/kernel/linux/linux-6.6/tools/perf/util/bpf_skel/ |
H A D | sample_filter.bpf.c | 46 static inline __u64 perf_get_sample(struct bpf_perf_event_data_kern *kctx, in perf_get_sample() argument 49 struct perf_sample_data___new *data = (void *)kctx->data; in perf_get_sample() 57 return kctx->data->ip; in perf_get_sample() 59 return kctx->data->id; in perf_get_sample() 62 return kctx->data->tid_entry.pid; in perf_get_sample() 64 return kctx->data->tid_entry.tid; in perf_get_sample() 66 return kctx->data->cpu_entry.cpu; in perf_get_sample() 68 return kctx->data->time; in perf_get_sample() 70 return kctx->data->addr; in perf_get_sample() 72 return kctx in perf_get_sample() 138 struct bpf_perf_event_data_kern *kctx; perf_sample_filter() local [all...] |
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | gss_krb5_wrap.c | 158 gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset, in gss_wrap_kerberos_v1() argument 171 u32 conflen = kctx->gk5e->conflen; in gss_wrap_kerberos_v1() 177 blocksize = crypto_sync_skcipher_blocksize(kctx->enc); in gss_wrap_kerberos_v1() 182 headlen = g_token_size(&kctx->mech_used, in gss_wrap_kerberos_v1() 183 GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength + plainlen) - in gss_wrap_kerberos_v1() 193 g_make_token_header(&kctx->mech_used, in gss_wrap_kerberos_v1() 195 kctx->gk5e->cksumlength + plainlen, &ptr); in gss_wrap_kerberos_v1() 202 msg_start = ptr + GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength; in gss_wrap_kerberos_v1() 209 *(__le16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); in gss_wrap_kerberos_v1() 210 *(__le16 *)(ptr + 4) = cpu_to_le16(kctx in gss_wrap_kerberos_v1() 247 gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, int len, struct xdr_buf *buf, unsigned int *slack, unsigned int *align) gss_unwrap_kerberos_v1() argument 409 gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf, struct page **pages) gss_wrap_kerberos_v2() argument 460 gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, int len, struct xdr_buf *buf, unsigned int *slack, unsigned int *align) gss_unwrap_kerberos_v2() argument 564 struct krb5_ctx *kctx = gctx->internal_ctx_id; gss_wrap_kerberos() local 582 struct krb5_ctx *kctx = gctx->internal_ctx_id; gss_unwrap_kerberos() local [all...] |
H A D | gss_krb5_crypto.c | 147 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum() argument 158 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum() 160 __func__, cksumout->len, kctx->gk5e->name); in make_checksum() 168 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum() 182 kctx->gk5e->keylength); in make_checksum() 204 switch (kctx->gk5e->ctype) { in make_checksum() 206 err = kctx->gk5e->encrypt(kctx->seq, NULL, checksumdata, in make_checksum() 211 checksumdata + checksumlen - kctx->gk5e->cksumlength, in make_checksum() 212 kctx in make_checksum() 239 make_checksum_v2(struct krb5_ctx *kctx, char *header, int hdrlen, struct xdr_buf *body, int body_offset, u8 *cksumkey, unsigned int usage, struct xdr_netobj *cksumout) make_checksum_v2() argument 599 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf, struct page **pages) gss_krb5_aes_encrypt() argument 720 gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, u32 len, struct xdr_buf *buf, u32 *headskip, u32 *tailskip) gss_krb5_aes_decrypt() argument [all...] |
H A D | gss_krb5_seqnum.c | 43 krb5_make_seq_num(struct krb5_ctx *kctx, in krb5_make_seq_num() argument 72 krb5_get_seq_num(struct krb5_ctx *kctx, in krb5_get_seq_num() argument 79 struct crypto_sync_skcipher *key = kctx->seq; in krb5_get_seq_num()
|
