Lines Matching full:back
189 return &req->back; in nfp_net_tls_set_ipv4()
209 return &req->back; in nfp_net_tls_set_ipv6()
214 struct nfp_crypto_req_add_back *back, struct sock *sk, in nfp_net_tls_set_l4() argument
222 back->src_port = 0; in nfp_net_tls_set_l4()
223 back->dst_port = 0; in nfp_net_tls_set_l4()
225 back->src_port = inet->inet_dport; in nfp_net_tls_set_l4()
226 back->dst_port = inet->inet_sport; in nfp_net_tls_set_l4()
273 struct nfp_crypto_req_add_back *back; in nfp_net_tls_add() local
328 back = nfp_net_tls_set_ipv6(nn, req, sk, direction); in nfp_net_tls_add()
330 back = nfp_net_tls_set_ipv4(nn, req, sk, direction); in nfp_net_tls_add()
332 nfp_net_tls_set_l4(front, back, sk, direction); in nfp_net_tls_add()
334 back->counter = 0; in nfp_net_tls_add()
335 back->tcp_seq = cpu_to_be32(start_offload_tcp_sn); in nfp_net_tls_add()
338 memcpy(back->key, tls_ci->key, TLS_CIPHER_AES_GCM_128_KEY_SIZE); in nfp_net_tls_add()
339 memset(&back->key[TLS_CIPHER_AES_GCM_128_KEY_SIZE / 4], 0, in nfp_net_tls_add()
340 sizeof(back->key) - TLS_CIPHER_AES_GCM_128_KEY_SIZE); in nfp_net_tls_add()
341 memcpy(back->iv, tls_ci->iv, TLS_CIPHER_AES_GCM_128_IV_SIZE); in nfp_net_tls_add()
342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
343 memcpy(back->rec_no, tls_ci->rec_seq, sizeof(tls_ci->rec_seq)); in nfp_net_tls_add()
355 if (!WARN_ON_ONCE((u8 *)back < skb->head || in nfp_net_tls_add()
356 (u8 *)back > skb_end_pointer(skb)) && in nfp_net_tls_add()
357 !WARN_ON_ONCE((u8 *)&reply[1] > (u8 *)back)) in nfp_net_tls_add()
358 memzero_explicit(back, sizeof(*back)); in nfp_net_tls_add()