Lines Matching refs:msg_pl

336 	struct sk_msg *msg_pl = &rec->msg_plaintext;
344 len = required - msg_pl->sg.size;
349 skip = prot->prepend_size + msg_pl->sg.size;
351 return sk_msg_clone(sk, msg_pl, msg_en, skip, len);
359 struct sk_msg *msg_pl, *msg_en;
369 msg_pl = &rec->msg_plaintext;
372 sk_msg_init(msg_pl);
732 struct sk_msg *msg_pl, *msg_en;
740 msg_pl = &rec->msg_plaintext;
743 split_point = msg_pl->apply_bytes;
744 split = split_point && split_point < msg_pl->sg.size;
746 msg_pl->sg.size +
755 rc = tls_split_open_record(sk, rec, &tmp, msg_pl, msg_en,
765 if (!msg_pl->sg.size) {
767 msg_pl = &rec->msg_plaintext;
771 sk_msg_trim(sk, msg_en, msg_pl->sg.size +
778 i = msg_pl->sg.end;
786 sg_chain(msg_pl->sg.data, msg_pl->sg.end + 1,
789 sg_mark_end(sk_msg_elem(msg_pl, i));
792 if (msg_pl->sg.end < msg_pl->sg.start) {
793 sg_chain(&msg_pl->sg.data[msg_pl->sg.start],
794 MAX_SKB_FRAGS - msg_pl->sg.start + 1,
795 msg_pl->sg.data);
798 i = msg_pl->sg.start;
799 sg_chain(rec->sg_aead_in, 2, &msg_pl->sg.data[i]);
808 tls_make_aad(rec->aad_space, msg_pl->sg.size + prot->tail_size,
814 msg_pl->sg.size + prot->tail_size,
820 msg_pl->sg.size + prot->tail_size, i);
832 msg_pl = &tmp->msg_plaintext;
834 sk_msg_trim(sk, msg_en, msg_pl->sg.size + prot->overhead_size);
959 struct sk_msg *msg_pl;
965 msg_pl = &rec->msg_plaintext;
966 copied = msg_pl->sg.size;
970 return bpf_exec_tx_verdict(msg_pl, sk, true, TLS_RECORD_TYPE_DATA,
975 struct sk_msg *msg_pl, size_t try_to_copy,
994 sk_msg_page_add(msg_pl, page, part, off);
995 msg_pl->sg.copybreak = 0;
996 msg_pl->sg.curr = msg_pl->sg.end;
1000 } while (try_to_copy && !sk_msg_full(msg_pl));
1018 struct sk_msg *msg_pl, *msg_en;
1056 msg_pl = &rec->msg_plaintext;
1059 orig_size = msg_pl->sg.size;
1062 record_room = TLS_MAX_PAYLOAD_SIZE - msg_pl->sg.size;
1068 required_size = msg_pl->sg.size + try_to_copy +
1089 ret = tls_sw_sendmsg_splice(sk, msg, msg_pl,
1095 if (sk_msg_full(msg_pl))
1104 u32 first = msg_pl->sg.end;
1107 msg_pl, try_to_copy);
1114 sk_msg_sg_copy_set(msg_pl, first);
1115 ret = bpf_exec_tx_verdict(msg_pl, sk, full_record,
1131 sk_msg_sg_copy_clear(msg_pl, first);
1133 msg_pl->sg.size - orig_size);
1135 sk_msg_trim(sk, msg_pl, orig_size);
1138 required_size = msg_pl->sg.size + try_to_copy;
1149 try_to_copy -= required_size - msg_pl->sg.size;
1152 msg_pl->sg.size + prot->overhead_size);
1157 msg_pl, try_to_copy);
1169 ret = bpf_exec_tx_verdict(msg_pl, sk, full_record,
1255 struct sk_msg *msg_pl;
1272 msg_pl = &rec->msg_plaintext;
1273 if (msg_pl->sg.size == 0)
1277 ret = bpf_exec_tx_verdict(msg_pl, sk, false, TLS_RECORD_TYPE_DATA,