Add basic infrastructure to allocate and free kTLS context IDs (KIDs) to support kTLS TX offload. To offload a connection in .tls_dev_add(), the first step is to allocate a KID. After that the kTLS offload command is sent to the HW via MPC using the function bnxt_xmit_crypto_cmd() introduced in the last patch. In .tls_dev_del(), we send the delete command to the HW using the same bnxt_xmit_crypto_cmd(). After that we free the KID, making it available for new offload. bnxt_ktls_init() assigns bnxt_ktls_ops to the netdev and sets up the TLS TX offload feature. bnxt_ktls_init() will be called in the next patch. Reviewed-by: Andy Gospodarek Reviewed-by: Pavan Chebbi Signed-off-by: Michael Chan --- v2: Fix unused variable warning Fix error recovery issues v1: https://lore.kernel.org/netdev/20260504235836.3019499-13-michael.chan@broadcom.com/ --- drivers/net/ethernet/broadcom/bnxt/Makefile | 2 +- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 6 +- drivers/net/ethernet/broadcom/bnxt/bnxt.h | 1 + .../net/ethernet/broadcom/bnxt/bnxt_crypto.c | 65 ++++ .../net/ethernet/broadcom/bnxt/bnxt_crypto.h | 13 +- .../net/ethernet/broadcom/bnxt/bnxt_ktls.c | 289 ++++++++++++++++++ .../net/ethernet/broadcom/bnxt/bnxt_ktls.h | 90 ++++++ 7 files changed, 463 insertions(+), 3 deletions(-) create mode 100644 drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.c create mode 100644 drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.h diff --git a/drivers/net/ethernet/broadcom/bnxt/Makefile b/drivers/net/ethernet/broadcom/bnxt/Makefile index 3acdb81fa958..88e68248aad4 100644 --- a/drivers/net/ethernet/broadcom/bnxt/Makefile +++ b/drivers/net/ethernet/broadcom/bnxt/Makefile @@ -5,4 +5,4 @@ bnxt_en-y := bnxt.o bnxt_hwrm.o bnxt_sriov.o bnxt_ethtool.o bnxt_dcb.o bnxt_ulp. bnxt_en-$(CONFIG_BNXT_FLOWER_OFFLOAD) += bnxt_tc.o bnxt_en-$(CONFIG_DEBUG_FS) += bnxt_debugfs.o bnxt_en-$(CONFIG_BNXT_HWMON) += bnxt_hwmon.o -bnxt_en-$(CONFIG_BNXT_TLS) += bnxt_mpc.o bnxt_crypto.o +bnxt_en-$(CONFIG_BNXT_TLS) += bnxt_mpc.o bnxt_crypto.o bnxt_ktls.o diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt.c b/drivers/net/ethernet/broadcom/bnxt/bnxt.c index 74935b119569..e26980814fe7 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt.c +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt.c @@ -78,6 +78,7 @@ #include #include "bnxt_mpc.h" #include "bnxt_crypto.h" +#include "bnxt_ktls.h" #define BNXT_TX_TIMEOUT (5 * HZ) #define BNXT_DEF_MSG_ENABLE (NETIF_MSG_DRV | NETIF_MSG_HW | \ @@ -13411,7 +13412,8 @@ static int bnxt_open(struct net_device *dev) static bool bnxt_drv_busy(struct bnxt *bp) { return (test_bit(BNXT_STATE_IN_SP_TASK, &bp->state) || - test_bit(BNXT_STATE_READ_STATS, &bp->state)); + test_bit(BNXT_STATE_READ_STATS, &bp->state) || + bnxt_ktls_busy(bp)); } static void bnxt_get_ring_stats(struct bnxt *bp, @@ -13491,6 +13493,7 @@ static int bnxt_close(struct net_device *dev) { struct bnxt *bp = netdev_priv(dev); + bnxt_crypto_del_all(bp); bnxt_close_nic(bp, true, true); bnxt_hwrm_shutdown_link(bp); bnxt_hwrm_if_change(bp, false); @@ -14567,6 +14570,7 @@ static void bnxt_fw_reset_close(struct bnxt *bp) bp->fw_reset_min_dsecs = 0; bnxt_fw_fatal_close(bp); } + bnxt_crypto_del_all(bp); __bnxt_close_nic(bp, true, false); bnxt_vf_reps_free(bp); bnxt_clear_int_mode(bp); diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt.h b/drivers/net/ethernet/broadcom/bnxt/bnxt.h index fc9fec10e753..a947b9420a7a 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt.h +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt.h @@ -2474,6 +2474,7 @@ struct bnxt { struct bnxt_mpc_info *mpc_info; struct bnxt_crypto_info *crypto_info; + struct bnxt_tls_info *ktls_info; unsigned int current_interval; #define BNXT_TIMER_INTERVAL HZ diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.c b/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.c index 2cacce28676d..6e424eb80630 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.c +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.c @@ -11,6 +11,7 @@ #include "bnxt.h" #include "bnxt_hwrm.h" #include "bnxt_mpc.h" +#include "bnxt_ktls.h" #include "bnxt_crypto.h" static u32 bnxt_get_max_crypto_key_ctx(struct bnxt *bp, int key_type) @@ -78,6 +79,8 @@ void bnxt_alloc_crypto_info(struct bnxt *bp, bp->crypto_info = crypto; } crypto->max_key_ctxs_alloc = max_keys; + if (!bp->ktls_info) + bnxt_alloc_ktls_info(bp); return; alloc_err: @@ -85,6 +88,67 @@ void bnxt_alloc_crypto_info(struct bnxt *bp, bp->crypto_info = NULL; } +int bnxt_crypto_del(struct bnxt *bp, u8 type, u8 kind, u32 kid) +{ + struct bnxt_tx_ring_info *txr; + struct ce_delete_cmd cmd = {}; + u32 data; + + if (test_bit(BNXT_STATE_IN_FW_RESET, &bp->state) && + test_bit(BNXT_STATE_FW_FATAL_COND, &bp->state)) + return 0; + + txr = bnxt_select_mpc_ring(bp, type); + if (!txr) + return -ENODEV; + if (kind == BNXT_CTX_KIND_CK_TX) + data = CE_DELETE_CMD_CTX_KIND_CK_TX; + else if (kind == BNXT_CTX_KIND_CK_RX) + data = CE_DELETE_CMD_CTX_KIND_CK_RX; + else + return -EINVAL; + + data |= CE_DELETE_CMD_OPCODE_DEL | + (BNXT_KID_HW(kid) << CE_DELETE_CMD_KID_SFT); + + cmd.ctx_kind_kid_opcode = cpu_to_le32(data); + return bnxt_xmit_crypto_cmd(bp, txr, &cmd, sizeof(cmd), + BNXT_MPC_TMO_MSECS); +} + +static void bnxt_crypto_del_all_kids(struct bnxt *bp, struct bnxt_kid_info *kid) +{ + int i, rc; + + for (i = 0; i < kid->count; i++) { + if (!test_bit(i, kid->ids)) { + rc = bnxt_crypto_del(bp, kid->type, kid->kind, + kid->start_id + i); + if (!rc) + set_bit(i, kid->ids); + } + } +} + +void bnxt_crypto_del_all(struct bnxt *bp) +{ + struct bnxt_crypto_info *crypto = bp->crypto_info; + struct bnxt_kid_info *kid; + struct bnxt_kctx *kctx; + int i; + + if (!crypto) + return; + + /* Shutting down, no need to protect the lists. */ + for (i = 0; i < BNXT_MAX_CRYPTO_KEY_TYPE; i++) { + kctx = &crypto->kctx[i]; + list_for_each_entry(kid, &kctx->list, list) + bnxt_crypto_del_all_kids(bp, kid); + kctx->epoch++; + } +} + /** * bnxt_clear_crypto - Clear all crypto key contexts * @bp: pointer to