Lines Matching defs:msg_en

325 	struct sk_msg *msg_en = &rec->msg_encrypted;
327 return sk_msg_alloc(sk, msg_en, len, 0);
337 struct sk_msg *msg_en = &rec->msg_encrypted;
341 * at the end of plaintext sg. It is guaranteed that msg_en
346 /* Skip initial bytes in msg_en's data to be able to use
351 return sk_msg_clone(sk, msg_pl, msg_en, skip, len);
359 struct sk_msg *msg_pl, *msg_en;
370 msg_en = &rec->msg_encrypted;
373 sk_msg_init(msg_en);
412 struct sk_msg *msg_en;
444 msg_en = &rec->msg_encrypted;
446 &msg_en->sg.data[msg_en->sg.curr],
473 struct sk_msg *msg_en;
479 msg_en = &rec->msg_encrypted;
486 sge = sk_msg_elem(msg_en, msg_en->sg.curr);
541 struct sk_msg *msg_en = &rec->msg_encrypted;
542 struct scatterlist *sge = sk_msg_elem(msg_en, start);
566 msg_en->sg.curr = start;
732 struct sk_msg *msg_pl, *msg_en;
741 msg_en = &rec->msg_encrypted;
747 prot->overhead_size > msg_en->sg.size) ||
750 prot->overhead_size > msg_en->sg.size))) {
752 split_point = msg_en->sg.size;
755 rc = tls_split_open_record(sk, rec, &tmp, msg_pl, msg_en,
768 msg_en = &rec->msg_encrypted;
771 sk_msg_trim(sk, msg_en, msg_pl->sg.size +
801 i = msg_en->sg.end;
803 sg_mark_end(sk_msg_elem(msg_en, i));
805 i = msg_en->sg.start;
806 sg_chain(rec->sg_aead_out, 2, &msg_en->sg.data[i]);
812 page_address(sg_page(&msg_en->sg.data[i])) +
813 msg_en->sg.data[i].offset,
833 msg_en = &tmp->msg_encrypted;
834 sk_msg_trim(sk, msg_en, msg_pl->sg.size + prot->overhead_size);
1018 struct sk_msg *msg_pl, *msg_en;
1057 msg_en = &rec->msg_encrypted;
1084 try_to_copy -= required_size - msg_en->sg.size;
1151 sk_msg_trim(sk, msg_en,
1198 if (ctx->open_rec && msg_en->sg.size < required_size)