Lines Matching refs:prot

132 			  struct tls_prot_info *prot, struct sk_buff *skb)  in padding_length()  argument
138 if (prot->version == TLS_1_3_VERSION) { in padding_length()
144 if (back > rxm->full_len - prot->prepend_size) in padding_length()
168 struct tls_prot_info *prot; in tls_decrypt_done() local
177 prot = &tls_ctx->prot_info; in tls_decrypt_done()
190 pad = padding_length(ctx, prot, skb); in tls_decrypt_done()
196 rxm->offset += prot->prepend_size; in tls_decrypt_done()
197 rxm->full_len -= prot->overhead_size; in tls_decrypt_done()
237 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_do_decryption() local
242 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_decryption()
244 data_len + prot->tag_size, in tls_do_decryption()
282 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_trim_both_msgs() local
288 target_size += prot->overhead_size; in tls_trim_both_msgs()
305 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_clone_plaintext_msg() local
321 skip = prot->prepend_size + msg_pl->sg.size; in tls_clone_plaintext_msg()
329 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_get_rec() local
348 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size); in tls_get_rec()
352 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size); in tls_get_rec()
441 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_encrypt_done() local
453 sge->offset -= prot->prepend_size; in tls_encrypt_done()
454 sge->length += prot->prepend_size; in tls_encrypt_done()
503 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_do_encryption() local
510 switch (prot->cipher_type) { in tls_do_encryption()
522 prot->iv_size + prot->salt_size); in tls_do_encryption()
524 xor_iv_with_seq(prot, rec->iv_data + iv_offset, tls_ctx->tx.rec_seq); in tls_do_encryption()
526 sge->offset += prot->prepend_size; in tls_do_encryption()
527 sge->length -= prot->prepend_size; in tls_do_encryption()
532 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_encryption()
547 sge->offset -= prot->prepend_size; in tls_do_encryption()
548 sge->length += prot->prepend_size; in tls_do_encryption()
560 tls_advance_record_sn(sk, prot, &tls_ctx->tx); in tls_do_encryption()
686 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_push_record() local
705 prot->overhead_size > msg_en->sg.size) || in tls_push_record()
708 prot->overhead_size > msg_en->sg.size))) { in tls_push_record()
714 split_point, prot->overhead_size, in tls_push_record()
730 prot->overhead_size); in tls_push_record()
740 if (prot->version == TLS_1_3_VERSION) { in tls_push_record()
766 tls_make_aad(rec->aad_space, msg_pl->sg.size + prot->tail_size, in tls_push_record()
767 tls_ctx->tx.rec_seq, record_type, prot); in tls_push_record()
772 msg_pl->sg.size + prot->tail_size, in tls_push_record()
778 msg_pl->sg.size + prot->tail_size, i); in tls_push_record()
792 sk_msg_trim(sk, msg_en, msg_pl->sg.size + prot->overhead_size); in tls_push_record()
934 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_sw_sendmsg() local
998 prot->overhead_size; in tls_sw_sendmsg()
1066 msg_pl->sg.size + prot->overhead_size); in tls_sw_sendmsg()
1160 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_sw_do_sendpage() local
1202 required_size = msg_pl->sg.size + copy + prot->overhead_size; in tls_sw_do_sendpage()
1422 struct tls_prot_info *prot = &tls_ctx->prot_info; in decrypt_internal() local
1430 const int data_len = rxm->full_len - prot->overhead_size + in decrypt_internal()
1431 prot->tail_size; in decrypt_internal()