bnxt device @@ -132,6 +196,7 @@ void bnxt_free_crypto_info(struct bnxt *bp) { struct bnxt_crypto_info *crypto = bp->crypto_info; + bnxt_free_ktls_info(bp); if (!crypto) return; bnxt_clear_crypto(bp); diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.h b/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.h index 58e52516d932..232577a12169 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.h +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_crypto.h @@ -40,7 +40,7 @@ struct bnxt_kctx { wait_queue_head_t alloc_pending_wq; }; -#define BNXT_KID_HW_MASK 0xffffff +#define BNXT_KID_HW_MASK 0x0fffff #define BNXT_KID_HW(kid) ((kid) & BNXT_KID_HW_MASK) #define BNXT_KID_EPOCH_MASK 0xff000000 #define BNXT_KID_EPOCH_SHIFT 24 @@ -141,6 +141,8 @@ struct bnxt_crypto_cmd_ctx { #ifdef CONFIG_BNXT_TLS void bnxt_alloc_crypto_info(struct bnxt *bp, struct hwrm_func_qcaps_output *resp); +int bnxt_crypto_del(struct bnxt *bp, u8 type, u8 kind, u32 kid); +void bnxt_crypto_del_all(struct bnxt *bp); void bnxt_clear_crypto(struct bnxt *bp); void bnxt_free_crypto_info(struct bnxt *bp); void bnxt_hwrm_reserve_pf_key_ctxs(struct bnxt *bp, @@ -160,6 +162,15 @@ static inline void bnxt_alloc_crypto_info(struct bnxt *bp, { } +static inline int bnxt_crypto_del(struct bnxt *bp, u8 type, u8 kind, u32 kid) +{ + return -EOPNOTSUPP; +} + +static inline void bnxt_crypto_del_all(struct bnxt *bp) +{ +} + static inline void bnxt_clear_crypto(struct bnxt *bp) { } diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.c b/drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.c new file mode 100644 index 000000000000..ac5d927ded1c --- /dev/null +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.c @@ -0,0 +1,289 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* Copyright (c) 2026 Broadcom Inc. */ + +#include +#include + +#include "bnxt.h" +#include "bnxt_mpc.h" +#include "bnxt_crypto.h" +#include "bnxt_ktls.h" + +/** + * bnxt_alloc_ktls_info - Allocate and initialize kTLS offload context + * @bp: pointer to bnxt device + * + * Allocates the main kTLS crypto info structure + * + * This function is called during device initialization when firmware + * reports kTLS offload capability. If allocation fails, kTLS offload + * will not be available but the device will still function. + * + * Context: Process context + * + * Return: zero on success, negative error code otherwise: + * ENOMEM: out of memory + */ +int bnxt_alloc_ktls_info(struct bnxt *bp) +{ + struct bnxt_tls_info *ktls = bp->ktls_info; + + if (BNXT_VF(bp)) + return -EOPNOTSUPP; + if (ktls) + return 0; + + ktls = kzalloc_obj(*ktls); + if (!ktls) { + netdev_warn(bp->dev, "Unable to allocate kTLS info\n"); + return -ENOMEM; + } + ktls->counters = kzalloc_objs(*ktls->counters, + BNXT_KTLS_MAX_CTRL_COUNTERS); + if (!ktls->counters) + goto ktls_err; + + bp->ktls_info = ktls; + return 0; + +ktls_err: + kfree(ktls->counters); + kfree(ktls); + return -ENOMEM; +} + +/** + * bnxt_free_ktls_info - Free kTLS crypto offload resources + * @bp: