Lines Matching refs:msg_pl
308 struct sk_msg *msg_pl = &rec->msg_plaintext;
316 len = required - msg_pl->sg.size;
321 skip = prot->prepend_size + msg_pl->sg.size;
323 return sk_msg_clone(sk, msg_pl, msg_en, skip, len);
331 struct sk_msg *msg_pl, *msg_en;
341 msg_pl = &rec->msg_plaintext;
344 sk_msg_init(msg_pl);
680 struct sk_msg *msg_pl, *msg_en;
688 msg_pl = &rec->msg_plaintext;
691 split_point = msg_pl->apply_bytes;
692 split = split_point && split_point < msg_pl->sg.size;
694 msg_pl->sg.size +
703 rc = tls_split_open_record(sk, rec, &tmp, msg_pl, msg_en,
713 if (!msg_pl->sg.size) {
715 msg_pl = &rec->msg_plaintext;
719 sk_msg_trim(sk, msg_en, msg_pl->sg.size +
726 i = msg_pl->sg.end;
734 sg_chain(msg_pl->sg.data, msg_pl->sg.end + 1,
737 sg_mark_end(sk_msg_elem(msg_pl, i));
740 if (msg_pl->sg.end < msg_pl->sg.start) {
741 sg_chain(&msg_pl->sg.data[msg_pl->sg.start],
742 MAX_SKB_FRAGS - msg_pl->sg.start + 1,
743 msg_pl->sg.data);
746 i = msg_pl->sg.start;
747 sg_chain(rec->sg_aead_in, 2, &msg_pl->sg.data[i]);
756 tls_make_aad(rec->aad_space, msg_pl->sg.size + prot->tail_size,
763 msg_pl->sg.size + prot->tail_size,
769 msg_pl->sg.size + prot->tail_size, i);
781 msg_pl = &tmp->msg_plaintext;
783 sk_msg_trim(sk, msg_en, msg_pl->sg.size + prot->overhead_size);
906 struct sk_msg *msg_pl;
912 msg_pl = &rec->msg_plaintext;
913 copied = msg_pl->sg.size;
917 return bpf_exec_tx_verdict(msg_pl, sk, true, TLS_RECORD_TYPE_DATA,
933 struct sk_msg *msg_pl, *msg_en;
978 msg_pl = &rec->msg_plaintext;
981 orig_size = msg_pl->sg.size;
984 record_room = TLS_MAX_PAYLOAD_SIZE - msg_pl->sg.size;
990 required_size = msg_pl->sg.size + try_to_copy +
1011 u32 first = msg_pl->sg.end;
1014 msg_pl, try_to_copy);
1021 sk_msg_sg_copy_set(msg_pl, first);
1022 ret = bpf_exec_tx_verdict(msg_pl, sk, full_record,
1038 sk_msg_sg_copy_clear(msg_pl, first);
1040 msg_pl->sg.size - orig_size);
1042 sk_msg_trim(sk, msg_pl, orig_size);
1045 required_size = msg_pl->sg.size + try_to_copy;
1056 try_to_copy -= required_size - msg_pl->sg.size;
1059 msg_pl->sg.size + prot->overhead_size);
1064 msg_pl, try_to_copy);
1075 ret = bpf_exec_tx_verdict(msg_pl, sk, full_record,
1155 struct sk_msg *msg_pl;
1185 msg_pl = &rec->msg_plaintext;
1188 record_room = TLS_MAX_PAYLOAD_SIZE - msg_pl->sg.size;
1195 required_size = msg_pl->sg.size + copy + prot->overhead_size;
1209 copy -= required_size - msg_pl->sg.size;
1213 sk_msg_page_add(msg_pl, page, copy, offset);
1214 msg_pl->sg.copybreak = 0;
1215 msg_pl->sg.curr = msg_pl->sg.end;
1223 if (full_record || eor || sk_msg_full(msg_pl)) {
1224 ret = bpf_exec_tx_verdict(msg_pl, sk, full_record,
1245 tls_trim_both_msgs(sk, msg_pl->sg.size);