Searched hist:"541 cc48be3b141e8529fef05ad6cedbca83f9e80" (Results 1 – 3 of 3) sorted by relevance
/openbmc/linux/net/tls/ |
H A D | tls.h | diff 541cc48be3b141e8529fef05ad6cedbca83f9e80 Fri Jul 15 00:22:30 CDT 2022 Jakub Kicinski <kuba@kernel.org> tls: rx: read the input skb from ctx->recv_pkt
Callers always pass ctx->recv_pkt into decrypt_skb_update(), and it propagates it to its callees. This may give someone the false impression that those functions can accept any valid skb containing a TLS record. That's not the case, the record sequence number is read from the context, and they can only take the next record coming out of the strp.
Let the functions get the skb from the context instead of passing it in. This will also make it cleaner to return a different skb than ctx->recv_pkt as the decrypted one later on.
Since we're touching the definition of decrypt_skb_update() use this as an opportunity to rename it.
Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tls_device.c | diff 541cc48be3b141e8529fef05ad6cedbca83f9e80 Fri Jul 15 00:22:30 CDT 2022 Jakub Kicinski <kuba@kernel.org> tls: rx: read the input skb from ctx->recv_pkt
Callers always pass ctx->recv_pkt into decrypt_skb_update(), and it propagates it to its callees. This may give someone the false impression that those functions can accept any valid skb containing a TLS record. That's not the case, the record sequence number is read from the context, and they can only take the next record coming out of the strp.
Let the functions get the skb from the context instead of passing it in. This will also make it cleaner to return a different skb than ctx->recv_pkt as the decrypted one later on.
Since we're touching the definition of decrypt_skb_update() use this as an opportunity to rename it.
Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tls_sw.c | diff 541cc48be3b141e8529fef05ad6cedbca83f9e80 Fri Jul 15 00:22:30 CDT 2022 Jakub Kicinski <kuba@kernel.org> tls: rx: read the input skb from ctx->recv_pkt
Callers always pass ctx->recv_pkt into decrypt_skb_update(), and it propagates it to its callees. This may give someone the false impression that those functions can accept any valid skb containing a TLS record. That's not the case, the record sequence number is read from the context, and they can only take the next record coming out of the strp.
Let the functions get the skb from the context instead of passing it in. This will also make it cleaner to return a different skb than ctx->recv_pkt as the decrypted one later on.
Since we're touching the definition of decrypt_skb_update() use this as an opportunity to rename it.
Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
|