TLS_HEADER_SIZE
CPL_TX_SEC_PDU_IVINSRTOFST_V(TLS_HEADER_SIZE + 1));
cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1;
CPL_TX_SEC_PDU_AADSTOP_V(TLS_HEADER_SIZE) |
(!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0);
(TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0));
if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) {
if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) {
(TLS_HEADER_SIZE + tx_info->iv_size))
#define TLS_NONCE_OFFSET TLS_HEADER_SIZE
seq += TLS_HEADER_SIZE - 1;
orig_buf = kmalloc(rxm->full_len + TLS_HEADER_SIZE + cipher_desc->iv,
rxm->full_len + TLS_HEADER_SIZE + cipher_desc->iv);
err = skb_copy_bits(skb, offset, buf, TLS_HEADER_SIZE + cipher_desc->iv);
unsigned char buf[TLS_HEADER_SIZE + TLS_MAX_IV_SIZE];
buf_size = TLS_HEADER_SIZE + cipher_desc->iv;
memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv);
err = skb_copy_bits(skb, rxm->offset + TLS_HEADER_SIZE,
char header[TLS_HEADER_SIZE + TLS_MAX_IV_SIZE];
tls_device_rx_resync_new_rec(strp->sk, data_len + TLS_HEADER_SIZE,
return data_len + TLS_HEADER_SIZE;
prot->aad_size = TLS_HEADER_SIZE;
prot->prepend_size = TLS_HEADER_SIZE + nonce_size;