Home
last modified time | relevance | path

Searched refs:kctx (Results 1 – 8 of 8) sorted by relevance

/openbmc/linux/tools/perf/util/bpf_skel/
H A Dsample_filter.bpf.c57 return kctx->data->ip; in perf_get_sample()
59 return kctx->data->id; in perf_get_sample()
66 return kctx->data->cpu_entry.cpu; in perf_get_sample()
68 return kctx->data->time; in perf_get_sample()
70 return kctx->data->addr; in perf_get_sample()
72 return kctx->data->period; in perf_get_sample()
74 return kctx->data->txn; in perf_get_sample()
84 return kctx->data->weight.full; in perf_get_sample()
86 return kctx->data->phys_addr; in perf_get_sample()
119 return kctx->data->data_src.val; in perf_get_sample()
[all …]
/openbmc/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c246 kctx->gk5e->keylength); in make_checksum()
268 switch (kctx->gk5e->ctype) { in make_checksum()
792 if (kctx->initiate) { in gss_krb5_aes_encrypt()
793 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
797 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
868 if (kctx->initiate) { in gss_krb5_aes_decrypt()
869 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
1022 if (kctx->initiate) { in krb5_etm_encrypt()
1027 cipher = kctx->acceptor_enc; in krb5_etm_encrypt()
1111 if (kctx->initiate) { in krb5_etm_decrypt()
[all …]
H A Dgss_krb5_wrap.c94 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, in gss_krb5_wrap_v2() argument
115 if ((kctx->flags & KRB5_CTX_FLAG_INITIATOR) == 0) in gss_krb5_wrap_v2()
117 if ((kctx->flags & KRB5_CTX_FLAG_ACCEPTOR_SUBKEY) != 0) in gss_krb5_wrap_v2()
131 *be64ptr = cpu_to_be64(atomic64_fetch_inc(&kctx->seq_send64)); in gss_krb5_wrap_v2()
133 err = (*kctx->gk5e->encrypt)(kctx, offset, buf, pages); in gss_krb5_wrap_v2()
138 return (kctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE; in gss_krb5_wrap_v2()
142 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, in gss_krb5_unwrap_v2() argument
164 if ((!kctx->initiate && (flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR)) || in gss_krb5_unwrap_v2()
165 (kctx->initiate && !(flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR))) in gss_krb5_unwrap_v2()
187 err = (*kctx->gk5e->decrypt)(kctx, offset, len, buf, in gss_krb5_unwrap_v2()
[all …]
H A Dgss_krb5_internal.h41 u32 (*encrypt)(struct krb5_ctx *kctx, u32 offset,
43 u32 (*decrypt)(struct krb5_ctx *kctx, u32 offset, u32 len,
45 u32 (*get_mic)(struct krb5_ctx *kctx, struct xdr_buf *text,
49 u32 (*wrap)(struct krb5_ctx *kctx, int offset,
51 u32 (*unwrap)(struct krb5_ctx *kctx, int offset, int len,
93 u32 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset,
96 u32 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len,
138 static inline int krb5_derive_key(struct krb5_ctx *kctx, in krb5_derive_key() argument
143 const struct gss_krb5_enctype *gk5e = kctx->gk5e; in krb5_derive_key()
182 u32 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset,
[all …]
H A Dgss_krb5_mech.c496 struct krb5_ctx *kctx = internal_ctx; in gss_krb5_delete_sec_context() local
498 crypto_free_sync_skcipher(kctx->seq); in gss_krb5_delete_sec_context()
499 crypto_free_sync_skcipher(kctx->enc); in gss_krb5_delete_sec_context()
504 crypto_free_ahash(kctx->acceptor_sign); in gss_krb5_delete_sec_context()
505 crypto_free_ahash(kctx->initiator_sign); in gss_krb5_delete_sec_context()
508 kfree(kctx->mech_used.data); in gss_krb5_delete_sec_context()
509 kfree(kctx); in gss_krb5_delete_sec_context()
528 return kctx->gk5e->get_mic(kctx, text, token); in gss_krb5_get_mic()
550 return kctx->gk5e->verify_mic(kctx, message_buffer, read_token); in gss_krb5_verify_mic()
570 return kctx->gk5e->wrap(kctx, offset, buf, pages); in gss_krb5_wrap()
[all …]
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dtype_cast.c28 struct xdp_buff *kctx = bpf_cast_to_kern_ctx(ctx); in md_xdp() local
31 dev = kctx->rxq->dev; in md_xdp()
76 u64 *kctx = bpf_rdonly_cast(ctx, bpf_core_type_id_kernel(u64)); in kctx_u64() local
78 (void)kctx; in kctx_u64()
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c238 static void chtls_rxkey_ivauth(struct _key_ctx *kctx) in chtls_rxkey_ivauth() argument
240 kctx->iv_to_auth = cpu_to_be64(KEYCTX_TX_WR_IV_V(6ULL) | in chtls_rxkey_ivauth()
251 struct _key_ctx *kctx, in chtls_key_info() argument
317 kctx->ctx_hdr = FILL_KEY_CRX_HDR(ck_size, in chtls_key_info()
320 chtls_rxkey_ivauth(kctx); in chtls_key_info()
322 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chtls_key_info()
327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
328 memcpy(kctx->key, key_p, keylen); in chtls_key_info()
329 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info()
362 struct _key_ctx *kctx; in chtls_setkey() local
[all …]
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
H A Dchcr_ktls.c77 struct ktls_key_ctx *kctx = &tx_info->key_ctx; in chcr_ktls_save_keys() local
150 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chcr_ktls_save_keys()
158 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys()
159 memcpy(kctx->key, key, keylen); in chcr_ktls_save_keys()
160 memcpy(kctx->key + keylen, ghash_h, ghash_size); in chcr_ktls_save_keys()