Merge branch 'another-crack-at-a-handshake-upcall-mechanism'
authorJakub Kicinski <kuba@kernel.org>
Thu, 20 Apr 2023 01:48:50 +0000 (18:48 -0700)
committerJakub Kicinski <kuba@kernel.org>
Thu, 20 Apr 2023 01:48:50 +0000 (18:48 -0700)
commita5962e0a8b7b0da2350b4baeefaf7dfa3377bc89
tree3b7255875d4f657e0cf0e3087ecab918f3d01ba3
parentf1836a424518a09b17ee2b69e81e9477321a0aff
parent88232ec1ec5ecf4aa5de439cff3d5e2b7adcac93
Merge branch 'another-crack-at-a-handshake-upcall-mechanism'

Chuck Lever says:

====================
Another crack at a handshake upcall mechanism

Here is v10 of a series to add generic support for transport layer
security handshake on behalf of kernel socket consumers (user space
consumers use a security library directly, of course). A summary of
the purpose of these patches is archived here:

https://lore.kernel.org/netdev/1DE06BB1-6BA9-4DB4-B2AA-07DE532963D6@oracle.com/

The first patch in the series applies to the top-level .gitignore
file to address the build warnings reported a few days ago. I intend
to submit that separately. I'd like you to consider taking the rest
of this series for v6.4.

The full patch set to support SunRPC with TLSv1.3 is available in
the topic-rpc-with-tls-upcall branch here, based on net-next/main:

https://git.kernel.org/pub/scm/linux/kernel/git/cel/linux.git

This patch set includes support for in-transit confidentiality and
peer authentication for both the Linux NFS client and server.

A user space handshake agent for TLSv1.3 to go along with the kernel
patches is available in the "main" branch here:

https://github.com/oracle/ktls-utils
====================

Link: https://lore.kernel.org/r/168174169259.9520.1911007910797225963.stgit@91.116.238.104.host.secureserver.net
Signed-off-by: Jakub Kicinski <kuba@kernel.org>