/linux-6.1.9/drivers/crypto/caam/ |
D | caamhash.c | 103 int ctx_len; member 143 int ctx_len) in map_seq_out_ptr_ctx() argument 145 state->ctx_dma_len = ctx_len; in map_seq_out_ptr_ctx() 147 ctx_len, DMA_FROM_DEVICE); in map_seq_out_ptr_ctx() 154 append_seq_out_ptr(desc, state->ctx_dma, ctx_len, 0); in map_seq_out_ptr_ctx() 184 struct caam_hash_state *state, int ctx_len, in ctx_map_to_sec4_sg() argument 187 state->ctx_dma_len = ctx_len; in ctx_map_to_sec4_sg() 188 state->ctx_dma = dma_map_single(jrdev, state->caam_ctx, ctx_len, flag); in ctx_map_to_sec4_sg() 195 dma_to_sec4_sg_one(sec4_sg, state->ctx_dma, ctx_len, 0); in ctx_map_to_sec4_sg() 212 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_UPDATE, ctx->ctx_len, in ahash_set_sh_desc() [all …]
|
D | caamhash_desc.c | 29 int digestsize, int ctx_len, bool import_ctx, int era) in cnstr_shdsc_ahash() argument 58 append_seq_load(desc, ctx_len, LDST_CLASS_2_CCB | in cnstr_shdsc_ahash() 88 int digestsize, int ctx_len) in cnstr_shdsc_sk_hash() argument 110 append_seq_load(desc, ctx_len, LDST_CLASS_1_CCB | in cnstr_shdsc_sk_hash()
|
D | caamhash_desc.h | 25 int digestsize, int ctx_len, bool import_ctx, int era); 28 int digestsize, int ctx_len);
|
D | caamalg_qi2.c | 3064 int ctx_len; member 3117 struct caam_hash_state *state, int ctx_len, in ctx_map_to_qm_sg() argument 3120 state->ctx_dma_len = ctx_len; in ctx_map_to_qm_sg() 3121 state->ctx_dma = dma_map_single(dev, state->caam_ctx, ctx_len, flag); in ctx_map_to_qm_sg() 3128 dma_to_qm_sg_one(qm_sg, state->ctx_dma, ctx_len, 0); in ctx_map_to_qm_sg() 3144 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_UPDATE, ctx->ctx_len, in ahash_set_sh_desc() 3145 ctx->ctx_len, true, priv->sec_attr.era); in ahash_set_sh_desc() 3156 cnstr_shdsc_ahash(desc, &ctx->adata, OP_ALG_AS_INIT, ctx->ctx_len, in ahash_set_sh_desc() 3157 ctx->ctx_len, false, priv->sec_attr.era); in ahash_set_sh_desc() 3169 ctx->ctx_len, true, priv->sec_attr.era); in ahash_set_sh_desc() [all …]
|
/linux-6.1.9/security/selinux/ |
D | xfrm.c | 88 str_len = uctx->ctx_len; in selinux_xfrm_alloc_user() 98 ctx->ctx_len = str_len; in selinux_xfrm_alloc_user() 304 new_ctx = kmemdup(old_ctx, sizeof(*old_ctx) + old_ctx->ctx_len, in selinux_xfrm_policy_clone() 372 ctx->ctx_len = str_len; in selinux_xfrm_state_alloc_acquire()
|
/linux-6.1.9/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
D | chcr_common.h | 51 #define FILL_KEY_CTX_HDR(ck_size, mk_size, ctx_len) \ argument 56 KEY_CONTEXT_CTX_LEN_V((ctx_len)))
|
/linux-6.1.9/drivers/crypto/chelsio/ |
D | chcr_algo.h | 170 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 177 KEY_CONTEXT_CTX_LEN_V((ctx_len))) 179 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 186 TLS_KEYCTX_RXFLIT_CNT_V((ctx_len)))
|
/linux-6.1.9/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 141 rctx->cmd.u.sha.ctx_len = SHA1_DIGEST_SIZE; in ccp_do_sha_update() 144 rctx->cmd.u.sha.ctx_len = SHA224_DIGEST_SIZE; in ccp_do_sha_update() 147 rctx->cmd.u.sha.ctx_len = SHA256_DIGEST_SIZE; in ccp_do_sha_update() 150 rctx->cmd.u.sha.ctx_len = SHA384_DIGEST_SIZE; in ccp_do_sha_update() 153 rctx->cmd.u.sha.ctx_len = SHA512_DIGEST_SIZE; in ccp_do_sha_update()
|
D | ccp-ops.c | 1502 if (sha->ctx_len < SHA1_DIGEST_SIZE) in ccp_run_sha_cmd() 1507 if (sha->ctx_len < SHA224_DIGEST_SIZE) in ccp_run_sha_cmd() 1512 if (sha->ctx_len < SHA256_DIGEST_SIZE) in ccp_run_sha_cmd() 1518 || sha->ctx_len < SHA384_DIGEST_SIZE) in ccp_run_sha_cmd() 1524 || sha->ctx_len < SHA512_DIGEST_SIZE) in ccp_run_sha_cmd() 1805 hmac_cmd.u.sha.ctx_len = sha->ctx_len; in ccp_run_sha_cmd()
|
/linux-6.1.9/include/uapi/linux/ |
D | xfrm.h | 34 __u16 ctx_len; member 238 __u16 ctx_len; member
|
/linux-6.1.9/include/linux/ |
D | ccp.h | 289 u32 ctx_len; /* In bytes */ member
|
/linux-6.1.9/net/key/ |
D | af_key.c | 478 uctx->ctx_len = sec_ctx->sadb_x_ctx_len; in pfkey_sadb2xfrm_user_sec_ctx() 480 uctx->ctx_len); in pfkey_sadb2xfrm_user_sec_ctx() 796 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 1035 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in __pfkey_xfrm_state2msg() 1037 xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 2019 len += xfrm_ctx->ctx_len; in pfkey_xfrm_policy2sec_ctx_size() 2200 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_xfrm_policy2msg() 2202 xfrm_ctx->ctx_len); in pfkey_xfrm_policy2msg() 3178 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in pfkey_send_acquire() 3253 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_send_acquire() [all …]
|
/linux-6.1.9/net/xfrm/ |
D | xfrm_user.c | 124 uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len)) { in verify_sec_ctx_len() 581 len += xfrm_ctx->ctx_len; in xfrm_user_sec_ctx_size() 915 int ctx_size = sizeof(*uctx) + s->ctx_len; in copy_sec_ctx() 926 uctx->ctx_len = s->ctx_len; in copy_sec_ctx() 927 memcpy(uctx + 1, s->ctx_str, s->ctx_len); in copy_sec_ctx() 3197 x->security->ctx_len); in xfrm_sa_len()
|
D | xfrm_state.c | 1486 int size = sizeof(*uctx) + security->ctx_len; in clone_security() 1497 uctx->ctx_len = security->ctx_len; in clone_security() 1498 memcpy(uctx + 1, security->ctx_str, security->ctx_len); in clone_security()
|