1439 n_sgin = skb_nsg(skb, rxm->offset + prot->prepend_size, in decrypt_internal()
1440 rxm->full_len - prot->prepend_size); in decrypt_internal()
1457 mem_size = mem_size + prot->aad_size; in decrypt_internal()
1473 iv = aad + prot->aad_size; in decrypt_internal()
1476 switch (prot->cipher_type) { in decrypt_internal()
1489 iv + iv_offset + prot->salt_size, in decrypt_internal()
1490 prot->iv_size); in decrypt_internal()
1495 if (prot->version == TLS_1_3_VERSION || in decrypt_internal()
1496 prot->cipher_type == TLS_CIPHER_CHACHA20_POLY1305) in decrypt_internal()
1500 memcpy(iv + iv_offset, tls_ctx->rx.iv, prot->salt_size); in decrypt_internal()
1502 xor_iv_with_seq(prot, iv + iv_offset, tls_ctx->rx.rec_seq); in decrypt_internal()
1505 tls_make_aad(aad, rxm->full_len - prot->overhead_size + in decrypt_internal()
1506 prot->tail_size, in decrypt_internal()
1507 tls_ctx->rx.rec_seq, ctx->control, prot); in decrypt_internal()
1511 sg_set_buf(&sgin[0], aad, prot->aad_size); in decrypt_internal()
1513 rxm->offset + prot->prepend_size, in decrypt_internal()
1514 rxm->full_len - prot->prepend_size); in decrypt_internal()
1523 sg_set_buf(&sgout[0], aad, prot->aad_size); in decrypt_internal()
1564 struct tls_prot_info *prot = &tls_ctx->prot_info; in decrypt_skb_update() local
1581 tls_advance_record_sn(sk, prot, in decrypt_skb_update()
1592 pad = padding_length(ctx, prot, skb); in decrypt_skb_update()
1597 rxm->offset += prot->prepend_size; in decrypt_skb_update()
1598 rxm->full_len -= prot->overhead_size; in decrypt_skb_update()
1599 tls_advance_record_sn(sk, prot, &tls_ctx->rx); in decrypt_skb_update()
1760 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_sw_recvmsg() local
1826 if (prot->version == TLS_1_3_VERSION) in tls_sw_recvmsg()
1834 to_decrypt = rxm->full_len - prot->overhead_size; in tls_sw_recvmsg()
1838 prot->version != TLS_1_3_VERSION && in tls_sw_recvmsg()
1858 } else if (prot->version == TLS_1_3_VERSION) { in tls_sw_recvmsg()
2085 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_read_size() local
2093 if (rxm->offset + prot->prepend_size > skb->len) in tls_read_size()
2097 if (WARN_ON(prot->prepend_size > sizeof(header))) { in tls_read_size()
2103 ret = skb_copy_bits(skb, rxm->offset, header, prot->prepend_size); in tls_read_size()
2112 cipher_overhead = prot->tag_size; in tls_read_size()
2113 if (prot->version != TLS_1_3_VERSION && in tls_read_size()
2114 prot->cipher_type != TLS_CIPHER_CHACHA20_POLY1305) in tls_read_size()
2115 cipher_overhead += prot->iv_size; in tls_read_size()
2118 prot->tail_size) { in tls_read_size()
2329 struct tls_prot_info *prot = &tls_ctx->prot_info; in tls_set_sw_offload() local
2510 prot->aad_size = TLS_HEADER_SIZE; in tls_set_sw_offload()
2511 prot->tail_size = 1; in tls_set_sw_offload()
2513 prot->aad_size = TLS_AAD_SPACE_SIZE; in tls_set_sw_offload()
2514 prot->tail_size = 0; in tls_set_sw_offload()
2517 prot->version = crypto_info->version; in tls_set_sw_offload()
2518 prot->cipher_type = crypto_info->cipher_type; in tls_set_sw_offload()
2519 prot->prepend_size = TLS_HEADER_SIZE + nonce_size; in tls_set_sw_offload()
2520 prot->tag_size = tag_size; in tls_set_sw_offload()
2521 prot->overhead_size = prot->prepend_size + in tls_set_sw_offload()
2522 prot->tag_size + prot->tail_size; in tls_set_sw_offload()
2523 prot->iv_size = iv_size; in tls_set_sw_offload()
2524 prot->salt_size = salt_size; in tls_set_sw_offload()
2531 prot->rec_seq_size = rec_seq_size; in tls_set_sw_offload()
2556 rc = crypto_aead_setauthsize(*aead, prot->tag_size); in tls_set_sw_offload()