linux/net/tls
Jakub Kicinski 0d87bbd39d tls: strp: make sure the TCP skbs do not have overlapping data
TLS tries to get away with using the TCP input queue directly.
This does not work if there is duplicated data (multiple skbs
holding bytes for the same seq number range due to retransmits).
Check for this condition and fall back to copy mode, it should
be rare.

Fixes: 84c61fe1a7 ("tls: rx: do not use the standard strparser")
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2022-10-14 08:25:26 +01:00
..
Kconfig net/tls: Select SOCK_RX_QUEUE_MAPPING from TLS_DEVICE 2021-02-11 19:08:06 -08:00
Makefile tls: rx: async: hold onto the input skb 2022-07-18 11:24:11 +01:00
tls_device_fallback.c net/tls: Support 256 bit keys with TX device offload 2022-09-22 17:27:42 -07:00
tls_device.c net/tls: Support 256 bit keys with TX device offload 2022-09-22 17:27:42 -07:00
tls_main.c net: tls: Add ARIA-GCM algorithm 2022-09-27 17:29:09 -07:00
tls_proc.c tls: rx: add counter for NoPad violations 2022-07-11 19:48:33 -07:00
tls_strp.c tls: strp: make sure the TCP skbs do not have overlapping data 2022-10-14 08:25:26 +01:00
tls_sw.c net: tls: Add ARIA-GCM algorithm 2022-09-27 17:29:09 -07:00
tls_toe.c tls: create an internal header 2022-07-08 18:38:45 -07:00
tls.h tls: rx: do not use the standard strparser 2022-07-26 14:38:51 -07:00
trace.c net/tls: add tracing for device/offload events 2019-10-05 16:29:00 -07:00
trace.h net/tls: add device decrypted trace point 2019-10-05 16:29:00 -07:00