pointer to bnxt device + * + * Frees all resources associated with kTLS crypto offload + * + * Context: Process context during device shutdown/removal + */ +void bnxt_free_ktls_info(struct bnxt *bp) +{ + struct bnxt_tls_info *ktls = bp->ktls_info; + + if (!ktls) + return; + kfree(ktls->counters); + kfree(ktls); + bp->ktls_info = NULL; +} + +/* Copy in reverse byte order */ +static void bnxt_copy_tls_mp_data(u8 *dst, u8 *src, int bytes) +{ + int i; + + for (i = 0; i < bytes; i++) + dst[bytes - i - 1] = src[i]; +} + +static int bnxt_crypto_add(struct bnxt *bp, enum tls_offload_ctx_dir direction, + struct tls_crypto_info *crypto_info, u32 tcp_seq_no, + u32 kid) +{ + struct bnxt_tx_ring_info *txr; + struct ce_add_cmd cmd = {0}; + u32 data; + + if (direction == TLS_OFFLOAD_CTX_DIR_TX) { + txr = bnxt_select_mpc_ring(bp, BNXT_MPC_TCE_TYPE); + cmd.ctx_kind = CE_ADD_CMD_CTX_KIND_CK_TX; + } else { + return -EOPNOTSUPP; + } + if (!txr) + return -ENODEV; + + data = CE_ADD_CMD_OPCODE_ADD | (BNXT_KID_HW(kid) << CE_ADD_CMD_KID_SFT); + switch (crypto_info->cipher_type) { + case TLS_CIPHER_AES_GCM_128: { + struct tls12_crypto_info_aes_gcm_128 *aes; + + aes = (void *)crypto_info; + data |= CE_ADD_CMD_ALGORITHM_AES_GCM_128; + if (crypto_info->version == TLS_1_3_VERSION) + data |= CE_ADD_CMD_VERSION_TLS1_3; + memcpy(&cmd.session_key, aes->key, sizeof(aes->key)); + memcpy(&cmd.salt, aes->salt, sizeof(aes->salt)); + memcpy(&cmd.addl_iv, aes->iv, sizeof(aes->iv)); + bnxt_copy_tls_mp_data(cmd.record_seq_num, aes->rec_seq, + sizeof(aes->rec_seq)); + break; + } + case TLS_CIPHER_AES_GCM_256: { + struct tls12_crypto_info_aes_gcm_256 *aes; + + aes = (void *)crypto_info; + data |= CE_ADD_CMD_ALGORITHM_AES_GCM_256; + if (crypto_info->version == TLS_1_3_VERSION) + data |= CE_ADD_CMD_VERSION_TLS1_3; + memcpy(&cmd.session_key, aes->key, sizeof(aes->key)); + memcpy(&cmd.salt, aes->salt, sizeof(aes->salt)); + memcpy(&cmd.addl_iv, aes->iv, sizeof(aes->iv)); + bnxt_copy_tls_mp_data(cmd.record_seq_num, aes->rec_seq, + sizeof(aes->rec_seq)); + break; + } + default: + return -EOPNOTSUPP; + } + cmd.ver_algo_kid_opcode = cpu_to_le32(data); + cmd.pkt_tcp_seq_num = cpu_to_le32(tcp_seq_no); + cmd.tls_header_tcp_seq_num = cmd.pkt_tcp_seq_num; + return bnxt_xmit_crypto_cmd(bp, txr, &cmd, sizeof(cmd), + BNXT_MPC_TMO_MSECS); +} + +static bool bnxt_ktls_cipher_supported(struct bnxt *bp, + struct tls_crypto_info *crypto_info) +{ + u16 type = crypto_info->cipher_type; + u16 version = crypto_info->version; + + if ((type == TLS_CIPHER_AES_GCM_128 || + type == TLS_CIPHER_AES_GCM_256) && + (version == TLS_1_2_VERSION || + version == TLS_1_3_VERSION)) + return true; + return false; +} + +static int bnxt_ktls_dev_add(struct net_device *dev, struct sock *sk, + enum tls_offload_ctx_dir direction, + struct tls_crypto_info *crypto_info, + u32 start_offload_tcp_sn) +{ + struct bnxt_ktls_offload_ctx_tx *kctx_tx; + struct bnxt *bp = netdev_priv(dev); + struct bnxt_crypto_info *crypto; + struct tls_context *tls_ctx; + struct