/linux-4.1.27/drivers/crypto/ |
H A D | mxs-dcp.c | 151 static int mxs_dcp_start_dma(struct dcp_async_ctx *actx) mxs_dcp_start_dma() argument 154 const int chan = actx->chan; mxs_dcp_start_dma() 157 struct dcp_dma_desc *desc = &sdcp->coh->desc[actx->chan]; mxs_dcp_start_dma() 196 static int mxs_dcp_run_aes(struct dcp_async_ctx *actx, mxs_dcp_run_aes() argument 200 struct dcp_dma_desc *desc = &sdcp->coh->desc[actx->chan]; mxs_dcp_run_aes() 235 desc->size = actx->fill; mxs_dcp_run_aes() 239 ret = mxs_dcp_start_dma(actx); mxs_dcp_run_aes() 254 struct dcp_async_ctx *actx = crypto_tfm_ctx(arq->tfm); mxs_dcp_aes_block_crypt() local 275 actx->fill = 0; mxs_dcp_aes_block_crypt() 278 memcpy(key, actx->key, actx->key_len); mxs_dcp_aes_block_crypt() 294 if (actx->fill + len > out_off) mxs_dcp_aes_block_crypt() 295 clen = out_off - actx->fill; mxs_dcp_aes_block_crypt() 299 memcpy(in_buf + actx->fill, src_buf, clen); mxs_dcp_aes_block_crypt() 302 actx->fill += clen; mxs_dcp_aes_block_crypt() 308 if (actx->fill == out_off || sg_is_last(src)) { mxs_dcp_aes_block_crypt() 309 ret = mxs_dcp_run_aes(actx, req, init); mxs_dcp_aes_block_crypt() 315 while (dst && actx->fill) { mxs_dcp_aes_block_crypt() 321 actx->fill); mxs_dcp_aes_block_crypt() 326 actx->fill -= rem; mxs_dcp_aes_block_crypt() 399 struct dcp_async_ctx *actx = crypto_tfm_ctx(arq->tfm); mxs_dcp_aes_enqueue() local 403 if (unlikely(actx->key_len != AES_KEYSIZE_128)) mxs_dcp_aes_enqueue() 408 actx->chan = DCP_CHAN_CRYPTO; mxs_dcp_aes_enqueue() 410 mutex_lock(&sdcp->mutex[actx->chan]); mxs_dcp_aes_enqueue() 411 ret = crypto_enqueue_request(&sdcp->queue[actx->chan], &req->base); mxs_dcp_aes_enqueue() 412 mutex_unlock(&sdcp->mutex[actx->chan]); mxs_dcp_aes_enqueue() 414 wake_up_process(sdcp->thread[actx->chan]); mxs_dcp_aes_enqueue() 442 struct dcp_async_ctx *actx = crypto_ablkcipher_ctx(tfm); mxs_dcp_aes_setkey() local 450 actx->key_len = len; mxs_dcp_aes_setkey() 452 memcpy(actx->key, key, len); mxs_dcp_aes_setkey() 467 actx->fallback->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; mxs_dcp_aes_setkey() 468 actx->fallback->base.crt_flags |= mxs_dcp_aes_setkey() 471 ret = crypto_ablkcipher_setkey(actx->fallback, key, len); mxs_dcp_aes_setkey() 477 actx->fallback->base.crt_flags & CRYPTO_TFM_RES_MASK; mxs_dcp_aes_setkey() 486 struct dcp_async_ctx *actx = crypto_tfm_ctx(tfm); mxs_dcp_aes_fallback_init() local 493 actx->fallback = blk; mxs_dcp_aes_fallback_init() 500 struct dcp_async_ctx *actx = crypto_tfm_ctx(tfm); mxs_dcp_aes_fallback_exit() local 502 crypto_free_ablkcipher(actx->fallback); mxs_dcp_aes_fallback_exit() 503 actx->fallback = NULL; mxs_dcp_aes_fallback_exit() 515 struct dcp_async_ctx *actx = crypto_ahash_ctx(tfm); mxs_dcp_run_sha() local 519 struct dcp_dma_desc *desc = &sdcp->coh->desc[actx->chan]; mxs_dcp_run_sha() 532 desc->control1 = actx->alg; mxs_dcp_run_sha() 536 desc->size = actx->fill; mxs_dcp_run_sha() 548 ret = mxs_dcp_start_dma(actx); mxs_dcp_run_sha() 565 struct dcp_async_ctx *actx = crypto_ahash_ctx(tfm); dcp_sha_req_to_buf() local 588 if (actx->fill + len > DCP_BUF_SZ) dcp_sha_req_to_buf() 589 clen = DCP_BUF_SZ - actx->fill; dcp_sha_req_to_buf() 593 memcpy(in_buf + actx->fill, src_buf, clen); dcp_sha_req_to_buf() 596 actx->fill += clen; dcp_sha_req_to_buf() 602 if (len && actx->fill == DCP_BUF_SZ) { dcp_sha_req_to_buf() 606 actx->fill = 0; dcp_sha_req_to_buf() 623 actx->fill = 0; dcp_sha_req_to_buf() 679 struct dcp_async_ctx *actx = crypto_ahash_ctx(tfm); dcp_sha_init() local 687 memset(actx, 0, sizeof(*actx)); dcp_sha_init() 690 actx->alg = MXS_DCP_CONTROL1_HASH_SELECT_SHA1; dcp_sha_init() 692 actx->alg = MXS_DCP_CONTROL1_HASH_SELECT_SHA256; dcp_sha_init() 694 actx->fill = 0; dcp_sha_init() 695 actx->hot = 0; dcp_sha_init() 