Lines Matching defs:prot

132 			  struct tls_prot_info *prot, struct sk_buff *skb)
138 if (prot->version == TLS_1_3_VERSION) {
144 if (back > rxm->full_len - prot->prepend_size)
168 struct tls_prot_info *prot;
177 prot = &tls_ctx->prot_info;
190 pad = padding_length(ctx, prot, skb);
196 rxm->offset += prot->prepend_size;
197 rxm->full_len -= prot->overhead_size;
237 struct tls_prot_info *prot = &tls_ctx->prot_info;
242 aead_request_set_ad(aead_req, prot->aad_size);
244 data_len + prot->tag_size,
282 struct tls_prot_info *prot = &tls_ctx->prot_info;
288 target_size += prot->overhead_size;
305 struct tls_prot_info *prot = &tls_ctx->prot_info;
321 skip = prot->prepend_size + msg_pl->sg.size;
329 struct tls_prot_info *prot = &tls_ctx->prot_info;
348 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size);
352 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size);
441 struct tls_prot_info *prot = &tls_ctx->prot_info;
452 sge->offset -= prot->prepend_size;
453 sge->length += prot->prepend_size;
499 struct tls_prot_info *prot = &tls_ctx->prot_info;
506 if (prot->cipher_type == TLS_CIPHER_AES_CCM_128) {
512 prot->iv_size + prot->salt_size);
514 xor_iv_with_seq(prot->version, rec->iv_data + iv_offset, tls_ctx->tx.rec_seq);
516 sge->offset += prot->prepend_size;
517 sge->length -= prot->prepend_size;
522 aead_request_set_ad(aead_req, prot->aad_size);
537 sge->offset -= prot->prepend_size;
538 sge->length += prot->prepend_size;
550 tls_advance_record_sn(sk, prot, &tls_ctx->tx);
676 struct tls_prot_info *prot = &tls_ctx->prot_info;
695 prot->overhead_size > msg_en->sg.size) ||
698 prot->overhead_size > msg_en->sg.size))) {
704 split_point, prot->overhead_size,
720 prot->overhead_size);
730 if (prot->version == TLS_1_3_VERSION) {
756 tls_make_aad(rec->aad_space, msg_pl->sg.size + prot->tail_size,
757 tls_ctx->tx.rec_seq, prot->rec_seq_size,
758 record_type, prot->version);
763 msg_pl->sg.size + prot->tail_size,
764 record_type, prot->version);
769 msg_pl->sg.size + prot->tail_size, i);
783 sk_msg_trim(sk, msg_en, msg_pl->sg.size + prot->overhead_size);
925 struct tls_prot_info *prot = &tls_ctx->prot_info;
991 prot->overhead_size;
1059 msg_pl->sg.size + prot->overhead_size);
1153 struct tls_prot_info *prot = &tls_ctx->prot_info;
1195 required_size = msg_pl->sg.size + copy + prot->overhead_size;
1419 struct tls_prot_info *prot = &tls_ctx->prot_info;
1427 const int data_len = rxm->full_len - prot->overhead_size +
1428 prot->tail_size;
1436 n_sgin = skb_nsg(skb, rxm->offset + prot->prepend_size,
1437 rxm->full_len - prot->prepend_size);
1454 mem_size = mem_size + prot->aad_size;
1470 iv = aad + prot->aad_size;
1473 if (prot->cipher_type == TLS_CIPHER_AES_CCM_128) {
1480 iv + iv_offset + prot->salt_size,
1481 prot->iv_size);
1486 if (prot->version == TLS_1_3_VERSION)
1488 prot->iv_size + prot->salt_size);
1490 memcpy(iv + iv_offset, tls_ctx->rx.iv, prot->salt_size);
1492 xor_iv_with_seq(prot->version, iv + iv_offset, tls_ctx->rx.rec_seq);
1495 tls_make_aad(aad, rxm->full_len - prot->overhead_size +
1496 prot->tail_size,
1497 tls_ctx->rx.rec_seq, prot->rec_seq_size,
1498 ctx->control, prot->version);
1502 sg_set_buf(&sgin[0], aad, prot->aad_size);
1504 rxm->offset + prot->prepend_size,
1505 rxm->full_len - prot->prepend_size);
1514 sg_set_buf(&sgout[0], aad, prot->aad_size);
1555 struct tls_prot_info *prot = &tls_ctx->prot_info;
1572 tls_advance_record_sn(sk, prot,
1583 pad = padding_length(ctx, prot, skb);
1588 rxm->offset += prot->prepend_size;
1589 rxm->full_len -= prot->overhead_size;
1590 tls_advance_record_sn(sk, prot, &tls_ctx->rx);
1751 struct tls_prot_info *prot = &tls_ctx->prot_info;
1817 if (prot->version == TLS_1_3_VERSION)
1825 to_decrypt = rxm->full_len - prot->overhead_size;
1829 prot->version != TLS_1_3_VERSION &&
1849 } else if (prot->version == TLS_1_3_VERSION) {
2060 struct tls_prot_info *prot = &tls_ctx->prot_info;
2068 if (rxm->offset + prot->prepend_size > skb->len)
2072 if (WARN_ON(prot->prepend_size > sizeof(header))) {
2078 ret = skb_copy_bits(skb, rxm->offset, header, prot->prepend_size);
2087 cipher_overhead = prot->tag_size;
2088 if (prot->version != TLS_1_3_VERSION)
2089 cipher_overhead += prot->iv_size;
2092 prot->tail_size) {
2311 struct tls_prot_info *prot = &tls_ctx->prot_info;
2442 prot->aad_size = TLS_HEADER_SIZE;
2443 prot->tail_size = 1;
2445 prot->aad_size = TLS_AAD_SPACE_SIZE;
2446 prot->tail_size = 0;
2449 prot->version = crypto_info->version;
2450 prot->cipher_type = crypto_info->cipher_type;
2451 prot->prepend_size = TLS_HEADER_SIZE + nonce_size;
2452 prot->tag_size = tag_size;
2453 prot->overhead_size = prot->prepend_size +
2454 prot->tag_size + prot->tail_size;
2455 prot->iv_size = iv_size;
2456 prot->salt_size = salt_size;
2463 prot->rec_seq_size = rec_seq_size;
2488 rc = crypto_aead_setauthsize(*aead, prot->tag_size);