name to ch_ipsec from chcrThis patch changes the module name to "ch_ipsec" and prepends"ch_ipsec" string instead of "chcr" in all debug messages andfunction nam
cxgb4/ch_ipsec: Replace the module name to ch_ipsec from chcrThis patch changes the module name to "ch_ipsec" and prepends"ch_ipsec" string instead of "chcr" in all debug messages andfunction names.V1->V2:-Removed inline keyword from functions.-Removed CH_IPSEC prefix from pr_debug.-Used proper indentation for the continuation line of the functionarguments.V2->V3:Fix the checkpatch.pl warnings.Fixes: 1b77be463929 ("crypto/chcr: Moving chelsio's inline ipsec functionality to /drivers/net")Signed-off-by: Ayush Sawal <ayush.sawal@chelsio.com>Signed-off-by: Jakub Kicinski <kuba@kernel.org>
cxgb4/ch_ipsec: Registering xfrmdev_ops with cxgb4As ch_ipsec was removed without clearing xfrmdev_ops and netdevfeature(esp-hw-offload). When a recalculation of netdev feature istriggered by cha
cxgb4/ch_ipsec: Registering xfrmdev_ops with cxgb4As ch_ipsec was removed without clearing xfrmdev_ops and netdevfeature(esp-hw-offload). When a recalculation of netdev feature istriggered by changing tls feature(tls-hw-tx-offload) from userrequest, it causes a page fault due to absence of valid xfrmdev_ops.Fixes: 6dad4e8ab3ec ("chcr: Add support for Inline IPSec")Signed-off-by: Ayush Sawal <ayush.sawal@chelsio.com>Acked-by: Jakub Kicinski <kuba@kernel.org>Signed-off-by: David S. Miller <davem@davemloft.net>
crypto/chcr: Moving chelsio's inline ipsec functionality to /drivers/netThis patch seperates inline ipsec functionality from coprocessordriver chcr. Now inline ipsec is separate ULD, moved from"d
crypto/chcr: Moving chelsio's inline ipsec functionality to /drivers/netThis patch seperates inline ipsec functionality from coprocessordriver chcr. Now inline ipsec is separate ULD, moved from"drivers/crypto/chelsio/" to "drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/"Signed-off-by: Ayush Sawal <ayush.sawal@chelsio.com>Signed-off-by: Vinay Kumar Yadav <vinay.yadav@chelsio.com>Signed-off-by: David S. Miller <davem@davemloft.net>