/linux-6.12.1/drivers/crypto/caam/ |
D | caamhash.c | 108 int ctx_len; member 148 int ctx_len) in map_seq_out_ptr_ctx() argument 150 state->ctx_dma_len = ctx_len; in map_seq_out_ptr_ctx() 152 ctx_len, DMA_FROM_DEVICE); in map_seq_out_ptr_ctx() 159 append_seq_out_ptr(desc, state->ctx_dma, ctx_len, 0); in map_seq_out_ptr_ctx() 189 struct caam_hash_state *state, int ctx_len, in ctx_map_to_sec4_sg() argument 192 state->ctx_dma_len = ctx_len; in ctx_map_to_sec4_sg() 193 state->ctx_dma = dma_map_single(jrdev, state->caam_ctx, ctx_len, flag); in ctx_map_to_sec4_sg() 200 dma_to_sec4_sg_one(sec4_sg, state->ctx_dma, ctx_len, 0); in ctx_map_to_sec4_sg() 217 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_UPDATE, ctx->ctx_len, in ahash_set_sh_desc() [all …]
|
D | caamhash_desc.c | 29 int digestsize, int ctx_len, bool import_ctx, int era) in cnstr_shdsc_ahash() argument 58 append_seq_load(desc, ctx_len, LDST_CLASS_2_CCB | in cnstr_shdsc_ahash() 88 int digestsize, int ctx_len) in cnstr_shdsc_sk_hash() argument 110 append_seq_load(desc, ctx_len, LDST_CLASS_1_CCB | in cnstr_shdsc_sk_hash()
|
D | caamhash_desc.h | 25 int digestsize, int ctx_len, bool import_ctx, int era); 28 int digestsize, int ctx_len);
|
D | caamalg_qi2.c | 3069 int ctx_len; member 3122 struct caam_hash_state *state, int ctx_len, in ctx_map_to_qm_sg() argument 3125 state->ctx_dma_len = ctx_len; in ctx_map_to_qm_sg() 3126 state->ctx_dma = dma_map_single(dev, state->caam_ctx, ctx_len, flag); in ctx_map_to_qm_sg() 3133 dma_to_qm_sg_one(qm_sg, state->ctx_dma, ctx_len, 0); in ctx_map_to_qm_sg() 3149 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_UPDATE, ctx->ctx_len, in ahash_set_sh_desc() 3150 ctx->ctx_len, true, priv->sec_attr.era); in ahash_set_sh_desc() 3161 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_INIT, ctx->ctx_len, in ahash_set_sh_desc() 3162 ctx->ctx_len, false, priv->sec_attr.era); in ahash_set_sh_desc() 3174 ctx->ctx_len, true, priv->sec_attr.era); in ahash_set_sh_desc() [all …]
|
/linux-6.12.1/include/uapi/linux/ |
D | lsm.h | 39 __u64 ctx_len; member 40 __u8 ctx[] __counted_by(ctx_len);
|
D | xfrm.h | 35 __u16 ctx_len; member 37 char ctx_str[] __counted_by(ctx_len); 244 __u16 ctx_len; member
|
/linux-6.12.1/security/selinux/ |
D | xfrm.c | 87 str_len = uctx->ctx_len; in selinux_xfrm_alloc_user() 97 ctx->ctx_len = str_len; in selinux_xfrm_alloc_user() 298 new_ctx = kmemdup(old_ctx, sizeof(*old_ctx) + old_ctx->ctx_len, in selinux_xfrm_policy_clone() 366 ctx->ctx_len = str_len; in selinux_xfrm_state_alloc_acquire()
|
D | hooks.c | 6567 rc = selinux_lsm_setattr(attr, ctx->ctx, ctx->ctx_len); in selinux_setselfattr()
|
/linux-6.12.1/drivers/crypto/chelsio/ |
D | chcr_algo.h | 170 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 177 KEY_CONTEXT_CTX_LEN_V((ctx_len))) 179 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 186 TLS_KEYCTX_RXFLIT_CNT_V((ctx_len)))
|
/linux-6.12.1/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