bnxt_tls_info *ktls; + struct bnxt_kctx *kctx; + u32 kid; + int rc; + + BUILD_BUG_ON(sizeof(struct bnxt_ktls_offload_ctx_tx) > + TLS_DRIVER_STATE_SIZE_TX); + + ktls = bp->ktls_info; + if (direction == TLS_OFFLOAD_CTX_DIR_RX) + return -EOPNOTSUPP; + + if (!bnxt_ktls_cipher_supported(bp, crypto_info)) { + atomic64_inc(&ktls->counters[BNXT_KTLS_ERR_INVALID_CIPHER]); + return -EOPNOTSUPP; + } + + atomic_inc(&ktls->pending); + /* Make sure bnxt_close_nic() sees pending before we check the + * BNXT_STATE_OPEN flag. + */ + smp_mb__after_atomic(); + if (!test_bit(BNXT_STATE_OPEN, &bp->state)) { + atomic64_inc(&ktls->counters[BNXT_KTLS_ERR_STATE_NOT_OPEN]); + rc = -ENODEV; + goto exit; + } + + crypto = bp->crypto_info; + tls_ctx = tls_get_ctx(sk); + kctx_tx = __tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_TX); + kctx = &crypto->kctx[BNXT_TX_CRYPTO_KEY_TYPE]; + rc = bnxt_key_ctx_alloc_one(bp, kctx, BNXT_CTX_KIND_CK_TX, &kid); + if (rc) { + atomic64_inc(&ktls->counters[BNXT_KTLS_ERR_KEY_CTX_ALLOC]); + goto exit; + } + rc = bnxt_crypto_add(bp, direction, crypto_info, start_offload_tcp_sn, + kid); + if (rc) { + atomic64_inc(&ktls->counters[BNXT_KTLS_ERR_CRYPTO_CMD]); + goto free_kctx; + } + kctx_tx->kid = kid; + kctx_tx->tcp_seq_no = start_offload_tcp_sn; + atomic64_inc(&ktls->counters[BNXT_KTLS_TX_ADD]); +free_kctx: + if (rc) + bnxt_free_one_kctx(kctx, kid); +exit: + atomic_dec(&ktls->pending); + return rc; +} + +#define KTLS_RETRY_MAX 100 + +static void bnxt_ktls_dev_del(struct net_device *dev, + struct tls_context *tls_ctx, + enum tls_offload_ctx_dir direction) +{ + struct bnxt_ktls_offload_ctx_tx *kctx_tx; + struct bnxt *bp = netdev_priv(dev); + struct bnxt_crypto_info *crypto; + struct bnxt_tls_info *ktls; + struct bnxt_kctx *kctx; + int retry_cnt = 0; + u8 kind; + u32 kid; + + ktls = bp->ktls_info; +retry: + while (!test_bit(BNXT_STATE_OPEN, &bp->state)) { + if (!netif_running(dev)) + return; + /* Prevent infinite loop if device is down but netif_running() + * returns true. + */ + if (retry_cnt > KTLS_RETRY_MAX) { + atomic64_inc(&ktls->counters[BNXT_KTLS_ERR_RETRY_EXCEEDED]); + netdev_warn(dev, "%s retry max %d exceeded, state %lx\n", + __func__, retry_cnt, bp->state); + return; + } + retry_cnt++; + msleep(100); + } + atomic_inc(&ktls->pending); + /* Make sure bnxt_close_nic() sees pending before we check the + * BNXT_STATE_OPEN flag. + */ + smp_mb__after_atomic(); + if (!test_bit(BNXT_STATE_OPEN, &bp->state)) { + atomic_dec(&ktls->pending); + goto retry; + } + + crypto = bp->crypto_info; + kctx_tx = __tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_TX); + kid = kctx_tx->kid; + kctx = &crypto->kctx[BNXT_TX_CRYPTO_KEY_TYPE]; + kind = BNXT_CTX_KIND_CK_TX; + atomic64_inc(&ktls->counters[BNXT_KTLS_TX_DEL]); + if (bnxt_kid_valid(kctx, kid) && + !bnxt_crypto_del(bp, kctx->type, kind, kid)) + bnxt_free_one_kctx(kctx, kid); + + atomic_dec(&ktls->pending); +} + +static const struct tlsdev_ops bnxt_ktls_ops = { + .tls_dev_add = bnxt_ktls_dev_add, + .tls_dev_del = bnxt_ktls_dev_del, +}; + +int bnxt_ktls_init(struct bnxt *bp) +{ + struct bnxt_tls_info *ktls = bp->ktls_info; + struct net_device *dev = bp->dev; + + if (!ktls) + return 0; + + dev->tlsdev_ops = &bnxt_ktls_ops; + dev->hw_features |= NETIF_F_HW_TLS_TX; + dev->features |= NETIF_F_HW_TLS_TX; + return 0; +} diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.h b/drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.h new file mode 100644 index 000000000000..6b8a1b1eeb24 --- /dev/null +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_ktls.h @@ -0,0 +1,90 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* Copyright (c) 2026 Broadcom Inc. */ + +#ifndef BNXT_KTLS_H +#define BNXT_KTLS_H + +/* Control plane counters */ +enum bnxt_ktls_ctrl_counters { + BNXT_KTLS_TX_ADD = 0, + BNXT_KTLS_TX_DEL, + + /* Error counters for debugging */ + BNXT_KTLS_ERR_NO_MEM, /* Memory allocation failure */ + BNXT_KTLS_ERR_KEY_CTX_ALLOC, /* Key context alloc failure */ + BNXT_KTLS_ERR_CRYPTO_CMD, /* Crypto command failure */ + BNXT_KTLS_ERR_DEVICE_BUSY, /* Device not ready */ + BNXT_KTLS_ERR_INVALID_CIPHER, /* Unsupported cipher */ + BNXT_KTLS_ERR_STATE_NOT_OPEN, /* Device not open */ + BNXT_KTLS_ERR_RETRY_EXCEEDED, /* Retry limit exceeded */ + + BNXT_KTLS_MAX_CTRL_COUNTERS, +}; + +struct bnxt_tls_info { + atomic_t pending; + + /* Atomic counters for control path */ + atomic64_t *counters; +}; + +struct bnxt_ktls_offload_ctx_tx { + u32 tcp_seq_no; + u32 kid; +}; + +struct ce_add_cmd { + __le32 ver_algo_kid_opcode; + #define CE_ADD_CMD_OPCODE_MASK 0xfUL + #define CE_ADD_CMD_OPCODE_SFT 0 + #define CE_ADD_CMD_OPCODE_ADD 0x1UL + #define CE_ADD_CMD_KID_MASK 0xfffff0UL + #define CE_ADD_CMD_KID_SFT 4 + #define CE_ADD_CMD_ALGORITHM_MASK 0xf000000UL + #define CE_ADD_CMD_ALGORITHM_SFT 24 + #define CE_ADD_CMD_ALGORITHM_AES_GCM_128 0x1000000UL + #define CE_ADD_CMD_ALGORITHM_AES_GCM_256 0x2000000UL + #define CE_ADD_CMD_VERSION_MASK 0xf0000000UL + #define CE_ADD_CMD_VERSION_SFT 28 + #define CE_ADD_CMD_VERSION_TLS1_2 (0x0UL << 28) + #define CE_ADD_CMD_VERSION_TLS1_3 (0x1UL << 28) + u8 ctx_kind; + #define CE_ADD_CMD_CTX_KIND_MASK 0x1fUL + #define CE_ADD_CMD_CTX_KIND_SFT 0 + #define CE_ADD_CMD_CTX_KIND_CK_TX 0x11UL + #define CE_ADD_CMD_CTX_KIND_CK_RX 0x12UL + u8 unused0[3]; + u8 salt[4]; + u8 unused1[4]; + __le32 pkt_tcp_seq_num; + __le32 tls_header_tcp_seq_num; + u8 record_seq_num[8]; + u8 session_key[32]; + u8 addl_iv[8]; +}; + +static inline bool bnxt_ktls_busy(struct bnxt *bp) +{ + return bp->ktls_info && atomic_read(&bp->ktls_info->pending) > 0; +} + +#ifdef CONFIG_BNXT_TLS +int bnxt_alloc_ktls_info(struct bnxt *bp); +void bnxt_free_ktls_info(struct bnxt *bp); +int bnxt_ktls_init(struct bnxt *bp); +#else +static inline int bnxt_alloc_ktls_info(struct bnxt *bp) +{ + return -EOPNOTSUPP; +} + +static inline void bnxt_free_ktls_info(struct bnxt *bp) +{ +} + +static inline int bnxt_ktls_init(struct bnxt *bp) +{ + return -EOPNOTSUPP; +} +#endif /* CONFIG_BNXT_TLS */ +#endif /* BNXT_KTLS_H */ -- 2.51.0