696 actx->chan = DCP_CHAN_HASH_SHA; dcp_sha_init() 698 mutex_init(&actx->mutex); dcp_sha_init() 709 struct dcp_async_ctx *actx = crypto_ahash_ctx(tfm); dcp_sha_update_fx() local 720 mutex_lock(&actx->mutex); dcp_sha_update_fx() 724 if (!actx->hot) { dcp_sha_update_fx() 725 actx->hot = 1; dcp_sha_update_fx() 729 mutex_lock(&sdcp->mutex[actx->chan]); dcp_sha_update_fx() 730 ret = crypto_enqueue_request(&sdcp->queue[actx->chan], &req->base); dcp_sha_update_fx() 731 mutex_unlock(&sdcp->mutex[actx->chan]); dcp_sha_update_fx() 733 wake_up_process(sdcp->thread[actx->chan]); dcp_sha_update_fx() 734 mutex_unlock(&actx->mutex); dcp_sha_update_fx()
|
/linux-4.1.27/fs/ntfs/ |
H A D | index.c | 61 if (ictx->actx) ntfs_index_ctx_put() 62 ntfs_attr_put_search_ctx(ictx->actx); ntfs_index_ctx_put() 132 ntfs_attr_search_ctx *actx; ntfs_index_lookup() local 158 actx = ntfs_attr_get_search_ctx(base_ni, m); ntfs_index_lookup() 159 if (unlikely(!actx)) { ntfs_index_lookup() 165 CASE_SENSITIVE, 0, NULL, 0, actx); ntfs_index_lookup() 175 ir = (INDEX_ROOT*)((u8*)actx->attr + ntfs_index_lookup() 176 le16_to_cpu(actx->attr->data.resident.value_offset)); ntfs_index_lookup() 187 if ((u8*)ie < (u8*)actx->mrec || (u8*)ie + ntfs_index_lookup() 211 ictx->actx = actx; ntfs_index_lookup() 268 ntfs_attr_put_search_ctx(actx); ntfs_index_lookup() 271 actx = NULL; ntfs_index_lookup() 380 ictx->actx = NULL; ntfs_index_lookup() 446 if (actx) ntfs_index_lookup() 447 ntfs_attr_put_search_ctx(actx); ntfs_index_lookup()
|
H A D | index.h | 42 * @actx: attribute search context if @is_in_root and NULL otherwise 54 * by the attribute search context @actx and the base inode @base_ni. @ia and 59 * is in, respectively. @ir, @actx and @base_ni are NULL in this case. 82 ntfs_attr_search_ctx *actx; member in struct:__anon11134 114 flush_dcache_mft_record_page(ictx->actx->ntfs_ino); ntfs_index_entry_flush_dcache_page() 140 mark_mft_record_dirty(ictx->actx->ntfs_ino); ntfs_index_entry_mark_dirty()
|
/linux-4.1.27/security/selinux/include/ |
H A D | audit.h | 49 * @actx: the audit context (can be NULL) associated with the check 55 struct audit_context *actx);
|
/linux-4.1.27/security/integrity/ima/ |
H A D | ima.h | 242 struct audit_context *actx) security_filter_rule_match() 240 security_filter_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) security_filter_rule_match() argument
|
/linux-4.1.27/security/ |
H A D | security.c | 1486 struct audit_context *actx) security_audit_rule_match() 1488 return security_ops->audit_rule_match(secid, field, op, lsmrule, actx); security_audit_rule_match() 1485 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) security_audit_rule_match() argument
|
H A D | capability.c | 930 struct audit_context *actx) cap_audit_rule_match() 929 cap_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) cap_audit_rule_match() argument
|
/linux-4.1.27/include/linux/ |
H A D | security.h | 1414 * @actx points to the audit context associated with the check. 1755 struct audit_context *actx); 3140 struct audit_context *actx); 3157 void *lsmrule, struct audit_context *actx) security_audit_rule_match() 3156 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) security_audit_rule_match() argument
|
/linux-4.1.27/security/smack/ |
H A D | smack_lsm.c | 4141 * @actx: audit context associated with the check 4147 struct audit_context *actx) smack_audit_rule_match() 4146 smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct audit_context *actx) smack_audit_rule_match() argument
|
/linux-4.1.27/security/selinux/ss/ |
H A D | services.c | 2975 struct audit_context *actx) selinux_audit_rule_match() 2974 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, struct audit_context *actx) selinux_audit_rule_match() argument
|