2023-08-11, 18:43:47 -0700, Jakub Kicinski wrote: > On Wed, 9 Aug 2023 14:58:52 +0200 Sabrina Dubroca wrote: > > TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXSW); > > TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRRXSW); > > conf = TLS_SW; > > Should we add a statistic for rekeying? Hmpf, at least I shouldn't be incrementing the existing stats on every update, especially not TLSCURR* :/ I don't see much benefit in tracking succesful rekeys. Failed rekeys seem more interesting to me. What would we get from counting succesful rekeys? > > +int tls_set_sw_offload(struct sock *sk, int tx, > > + struct tls_crypto_info *new_crypto_info) > > { > > This function is already 300 LoC and we're making longer with > a not-so-pretty goto skip; > > Any way we can refactor it first? I guess all the actual init (alloc software context and set it up) could go in a separate function. I'll see if I can split a few more things out from the end of the function without making it too messy. > I think someone had a plan > to at least make the per-algo stuff less verbose? Yep, that's me. Basically, expanding the existing tls_cipher_size_desc to completely remove the switch (crypto_info->cipher_type) (from both setsockopt and getsockopt). I'll clean up and submit those changes, and then rebase the next version of this series on top. Dunno why I decided to focus on the rekey first. -- Sabrina