H A D | gss_krb5_mech.c | 590 struct krb5_ctx *kctx = internal_ctx; in gss_delete_sec_context_kerberos() local 592 crypto_free_sync_skcipher(kctx->seq); in gss_delete_sec_context_kerberos() 593 crypto_free_sync_skcipher(kctx->enc); in gss_delete_sec_context_kerberos() 594 crypto_free_sync_skcipher(kctx->acceptor_enc); in gss_delete_sec_context_kerberos() 595 crypto_free_sync_skcipher(kctx->initiator_enc); in gss_delete_sec_context_kerberos() 596 crypto_free_sync_skcipher(kctx->acceptor_enc_aux); in gss_delete_sec_context_kerberos() 597 crypto_free_sync_skcipher(kctx->initiator_enc_aux); in gss_delete_sec_context_kerberos() 598 kfree(kctx->mech_used.data); in gss_delete_sec_context_kerberos() 599 kfree(kctx); in gss_delete_sec_context_kerberos()
|
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 211 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum() argument 222 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum() 224 __func__, cksumout->len, kctx->gk5e->name); in make_checksum() 232 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum() 246 kctx->gk5e->keylength); in make_checksum() 268 switch (kctx->gk5e->ctype) { in make_checksum() 270 err = krb5_encrypt(kctx->seq, NULL, checksumdata, in make_checksum() 275 checksumdata + checksumlen - kctx->gk5e->cksumlength, in make_checksum() 276 kctx->gk5e->cksumlength); in make_checksum() 279 memcpy(cksumout->data, checksumdata, kctx in make_checksum() 781 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf, struct page **pages) gss_krb5_aes_encrypt() argument 857 gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, u32 len, struct xdr_buf *buf, u32 *headskip, u32 *tailskip) gss_krb5_aes_decrypt() argument 1012 krb5_etm_encrypt(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf, struct page **pages) krb5_etm_encrypt() argument 1100 krb5_etm_decrypt(struct krb5_ctx *kctx, u32 offset, u32 len, struct xdr_buf *buf, u32 *headskip, u32 *tailskip) krb5_etm_decrypt() argument [all...] |
H A D | gss_krb5_mech.c | 282 gss_krb5_alloc_hash_v2(struct krb5_ctx *kctx, const struct xdr_netobj *key) in gss_krb5_alloc_hash_v2() argument 286 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in gss_krb5_alloc_hash_v2() 496 struct krb5_ctx *kctx = internal_ctx; in gss_krb5_delete_sec_context() local 498 crypto_free_sync_skcipher(kctx->seq); in gss_krb5_delete_sec_context() 499 crypto_free_sync_skcipher(kctx->enc); in gss_krb5_delete_sec_context() 500 crypto_free_sync_skcipher(kctx->acceptor_enc); in gss_krb5_delete_sec_context() 501 crypto_free_sync_skcipher(kctx->initiator_enc); in gss_krb5_delete_sec_context() 502 crypto_free_sync_skcipher(kctx->acceptor_enc_aux); in gss_krb5_delete_sec_context() 503 crypto_free_sync_skcipher(kctx->initiator_enc_aux); in gss_krb5_delete_sec_context() 504 crypto_free_ahash(kctx in gss_krb5_delete_sec_context() 526 struct krb5_ctx *kctx = gctx->internal_ctx_id; gss_krb5_get_mic() local 548 struct krb5_ctx *kctx = gctx->internal_ctx_id; gss_krb5_verify_mic() local 568 struct krb5_ctx *kctx = gctx->internal_ctx_id; gss_krb5_wrap() local 590 struct krb5_ctx *kctx = gctx->internal_ctx_id; gss_krb5_unwrap() local [all...] |
H A D | gss_krb5_internal.h | 41 u32 (*encrypt)(struct krb5_ctx *kctx, u32 offset, 43 u32 (*decrypt)(struct krb5_ctx *kctx, u32 offset, u32 len, 45 u32 (*get_mic)(struct krb5_ctx *kctx, struct xdr_buf *text, 47 u32 (*verify_mic)(struct krb5_ctx *kctx, struct xdr_buf *message_buffer, 49 u32 (*wrap)(struct krb5_ctx *kctx, int offset, 51 u32 (*unwrap)(struct krb5_ctx *kctx, int offset, int len, 93 u32 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, 96 u32 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, 126 * @kctx: Kerberos 5 context 138 static inline int krb5_derive_key(struct krb5_ctx *kctx, in krb5_derive_key() argument [all...] |
