Lines Matching full:zc
53 bool zc;
167 char content_type = darg->zc ? darg->tail : 0; in tls_padding_length()
1451 * zc | Zero-copy decrypt allowed | Zero-copy performed
1455 * If ZC decryption was performed darg.skb will point to the input skb.
1459 * or in skb buffers itself. The input parameter 'darg->zc' indicates if
1463 * zero-copy gets disabled and 'darg->zc' is updated.
1491 if (darg->zc && (out_iov || out_sg)) { in tls_decrypt_sg()
1500 darg->zc = false; in tls_decrypt_sg()
1654 /* If opportunistic TLS 1.3 ZC failed retry without ZC */ in tls_decrypt_sw()
1655 if (unlikely(darg->zc && prot->version == TLS_1_3_VERSION && in tls_decrypt_sw()
1657 darg->zc = false; in tls_decrypt_sw()
1699 /* ->zc downgrade check, in case TLS 1.3 gets here */ in tls_decrypt_device()
1700 darg->zc &= !(prot->version == TLS_1_3_VERSION && in tls_decrypt_device()
1706 if (!darg->zc) { in tls_decrypt_device()
1707 /* Non-ZC case needs a real skb */ in tls_decrypt_device()
1714 /* In ZC case nobody cares about the output skb. in tls_decrypt_device()
1781 struct tls_decrypt_arg darg = { .zc = true, }; in decrypt_skb()
2067 darg.zc = true; in tls_sw_recvmsg()
2092 DEBUG_NET_WARN_ON_ONCE(darg.zc); in tls_sw_recvmsg()
2109 if (!darg.zc) { in tls_sw_recvmsg()