D | chcr_common.h | 51 #define FILL_KEY_CTX_HDR(ck_size, mk_size, ctx_len) \ argument 56 KEY_CONTEXT_CTX_LEN_V((ctx_len)))
|
/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 141 rctx->cmd.u.sha.ctx_len = SHA1_DIGEST_SIZE; in ccp_do_sha_update() 144 rctx->cmd.u.sha.ctx_len = SHA224_DIGEST_SIZE; in ccp_do_sha_update() 147 rctx->cmd.u.sha.ctx_len = SHA256_DIGEST_SIZE; in ccp_do_sha_update() 150 rctx->cmd.u.sha.ctx_len = SHA384_DIGEST_SIZE; in ccp_do_sha_update() 153 rctx->cmd.u.sha.ctx_len = SHA512_DIGEST_SIZE; in ccp_do_sha_update()
|
D | ccp-ops.c | 1505 if (sha->ctx_len < SHA1_DIGEST_SIZE) in ccp_run_sha_cmd() 1510 if (sha->ctx_len < SHA224_DIGEST_SIZE) in ccp_run_sha_cmd() 1515 if (sha->ctx_len < SHA256_DIGEST_SIZE) in ccp_run_sha_cmd() 1521 || sha->ctx_len < SHA384_DIGEST_SIZE) in ccp_run_sha_cmd() 1527 || sha->ctx_len < SHA512_DIGEST_SIZE) in ccp_run_sha_cmd() 1808 hmac_cmd.u.sha.ctx_len = sha->ctx_len; in ccp_run_sha_cmd()
|
/linux-6.12.1/include/linux/ |
D | ccp.h | 289 u32 ctx_len; /* In bytes */ member
|
/linux-6.12.1/net/key/ |
D | af_key.c | 478 uctx->ctx_len = sec_ctx->sadb_x_ctx_len; in pfkey_sadb2xfrm_user_sec_ctx() 480 uctx->ctx_len); in pfkey_sadb2xfrm_user_sec_ctx() 796 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 1035 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in __pfkey_xfrm_state2msg() 1037 xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 2022 len += xfrm_ctx->ctx_len; in pfkey_xfrm_policy2sec_ctx_size() 2203 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_xfrm_policy2msg() 2205 xfrm_ctx->ctx_len); in pfkey_xfrm_policy2msg() 3181 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in pfkey_send_acquire() 3256 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_send_acquire() [all …]
|
/linux-6.12.1/tools/testing/selftests/lsm/ |
D | lsm_get_self_attr_test.c | 23 vp = (void *)ctxp + sizeof(*ctxp) + ctxp->ctx_len; in next_ctx()
|
/linux-6.12.1/net/xfrm/ |
D | xfrm_user.c | 124 uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len)) { in verify_sec_ctx_len() 694 len += xfrm_ctx->ctx_len; in xfrm_user_sec_ctx_size() 1037 int ctx_size = sizeof(*uctx) + s->ctx_len; in copy_sec_ctx() 1048 uctx->ctx_len = s->ctx_len; in copy_sec_ctx() 1049 memcpy(uctx + 1, s->ctx_str, s->ctx_len); in copy_sec_ctx() 3471 x->security->ctx_len); in xfrm_sa_len()
|
D | xfrm_state.c | 1695 int size = sizeof(*uctx) + security->ctx_len; in clone_security() 1706 uctx->ctx_len = security->ctx_len; in clone_security() 1707 memcpy(uctx + 1, security->ctx_str, security->ctx_len); in clone_security()
|
/linux-6.12.1/security/ |
D | security.c | 909 nctx->ctx_len = val_len; in lsm_fill_user_ctx() 4200 check_add_overflow(sizeof(*lctx), lctx->ctx_len, &required_len) || in security_setselfattr()
|
/linux-6.12.1/security/apparmor/ |
D | lsm.c | 935 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in apparmor_setselfattr()
|
/linux-6.12.1/security/smack/ |
D | smack_lsm.c | 3800 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in smack_setselfattr()
|