Lines Matching full:txb
150 struct rxrpc_txbuf *txb;
176 txb = rxrpc_alloc_data_txbuf(call, alloc, RXKAD_ALIGN, gfp);
177 if (!txb)
180 txb->crypto_header = 0;
181 txb->sec_header = shdr;
182 txb->offset += shdr;
183 txb->space = part;
184 return txb;
259 struct rxrpc_txbuf *txb,
262 struct rxkad_level1_hdr *hdr = txb->data;
270 check = txb->seq ^ call->call_id;
271 hdr->data_size = htonl((u32)check << 16 | txb->len);
273 txb->pkt_len = sizeof(struct rxkad_level1_hdr) + txb->len;
274 pad = txb->pkt_len;
278 memset(txb->data + txb->offset, 0, pad);
279 txb->pkt_len += pad;
300 struct rxrpc_txbuf *txb,
304 struct rxkad_level2_hdr *rxkhdr = txb->data;
313 check = txb->seq ^ call->call_id;
315 rxkhdr->data_size = htonl(txb->len | (u32)check << 16);
318 content = sizeof(struct rxkad_level2_hdr) + txb->len;
319 txb->pkt_len = round_up(content, RXKAD_ALIGN);
320 pad = txb->pkt_len - content;
322 memset(txb->data + txb->offset, 0, pad);
328 sg_init_one(&sg, rxkhdr, txb->pkt_len);
331 skcipher_request_set_crypt(req, &sg, &sg, txb->pkt_len, iv.x);
340 static int rxkad_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
353 txb->seq, txb->len);
371 x |= txb->seq & 0x3fffffff;
386 txb->cksum = htons(y);
390 txb->pkt_len = txb->len;
394 ret = rxkad_secure_packet_auth(call, txb, req);
395 if (txb->alloc_size == RXRPC_JUMBO_DATALEN)
396 txb->jumboable = true;
399 ret = rxkad_secure_packet_encrypt(call, txb, req);
400 if (txb->alloc_size == RXRPC_JUMBO_DATALEN)
401 txb->jumboable = true;
409 if (txb->pkt_len < txb->alloc_size) {
410 size_t gap = txb->alloc_size - txb->pkt_len;
411 void *p = txb->data;
413 memset(p + txb->pkt_len, 0, gap);