| /linux/tools/perf/util/bpf_skel/ |
| H A D | sample_filter.bpf.c | 74 static inline __u64 perf_get_sample(struct bpf_perf_event_data_kern *kctx, in perf_get_sample() argument 77 struct perf_sample_data___new *data = (void *)kctx->data; in perf_get_sample() 109 return kctx->data->ip; in perf_get_sample() 111 return kctx->data->id; in perf_get_sample() 114 return kctx->data->tid_entry.pid; in perf_get_sample() 116 return kctx->data->tid_entry.tid; in perf_get_sample() 118 return kctx->data->cpu_entry.cpu; in perf_get_sample() 120 return kctx->data->time; in perf_get_sample() 122 return kctx->data->addr; in perf_get_sample() 124 return kctx->data->period; in perf_get_sample() [all …]
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_crypto.c | 582 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, in gss_krb5_aes_encrypt() argument 593 if (kctx->initiate) { in gss_krb5_aes_encrypt() 594 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 595 aux_cipher = kctx->initiator_enc_aux; in gss_krb5_aes_encrypt() 596 ahash = kctx->initiator_integ; in gss_krb5_aes_encrypt() 598 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 599 aux_cipher = kctx->acceptor_enc_aux; in gss_krb5_aes_encrypt() 600 ahash = kctx->acceptor_integ; in gss_krb5_aes_encrypt() 625 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 651 buf->tail[0].iov_len += kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() [all …]
|
| H A D | gss_krb5_mech.c | 282 gss_krb5_alloc_hash_v2(struct krb5_ctx *kctx, const struct xdr_netobj *key) in gss_krb5_alloc_hash_v2() argument 286 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in gss_krb5_alloc_hash_v2() 496 struct krb5_ctx *kctx = internal_ctx; in gss_krb5_delete_sec_context() local 498 crypto_free_sync_skcipher(kctx->seq); in gss_krb5_delete_sec_context() 499 crypto_free_sync_skcipher(kctx->enc); in gss_krb5_delete_sec_context() 500 crypto_free_sync_skcipher(kctx->acceptor_enc); in gss_krb5_delete_sec_context() 501 crypto_free_sync_skcipher(kctx->initiator_enc); in gss_krb5_delete_sec_context() 502 crypto_free_sync_skcipher(kctx->acceptor_enc_aux); in gss_krb5_delete_sec_context() 503 crypto_free_sync_skcipher(kctx->initiator_enc_aux); in gss_krb5_delete_sec_context() 504 crypto_free_ahash(kctx->acceptor_sign); in gss_krb5_delete_sec_context() [all …]
|
| H A D | gss_krb5_wrap.c | 94 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, in gss_krb5_wrap_v2() argument 115 if ((kctx->flags & KRB5_CTX_FLAG_INITIATOR) == 0) in gss_krb5_wrap_v2() 117 if ((kctx->flags & KRB5_CTX_FLAG_ACCEPTOR_SUBKEY) != 0) in gss_krb5_wrap_v2() 131 *be64ptr = cpu_to_be64(atomic64_fetch_inc(&kctx->seq_send64)); in gss_krb5_wrap_v2() 133 err = (*kctx->gk5e->encrypt)(kctx, offset, buf, pages); in gss_krb5_wrap_v2() 138 return (kctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE; in gss_krb5_wrap_v2() 142 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, in gss_krb5_unwrap_v2() argument 164 if ((!kctx->initiate && (flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR)) || in gss_krb5_unwrap_v2() 165 (kctx->initiate && !(flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR))) in gss_krb5_unwrap_v2() 187 err = (*kctx->gk5e->decrypt)(kctx, offset, len, buf, in gss_krb5_unwrap_v2() [all …]
|
| H A D | gss_krb5_internal.h | 41 u32 (*encrypt)(struct krb5_ctx *kctx, u32 offset, 43 u32 (*decrypt)(struct krb5_ctx *kctx, u32 offset, u32 len, 45 u32 (*get_mic)(struct krb5_ctx *kctx, struct xdr_buf *text, 47 u32 (*verify_mic)(struct krb5_ctx *kctx, struct xdr_buf *message_buffer, 49 u32 (*wrap)(struct krb5_ctx *kctx, int offset, 51 u32 (*unwrap)(struct krb5_ctx *kctx, int offset, int len, 93 u32 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, 96 u32 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, 138 static inline int krb5_derive_key(struct krb5_ctx *kctx, in krb5_derive_key() argument 143 const struct gss_krb5_enctype *gk5e = kctx->gk5e; in krb5_derive_key() [all …]
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
| H A D | chtls_hw.c | 229 static void chtls_rxkey_ivauth(struct _key_ctx *kctx) in chtls_rxkey_ivauth() argument 231 kctx->iv_to_auth = cpu_to_be64(KEYCTX_TX_WR_IV_V(6ULL) | in chtls_rxkey_ivauth() 242 struct _key_ctx *kctx, in chtls_key_info() argument 308 kctx->ctx_hdr = FILL_KEY_CRX_HDR(ck_size, in chtls_key_info() 311 chtls_rxkey_ivauth(kctx); in chtls_key_info() 313 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chtls_key_info() 318 memcpy(kctx->salt, salt, salt_size); in chtls_key_info() 319 memcpy(kctx->key, key_p, keylen); in chtls_key_info() 320 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 353 struct _key_ctx *kctx; in chtls_setkey() local [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | type_cast.c | 26 struct xdp_buff *kctx = bpf_cast_to_kern_ctx(ctx); in md_xdp() local 29 dev = kctx->rxq->dev; in md_xdp() 73 u64 *kctx = bpf_core_cast(ctx, u64); in kctx_u64() local 75 (void)kctx; in kctx_u64()
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.c | 78 struct ktls_key_ctx *kctx = &tx_info->key_ctx; in chcr_ktls_save_keys() local 151 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chcr_ktls_save_keys() 159 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 160 memcpy(kctx->key, key, keylen); in chcr_ktls_save_keys() 161 memcpy(kctx->key + keylen, ghash_h, ghash_size); in chcr_ktls_save_keys()
|