Searched refs:ctx_len (Results 1 – 9 of 9) sorted by relevance
/Linux-v4.19/drivers/crypto/caam/ |
D | caamhash.c | 113 int ctx_len; member 171 int ctx_len) in map_seq_out_ptr_ctx() argument 174 ctx_len, DMA_FROM_DEVICE); in map_seq_out_ptr_ctx() 181 append_seq_out_ptr(desc, state->ctx_dma, ctx_len, 0); in map_seq_out_ptr_ctx() 223 struct caam_hash_state *state, int ctx_len, in ctx_map_to_sec4_sg() argument 226 state->ctx_dma = dma_map_single(jrdev, state->caam_ctx, ctx_len, flag); in ctx_map_to_sec4_sg() 233 dma_to_sec4_sg_one(sec4_sg, state->ctx_dma, ctx_len, 0); in ctx_map_to_sec4_sg() 273 append_seq_load(desc, ctx->ctx_len, LDST_CLASS_2_CCB | in ahash_gen_sh_desc() 304 ahash_gen_sh_desc(desc, OP_ALG_AS_UPDATE, ctx->ctx_len, ctx, true, in ahash_set_sh_desc() 316 ahash_gen_sh_desc(desc, OP_ALG_AS_INIT, ctx->ctx_len, ctx, false, in ahash_set_sh_desc() [all …]
|
/Linux-v4.19/security/selinux/ |
D | xfrm.c | 91 str_len = uctx->ctx_len; in selinux_xfrm_alloc_user() 101 ctx->ctx_len = str_len; in selinux_xfrm_alloc_user() 306 new_ctx = kmemdup(old_ctx, sizeof(*old_ctx) + old_ctx->ctx_len, in selinux_xfrm_policy_clone() 374 ctx->ctx_len = str_len; in selinux_xfrm_state_alloc_acquire()
|
/Linux-v4.19/drivers/crypto/chelsio/ |
D | chcr_algo.h | 203 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 210 KEY_CONTEXT_CTX_LEN_V((ctx_len))) 212 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 219 TLS_KEYCTX_RXFLIT_CNT_V((ctx_len)))
|
/Linux-v4.19/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 142 rctx->cmd.u.sha.ctx_len = SHA1_DIGEST_SIZE; in ccp_do_sha_update() 145 rctx->cmd.u.sha.ctx_len = SHA224_DIGEST_SIZE; in ccp_do_sha_update() 148 rctx->cmd.u.sha.ctx_len = SHA256_DIGEST_SIZE; in ccp_do_sha_update() 151 rctx->cmd.u.sha.ctx_len = SHA384_DIGEST_SIZE; in ccp_do_sha_update() 154 rctx->cmd.u.sha.ctx_len = SHA512_DIGEST_SIZE; in ccp_do_sha_update()
|
D | ccp-ops.c | 1476 if (sha->ctx_len < SHA1_DIGEST_SIZE) in ccp_run_sha_cmd() 1481 if (sha->ctx_len < SHA224_DIGEST_SIZE) in ccp_run_sha_cmd() 1486 if (sha->ctx_len < SHA256_DIGEST_SIZE) in ccp_run_sha_cmd() 1492 || sha->ctx_len < SHA384_DIGEST_SIZE) in ccp_run_sha_cmd() 1498 || sha->ctx_len < SHA512_DIGEST_SIZE) in ccp_run_sha_cmd() 1778 hmac_cmd.u.sha.ctx_len = sha->ctx_len; in ccp_run_sha_cmd()
|
/Linux-v4.19/include/uapi/linux/ |
D | xfrm.h | 34 __u16 ctx_len; member 233 __u16 ctx_len; member
|
/Linux-v4.19/include/linux/ |
D | ccp.h | 289 u32 ctx_len; /* In bytes */ member
|
/Linux-v4.19/net/key/ |
D | af_key.c | 496 uctx->ctx_len = sec_ctx->sadb_x_ctx_len; in pfkey_sadb2xfrm_user_sec_ctx() 498 uctx->ctx_len); in pfkey_sadb2xfrm_user_sec_ctx() 814 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 1055 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in __pfkey_xfrm_state2msg() 1057 xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 2027 len += xfrm_ctx->ctx_len; in pfkey_xfrm_policy2sec_ctx_size() 2208 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_xfrm_policy2msg() 2210 xfrm_ctx->ctx_len); in pfkey_xfrm_policy2msg() 3169 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in pfkey_send_acquire() 3241 sec_ctx->sadb_x_ctx_len = xfrm_ctx->ctx_len; in pfkey_send_acquire() [all …]
|
/Linux-v4.19/net/xfrm/ |
D | xfrm_user.c | 112 if (uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len)) in verify_sec_ctx_len() 468 len += xfrm_ctx->ctx_len; in xfrm_user_sec_ctx_size() 796 int ctx_size = sizeof(*uctx) + s->ctx_len; in copy_sec_ctx() 807 uctx->ctx_len = s->ctx_len; in copy_sec_ctx() 808 memcpy(uctx + 1, s->ctx_str, s->ctx_len); in copy_sec_ctx() 2794 x->security->ctx_len); in xfrm_sa_len()
|