rxm 144 include/net/tls.h struct strp_msg rxm; rxm 728 net/tls/tls_device.c struct strp_msg *rxm; rxm 753 net/tls/tls_device.c rxm = strp_msg(skb); rxm 756 net/tls/tls_device.c if (tcp_inq(sk) > rxm->full_len) { rxm 772 net/tls/tls_device.c struct strp_msg *rxm = strp_msg(skb); rxm 773 net/tls/tls_device.c int err = 0, offset = rxm->offset, copy, nsg, data_len, pos; rxm 778 net/tls/tls_device.c orig_buf = kmalloc(rxm->full_len + TLS_HEADER_SIZE + rxm 792 net/tls/tls_device.c rxm->full_len + TLS_HEADER_SIZE + rxm 806 net/tls/tls_device.c data_len = rxm->full_len - TLS_CIPHER_AES_GCM_128_TAG_SIZE; rxm 831 net/tls/tls_device.c if (pos >= data_len + rxm->offset) rxm 836 net/tls/tls_device.c data_len + rxm->offset - offset); rxm 124 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 134 net/tls/tls_sw.c if (back > rxm->full_len - prot->prepend_size) rxm 137 net/tls/tls_sw.c rxm->offset + rxm->full_len - back, rxm 174 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 182 net/tls/tls_sw.c rxm->full_len -= pad; rxm 183 net/tls/tls_sw.c rxm->offset += prot->prepend_size; rxm 184 net/tls/tls_sw.c rxm->full_len -= prot->overhead_size; rxm 1398 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 1405 net/tls/tls_sw.c const int data_len = rxm->full_len - prot->overhead_size + rxm 1414 net/tls/tls_sw.c n_sgin = skb_nsg(skb, rxm->offset + prot->prepend_size, rxm 1415 net/tls/tls_sw.c rxm->full_len - prot->prepend_size); rxm 1457 net/tls/tls_sw.c err = skb_copy_bits(skb, rxm->offset + TLS_HEADER_SIZE, rxm 1473 net/tls/tls_sw.c tls_make_aad(aad, rxm->full_len - prot->overhead_size + rxm 1482 net/tls/tls_sw.c rxm->offset + prot->prepend_size, rxm 1483 net/tls/tls_sw.c rxm->full_len - prot->prepend_size); rxm 1534 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 1563 net/tls/tls_sw.c rxm->full_len -= pad; rxm 1564 net/tls/tls_sw.c rxm->offset += prot->prepend_size; rxm 1565 net/tls/tls_sw.c rxm->full_len -= prot->overhead_size; rxm 1592 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 1594 net/tls/tls_sw.c if (len < rxm->full_len) { rxm 1595 net/tls/tls_sw.c rxm->offset += len; rxm 1596 net/tls/tls_sw.c rxm->full_len -= len; rxm 1636 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 1643 net/tls/tls_sw.c if (skip < rxm->full_len) rxm 1646 net/tls/tls_sw.c skip = skip - rxm->full_len; rxm 1652 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 1653 net/tls/tls_sw.c int chunk = min_t(unsigned int, rxm->full_len - skip, len); rxm 1676 net/tls/tls_sw.c if (!zc || (rxm->full_len - skip) > len) { rxm 1677 net/tls/tls_sw.c int err = skb_copy_datagram_msg(skb, rxm->offset + skip, rxm 1688 net/tls/tls_sw.c rxm->offset = rxm->offset + chunk; rxm 1689 net/tls/tls_sw.c rxm->full_len = rxm->full_len - chunk; rxm 1692 net/tls/tls_sw.c if (rxm->full_len - skip) rxm 1731 net/tls/tls_sw.c struct strp_msg *rxm; rxm 1797 net/tls/tls_sw.c rxm = strp_msg(skb); rxm 1799 net/tls/tls_sw.c to_decrypt = rxm->full_len - prot->overhead_size; rxm 1857 net/tls/tls_sw.c if (rxm->full_len > len) { rxm 1861 net/tls/tls_sw.c chunk = rxm->full_len; rxm 1864 net/tls/tls_sw.c err = skb_copy_datagram_msg(skb, rxm->offset, rxm 1870 net/tls/tls_sw.c rxm->offset = rxm->offset + chunk; rxm 1871 net/tls/tls_sw.c rxm->full_len = rxm->full_len - chunk; rxm 1955 net/tls/tls_sw.c struct strp_msg *rxm = NULL; rxm 1987 net/tls/tls_sw.c rxm = strp_msg(skb); rxm 1989 net/tls/tls_sw.c chunk = min_t(unsigned int, rxm->full_len, len); rxm 1990 net/tls/tls_sw.c copied = skb_splice_bits(skb, sk, rxm->offset, pipe, chunk, flags); rxm 2025 net/tls/tls_sw.c struct strp_msg *rxm = strp_msg(skb); rxm 2031 net/tls/tls_sw.c if (rxm->offset + prot->prepend_size > skb->len) rxm 2041 net/tls/tls_sw.c ret = skb_copy_bits(skb, rxm->offset, header, prot->prepend_size); rxm 2072 net/tls/tls_sw.c TCP_SKB_CB(skb)->seq + rxm->offset);