/linux-master/drivers/crypto/caam/ |
H A D | caamhash_desc.h | 25 int digestsize, int ctx_len, bool import_ctx, int era); 28 int digestsize, int ctx_len);
|
H A D | caamhash_desc.c | 22 * @ctx_len: size of Context Register 29 int digestsize, int ctx_len, bool import_ctx, int era) 58 append_seq_load(desc, ctx_len, LDST_CLASS_2_CCB | 85 * @ctx_len: size of Context Register 88 int digestsize, int ctx_len) 110 append_seq_load(desc, ctx_len, LDST_CLASS_1_CCB | 28 cnstr_shdsc_ahash(u32 * const desc, struct alginfo *adata, u32 state, int digestsize, int ctx_len, bool import_ctx, int era) argument 87 cnstr_shdsc_sk_hash(u32 * const desc, struct alginfo *adata, u32 state, int digestsize, int ctx_len) argument
|
H A D | caamhash.c | 108 int ctx_len; member in struct:caam_hash_ctx 148 int ctx_len) 150 state->ctx_dma_len = ctx_len; 152 ctx_len, DMA_FROM_DEVICE); 159 append_seq_out_ptr(desc, state->ctx_dma, ctx_len, 0); 189 struct caam_hash_state *state, int ctx_len, 192 state->ctx_dma_len = ctx_len; 193 state->ctx_dma = dma_map_single(jrdev, state->caam_ctx, ctx_len, flag); 200 dma_to_sec4_sg_one(sec4_sg, state->ctx_dma, ctx_len, 0); 217 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_UPDATE, ctx->ctx_len, 146 map_seq_out_ptr_ctx(u32 *desc, struct device *jrdev, struct caam_hash_state *state, int ctx_len) argument 188 ctx_map_to_sec4_sg(struct device *jrdev, struct caam_hash_state *state, int ctx_len, struct sec4_sg_entry *sec4_sg, u32 flag) argument [all...] |
H A D | caamalg_qi2.c | 3061 * @ctx_len: size of Context Register 3069 int ctx_len; member in struct:caam_hash_ctx 3122 struct caam_hash_state *state, int ctx_len, 3125 state->ctx_dma_len = ctx_len; 3126 state->ctx_dma = dma_map_single(dev, state->caam_ctx, ctx_len, flag); 3133 dma_to_qm_sg_one(qm_sg, state->ctx_dma, ctx_len, 0); 3149 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_UPDATE, ctx->ctx_len, 3150 ctx->ctx_len, true, priv->sec_attr.era); 3161 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_INIT, ctx->ctx_len, 3162 ctx->ctx_len, fals 3121 ctx_map_to_qm_sg(struct device *dev, struct caam_hash_state *state, int ctx_len, struct dpaa2_sg_entry *qm_sg, u32 flag) argument [all...] |
/linux-master/include/uapi/linux/ |
H A D | lsm.h | 21 * @ctx_len: the size of @ctx 27 * In all cases @ctx_len MUST be equal to the length of @ctx. 29 * @ctx_len equal to `strlen(@ctx) + 1`. Binary values are 39 __u64 ctx_len; member in struct:lsm_ctx 40 __u8 ctx[] __counted_by(ctx_len);
|
H A D | xfrm.h | 35 __u16 ctx_len; member in struct:xfrm_sec_ctx 37 char ctx_str[] __counted_by(ctx_len); 239 __u16 ctx_len; member in struct:xfrm_user_sec_ctx
|
/linux-master/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_common.h | 51 #define FILL_KEY_CTX_HDR(ck_size, mk_size, ctx_len) \ 56 KEY_CONTEXT_CTX_LEN_V((ctx_len)))
|
/linux-master/drivers/crypto/chelsio/ |
H A D | chcr_algo.h | 170 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ 177 KEY_CONTEXT_CTX_LEN_V((ctx_len))) 179 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ 186 TLS_KEYCTX_RXFLIT_CNT_V((ctx_len)))
|
/linux-master/security/selinux/ |
H A D | xfrm.c | 88 str_len = uctx->ctx_len; 98 ctx->ctx_len = str_len; 301 new_ctx = kmemdup(old_ctx, sizeof(*old_ctx) + old_ctx->ctx_len, 369 ctx->ctx_len = str_len;
|
H A D | hooks.c | 6581 rc = selinux_lsm_setattr(attr, ctx->ctx, ctx->ctx_len);
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 141 rctx->cmd.u.sha.ctx_len = SHA1_DIGEST_SIZE; 144 rctx->cmd.u.sha.ctx_len = SHA224_DIGEST_SIZE; 147 rctx->cmd.u.sha.ctx_len = SHA256_DIGEST_SIZE; 150 rctx->cmd.u.sha.ctx_len = SHA384_DIGEST_SIZE; 153 rctx->cmd.u.sha.ctx_len = SHA512_DIGEST_SIZE;
|
H A D | ccp-ops.c | 1505 if (sha->ctx_len < SHA1_DIGEST_SIZE) 1510 if (sha->ctx_len < SHA224_DIGEST_SIZE) 1515 if (sha->ctx_len < SHA256_DIGEST_SIZE) 1521 || sha->ctx_len < SHA384_DIGEST_SIZE) 1527 || sha->ctx_len < SHA512_DIGEST_SIZE) 1808 hmac_cmd.u.sha.ctx_len = sha->ctx_len;
|
/linux-master/include/linux/ |
H A D | ccp.h | 269 * @ctx_len: length in bytes of hash value 279 * - type, ctx, ctx_len, src, src_len, final 289 u32 ctx_len; /* In bytes */ member in struct:ccp_sha_engine
|
/linux-master/tools/testing/selftests/lsm/ |
H A D | lsm_get_self_attr_test.c | 23 vp = (void *)ctxp + sizeof(*ctxp) + ctxp->ctx_len;
|
/linux-master/net/key/ |
H A D | af_key.c | 478 uctx->ctx_len = sec_ctx->sadb_x_ctx_len; 480 uctx->ctx_len); 796 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); 1035 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; 1037 xfrm_ctx->ctx_len); 2022 len += xfrm_ctx->ctx_len; 2203 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; 2205 xfrm_ctx->ctx_len); 3181 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); 3256 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; [all...] |
/linux-master/net/xfrm/ |
H A D | xfrm_user.c | 124 uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len)) { 594 len += xfrm_ctx->ctx_len; 930 int ctx_size = sizeof(*uctx) + s->ctx_len; 941 uctx->ctx_len = s->ctx_len; 942 memcpy(uctx + 1, s->ctx_str, s->ctx_len); 3307 x->security->ctx_len);
|
H A D | xfrm_state.c | 1635 int size = sizeof(*uctx) + security->ctx_len; 1646 uctx->ctx_len = security->ctx_len; 1647 memcpy(uctx + 1, security->ctx_str, security->ctx_len);
|
/linux-master/security/ |
H A D | security.c | 816 nctx->ctx_len = val_len; 4052 check_add_overflow(sizeof(*lctx), lctx->ctx_len, &required_len) ||
|
/linux-master/security/apparmor/ |
H A D | lsm.c | 934 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len);
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 3781 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len);
|