From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4AA8F38B121 for ; Tue, 31 Mar 2026 22:59:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774997941; cv=none; b=CoSMLxgnrD3OFnsoReiFnb8ayoQSxOUAbe31qisvdxS+5xW2bPRP2Ze84GMVcKajd9sgXV8mG4xpIMm6xyGIGa6FlumuLcmsWXVzVTyTcIP+LK+6gQ8GfowSeKsHZz4BuVps/raW1NS+WK1m18mXwqnCgN3yArVTg5ft5aanhtg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774997941; c=relaxed/simple; bh=F+Y1E3fP/RX+swrmXCMg3wHiakr00zQLw0jlgEEurzs=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=id33wtV83gYdS2XGp2v8g4zjqW17BgkAOfFALc8O+NyB/7fn8idFzlF7YkD40Py2S6Z+euOvyupt9M80M0FZjUbqnp7oqEpdOLzrNnlhvZFgjU/AAsN0bcI/dKJv3rJniEZ5mlIvJ9JDnVO2X/Vn7+xxS+ulaHg3FWQhZizz5FM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=gP10JjJz; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="gP10JjJz" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9B0C6C19423; Tue, 31 Mar 2026 22:59:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1774997941; bh=F+Y1E3fP/RX+swrmXCMg3wHiakr00zQLw0jlgEEurzs=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=gP10JjJz9XUyc76y5p8X4lZ4EoDux/6hXjQ1k+HaKFeJ9m1g/4SmY097ptk0+rfNL wnlOaNkpw9taoYqUjRrVupa8QGnOz5kVMbM8eMqBmkcXD/FkxmwqaVMSP8tW+f1JM3 +XNuRXL22WJyHKMMMm1WVsZ6xI2zYy54j6te+yVrTrY526TOGeRC17TNZANFmB8uxX lTXg747t/Q392ezrj7V3Uad72ubGLhVGdUsUeqTGc0jtd58vfSlqZWVBEyby/ixwsN jvyVcXMcA4Ga2ZCaIleihaomj3LUgueKCskhUxYsPNER1UNSyzuVOr6Vm1LtPIEvHz lhO5MYLeYZglw== Date: Tue, 31 Mar 2026 15:58:59 -0700 From: Jakub Kicinski To: Rishikesh Jethwani Cc: netdev@vger.kernel.org, saeedm@nvidia.com, tariqt@nvidia.com, mbloch@nvidia.com, borisp@nvidia.com, john.fastabend@gmail.com, sd@queasysnail.net, davem@davemloft.net, pabeni@redhat.com, edumazet@google.com, leon@kernel.org Subject: Re: [PATCH net-next v11 0/6] tls: Add TLS 1.3 hardware offload support Message-ID: <20260331155859.1f34ef38@kernel.org> In-Reply-To: <20260331163757.149343-1-rjethwani@purestorage.com> References: <20260331163757.149343-1-rjethwani@purestorage.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Tue, 31 Mar 2026 10:37:51 -0600 Rishikesh Jethwani wrote: > Changes in v11: > - tls_device_complete_rekey(): flush pending open_rec (from MSG_MORE) > via tls_sw_push_pending_record() before switching back to HW offload. > Without this, data in an open SW record would be silently lost when > the AEAD cipher is freed. > - Selftest: enforce MIN_BUF_SIZE (16 bytes) on both client and server > receive buffers to prevent KeyUpdate handshake message truncation > with small -b values. Not more than 1 version in a 24h period, please. No matter how trivial the reason. https://www.kernel.org/doc/html/next/process/maintainer-netdev.html -- pv-bot: 24h