H A D | gss_krb5_wrap.c | 94 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, in gss_krb5_wrap_v2() argument 115 if ((kctx->flags & KRB5_CTX_FLAG_INITIATOR) == 0) in gss_krb5_wrap_v2() 117 if ((kctx->flags & KRB5_CTX_FLAG_ACCEPTOR_SUBKEY) != 0) in gss_krb5_wrap_v2() 131 *be64ptr = cpu_to_be64(atomic64_fetch_inc(&kctx->seq_send64)); in gss_krb5_wrap_v2() 133 err = (*kctx->gk5e->encrypt)(kctx, offset, buf, pages); in gss_krb5_wrap_v2() 138 return (kctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE; in gss_krb5_wrap_v2() 142 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, in gss_krb5_unwrap_v2() argument 164 if ((!kctx->initiate && (flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR)) || in gss_krb5_unwrap_v2() 165 (kctx in gss_krb5_unwrap_v2() [all...] |
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 238 static void chtls_rxkey_ivauth(struct _key_ctx *kctx) in chtls_rxkey_ivauth() argument 240 kctx->iv_to_auth = cpu_to_be64(KEYCTX_TX_WR_IV_V(6ULL) | in chtls_rxkey_ivauth() 251 struct _key_ctx *kctx, in chtls_key_info() 317 kctx->ctx_hdr = FILL_KEY_CRX_HDR(ck_size, in chtls_key_info() 320 chtls_rxkey_ivauth(kctx); in chtls_key_info() 322 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info() 328 memcpy(kctx->key, key_p, keylen); in chtls_key_info() 329 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 362 struct _key_ctx *kctx; in chtls_setkey() local 250 chtls_key_info(struct chtls_sock *csk, struct _key_ctx *kctx, u32 keylen, u32 optname, int cipher_type) chtls_key_info() argument [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 238 static void chtls_rxkey_ivauth(struct _key_ctx *kctx) in chtls_rxkey_ivauth() argument 240 kctx->iv_to_auth = cpu_to_be64(KEYCTX_TX_WR_IV_V(6ULL) | in chtls_rxkey_ivauth() 251 struct _key_ctx *kctx, in chtls_key_info() 317 kctx->ctx_hdr = FILL_KEY_CRX_HDR(ck_size, in chtls_key_info() 320 chtls_rxkey_ivauth(kctx); in chtls_key_info() 322 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info() 328 memcpy(kctx->key, key_p, keylen); in chtls_key_info() 329 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 362 struct _key_ctx *kctx; in chtls_setkey() local 250 chtls_key_info(struct chtls_sock *csk, struct _key_ctx *kctx, u32 keylen, u32 optname, int cipher_type) chtls_key_info() argument [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | type_cast.c | 28 struct xdp_buff *kctx = bpf_cast_to_kern_ctx(ctx); in md_xdp() local 31 dev = kctx->rxq->dev; in md_xdp() 76 u64 *kctx = bpf_rdonly_cast(ctx, bpf_core_type_id_kernel(u64)); in kctx_u64() local 78 (void)kctx; in kctx_u64()
|
/kernel/linux/linux-5.10/include/linux/sunrpc/ |
H A D | gss_krb5.h | 84 u32 (*encrypt_v2) (struct krb5_ctx *kctx, u32 offset, 87 u32 (*decrypt_v2) (struct krb5_ctx *kctx, u32 offset, u32 len, 237 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, 278 krb5_make_seq_num(struct krb5_ctx *kctx, 284 krb5_get_seq_num(struct krb5_ctx *kctx, 309 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, 314 gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, u32 len,
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.c | 77 struct ktls_key_ctx *kctx = &tx_info->key_ctx; in chcr_ktls_save_keys() local 154 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chcr_ktls_save_keys() 162 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 163 memcpy(kctx->key, key, keylen); in chcr_ktls_save_keys() 164 memcpy(kctx->key + keylen, ghash_h, ghash_size); in chcr_ktls_save_keys()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.c | 77 struct ktls_key_ctx *kctx = &tx_info->key_ctx; in chcr_ktls_save_keys() local 150 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chcr_ktls_save_keys() 158 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 159 memcpy(kctx->key, key, keylen); in chcr_ktls_save_keys() 160 memcpy(kctx->key + keylen, ghash_h, ghash_size); in chcr_ktls_save_keys()
|