| /linux/drivers/crypto/caam/ |
| A D | caamhash.c | 108 int ctx_len; member 148 int ctx_len) in map_seq_out_ptr_ctx() argument 150 state->ctx_dma_len = ctx_len; in map_seq_out_ptr_ctx() 271 ctx->ctx_len, ctx->ctx_len); in axcbc_set_sh_desc() 294 ctx->ctx_len); in axcbc_set_sh_desc() 323 ctx->ctx_len, ctx->ctx_len); in acmac_set_sh_desc() 343 ctx->ctx_len); in acmac_set_sh_desc() 611 ctx->ctx_len, 1); in ahash_done_cpy() 669 ctx->ctx_len, 1); in ahash_done_switch() 1800 ctx->ctx_len = 48; in caam_hash_cra_init() [all …]
|
| A D | caamhash_desc.c | 29 int digestsize, int ctx_len, bool import_ctx, int era) in cnstr_shdsc_ahash() argument 58 append_seq_load(desc, ctx_len, LDST_CLASS_2_CCB | in cnstr_shdsc_ahash() 88 int digestsize, int ctx_len) in cnstr_shdsc_sk_hash() argument 110 append_seq_load(desc, ctx_len, LDST_CLASS_1_CCB | in cnstr_shdsc_sk_hash()
|
| A D | caamhash_desc.h | 25 int digestsize, int ctx_len, bool import_ctx, int era); 28 int digestsize, int ctx_len);
|
| A D | caamalg_qi2.c | 3069 int ctx_len; member 3125 state->ctx_dma_len = ctx_len; in ctx_map_to_qm_sg() 3421 ctx->ctx_len, 1); in ahash_done() 3455 ctx->ctx_len, 1); in ahash_done_bi() 3486 ctx->ctx_len, 1); in ahash_done_ctx_src() 3520 ctx->ctx_len, 1); in ahash_done_ctx_dst() 3618 dpaa2_fl_set_len(out_fle, ctx->ctx_len); in ahash_update_ctx() 4051 state->ctx_dma_len = ctx->ctx_len; in ahash_update_no_ctx() 4053 ctx->ctx_len, DMA_FROM_DEVICE); in ahash_update_no_ctx() 4278 state->ctx_dma_len = ctx->ctx_len; in ahash_update_first() [all …]
|
| /linux/include/uapi/linux/ |
| A D | lsm.h | 39 __u64 ctx_len; member 40 __u8 ctx[] __counted_by(ctx_len);
|
| A D | xfrm.h | 35 __u16 ctx_len; member 37 char ctx_str[] __counted_by(ctx_len); 244 __u16 ctx_len; member
|
| /linux/security/selinux/ |
| A D | xfrm.c | 87 str_len = uctx->ctx_len; in selinux_xfrm_alloc_user() 97 ctx->ctx_len = str_len; in selinux_xfrm_alloc_user() 298 new_ctx = kmemdup(old_ctx, sizeof(*old_ctx) + old_ctx->ctx_len, in selinux_xfrm_policy_clone() 366 ctx->ctx_len = str_len; in selinux_xfrm_state_alloc_acquire()
|
| A D | hooks.c | 6567 rc = selinux_lsm_setattr(attr, ctx->ctx, ctx->ctx_len); in selinux_setselfattr()
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| A D | chcr_common.h | 51 #define FILL_KEY_CTX_HDR(ck_size, mk_size, ctx_len) \ argument 56 KEY_CONTEXT_CTX_LEN_V((ctx_len)))
|
| /linux/drivers/crypto/chelsio/ |
| A D | chcr_algo.h | 170 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 177 KEY_CONTEXT_CTX_LEN_V((ctx_len))) 179 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 186 TLS_KEYCTX_RXFLIT_CNT_V((ctx_len)))
|
| /linux/drivers/crypto/ccp/ |
| A D | ccp-crypto-sha.c | 141 rctx->cmd.u.sha.ctx_len = SHA1_DIGEST_SIZE; in ccp_do_sha_update() 144 rctx->cmd.u.sha.ctx_len = SHA224_DIGEST_SIZE; in ccp_do_sha_update() 147 rctx->cmd.u.sha.ctx_len = SHA256_DIGEST_SIZE; in ccp_do_sha_update() 150 rctx->cmd.u.sha.ctx_len = SHA384_DIGEST_SIZE; in ccp_do_sha_update() 153 rctx->cmd.u.sha.ctx_len = SHA512_DIGEST_SIZE; in ccp_do_sha_update()
|
| A D | ccp-ops.c | 1505 if (sha->ctx_len < SHA1_DIGEST_SIZE) in ccp_run_sha_cmd() 1510 if (sha->ctx_len < SHA224_DIGEST_SIZE) in ccp_run_sha_cmd() 1515 if (sha->ctx_len < SHA256_DIGEST_SIZE) in ccp_run_sha_cmd() 1521 || sha->ctx_len < SHA384_DIGEST_SIZE) in ccp_run_sha_cmd() 1527 || sha->ctx_len < SHA512_DIGEST_SIZE) in ccp_run_sha_cmd() 1808 hmac_cmd.u.sha.ctx_len = sha->ctx_len; in ccp_run_sha_cmd()
|
| /linux/include/linux/ |
| A D | ccp.h | 289 u32 ctx_len; /* In bytes */ member
|
| /linux/net/key/ |
| A D | af_key.c | 478 uctx->ctx_len = sec_ctx->sadb_x_ctx_len; in pfkey_sadb2xfrm_user_sec_ctx() 480 uctx->ctx_len); in pfkey_sadb2xfrm_user_sec_ctx() 796 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 1035 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in __pfkey_xfrm_state2msg() 1037 xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 2022 len += xfrm_ctx->ctx_len; in pfkey_xfrm_policy2sec_ctx_size() 2203 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_xfrm_policy2msg() 2205 xfrm_ctx->ctx_len); in pfkey_xfrm_policy2msg() 3181 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in pfkey_send_acquire() 3256 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_send_acquire() [all …]
|
| /linux/tools/testing/selftests/lsm/ |
| A D | lsm_get_self_attr_test.c | 23 vp = (void *)ctxp + sizeof(*ctxp) + ctxp->ctx_len; in next_ctx()
|
| /linux/net/xfrm/ |
| A D | xfrm_user.c | 124 uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len)) { in verify_sec_ctx_len() 694 len += xfrm_ctx->ctx_len; in xfrm_user_sec_ctx_size() 1037 int ctx_size = sizeof(*uctx) + s->ctx_len; in copy_sec_ctx() 1048 uctx->ctx_len = s->ctx_len; in copy_sec_ctx() 1049 memcpy(uctx + 1, s->ctx_str, s->ctx_len); in copy_sec_ctx() 3471 x->security->ctx_len); in xfrm_sa_len()
|
| A D | xfrm_state.c | 1695 int size = sizeof(*uctx) + security->ctx_len; in clone_security() 1706 uctx->ctx_len = security->ctx_len; in clone_security() 1707 memcpy(uctx + 1, security->ctx_str, security->ctx_len); in clone_security()
|
| /linux/security/ |
| A D | security.c | 909 nctx->ctx_len = val_len; in lsm_fill_user_ctx() 4200 check_add_overflow(sizeof(*lctx), lctx->ctx_len, &required_len) || in security_setselfattr()
|
| /linux/security/apparmor/ |
| A D | lsm.c | 935 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in apparmor_setselfattr()
|
| /linux/security/smack/ |
| A D | smack_lsm.c | 3800 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in smack_setselfattr()
|