Home
last modified time | relevance | path

Searched refs:tfms (Results 1 – 9 of 9) sorted by relevance

/Linux-v5.10/net/xfrm/
Dxfrm_ipcomp.c29 struct crypto_comp * __percpu *tfms; member
46 struct crypto_comp *tfm = *per_cpu_ptr(ipcd->tfms, cpu); in ipcomp_decompress()
146 tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_compress()
243 static void ipcomp_free_tfms(struct crypto_comp * __percpu *tfms) in ipcomp_free_tfms() argument
249 if (pos->tfms == tfms) in ipcomp_free_tfms()
261 if (!tfms) in ipcomp_free_tfms()
265 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); in ipcomp_free_tfms()
268 free_percpu(tfms); in ipcomp_free_tfms()
274 struct crypto_comp * __percpu *tfms; in ipcomp_alloc_tfms() local
282 tfm = this_cpu_read(*pos->tfms); in ipcomp_alloc_tfms()
[all …]
/Linux-v5.10/arch/x86/boot/
Dcpuflags.c90 u32 tfms; in get_cpuflags() local
106 cpuid(0x1, &tfms, &ignored, &cpu.flags[4], in get_cpuflags()
108 cpu.level = (tfms >> 8) & 15; in get_cpuflags()
110 cpu.model = (tfms >> 4) & 15; in get_cpuflags()
112 cpu.model += ((tfms >> 16) & 0xf) << 4; in get_cpuflags()
/Linux-v5.10/block/
Dblk-crypto-fallback.c77 struct crypto_skcipher *tfms[BLK_ENCRYPTION_MODE_MAX]; member
99 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], blank_key, in blk_crypto_evict_keyslot()
119 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], key->raw, in blk_crypto_keyslot_program()
195 ciph_req = skcipher_request_alloc(slotp->tfms[slotp->crypto_mode], in blk_crypto_alloc_cipher_req()
625 slotp->tfms[mode_num] = crypto_alloc_skcipher(cipher_str, 0, 0); in blk_crypto_fallback_start_using_mode()
626 if (IS_ERR(slotp->tfms[mode_num])) { in blk_crypto_fallback_start_using_mode()
627 err = PTR_ERR(slotp->tfms[mode_num]); in blk_crypto_fallback_start_using_mode()
633 slotp->tfms[mode_num] = NULL; in blk_crypto_fallback_start_using_mode()
637 crypto_skcipher_set_flags(slotp->tfms[mode_num], in blk_crypto_fallback_start_using_mode()
651 crypto_free_skcipher(slotp->tfms[mode_num]); in blk_crypto_fallback_start_using_mode()
[all …]
/Linux-v5.10/net/ipv6/
Dseg6_hmac.c131 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac()
366 algo->tfms = alloc_percpu(struct crypto_shash *); in seg6_hmac_init_algo()
367 if (!algo->tfms) in seg6_hmac_init_algo()
374 p_tfm = per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_init_algo()
378 p_tfm = raw_cpu_ptr(algo->tfms); in seg6_hmac_init_algo()
429 tfm = *per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_exit()
432 free_percpu(algo->tfms); in seg6_hmac_exit()
/Linux-v5.10/include/net/
Dipcomp.h13 struct crypto_comp * __percpu *tfms; member
Dseg6_hmac.h38 struct crypto_shash * __percpu *tfms; member
/Linux-v5.10/drivers/md/
Ddm-crypt.c174 struct crypto_skcipher **tfms; member
245 return cc->cipher_tfm.tfms[0]; in any_tfm()
1465 skcipher_request_set_tfm(ctx->r.req, cc->cipher_tfm.tfms[key_index]); in crypt_alloc_req_skcipher()
2127 if (!cc->cipher_tfm.tfms) in crypt_free_tfms_skcipher()
2131 if (cc->cipher_tfm.tfms[i] && !IS_ERR(cc->cipher_tfm.tfms[i])) { in crypt_free_tfms_skcipher()
2132 crypto_free_skcipher(cc->cipher_tfm.tfms[i]); in crypt_free_tfms_skcipher()
2133 cc->cipher_tfm.tfms[i] = NULL; in crypt_free_tfms_skcipher()
2136 kfree(cc->cipher_tfm.tfms); in crypt_free_tfms_skcipher()
2137 cc->cipher_tfm.tfms = NULL; in crypt_free_tfms_skcipher()
2153 cc->cipher_tfm.tfms = kcalloc(cc->tfms_count, in crypt_alloc_tfms_skcipher()
[all …]
/Linux-v5.10/arch/x86/kernel/cpu/
Dcommon.c833 u32 junk, tfms, cap0, misc; in cpu_detect() local
835 cpuid(0x00000001, &tfms, &misc, &junk, &cap0); in cpu_detect()
836 c->x86 = x86_family(tfms); in cpu_detect()
837 c->x86_model = x86_model(tfms); in cpu_detect()
838 c->x86_stepping = x86_stepping(tfms); in cpu_detect()
/Linux-v5.10/drivers/gpu/drm/gma500/
Dmmu.c473 uint32_t tfms, misc, cap0, cap4, clflush_size; in psb_mmu_driver_init() local
480 cpuid(0x00000001, &tfms, &misc, &cap0, &cap4); in psb_mmu_driver_init()