Searched refs:tfms (Results 1 – 9 of 9) sorted by relevance
/Linux-v6.1/net/xfrm/ |
D | xfrm_ipcomp.c | 29 struct crypto_comp * __percpu *tfms; member 45 struct crypto_comp *tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_decompress() 137 tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_compress() 235 static void ipcomp_free_tfms(struct crypto_comp * __percpu *tfms) in ipcomp_free_tfms() argument 241 if (pos->tfms == tfms) in ipcomp_free_tfms() 253 if (!tfms) in ipcomp_free_tfms() 257 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); in ipcomp_free_tfms() 260 free_percpu(tfms); in ipcomp_free_tfms() 266 struct crypto_comp * __percpu *tfms; in ipcomp_alloc_tfms() local 274 tfm = this_cpu_read(*pos->tfms); in ipcomp_alloc_tfms() [all …]
|
/Linux-v6.1/arch/x86/boot/ |
D | cpuflags.c | 89 u32 tfms; in get_cpuflags() local 105 cpuid(0x1, &tfms, &ignored, &cpu.flags[4], in get_cpuflags() 107 cpu.level = (tfms >> 8) & 15; in get_cpuflags() 109 cpu.model = (tfms >> 4) & 15; in get_cpuflags() 111 cpu.model += ((tfms >> 16) & 0xf) << 4; in get_cpuflags()
|
/Linux-v6.1/block/ |
D | blk-crypto-fallback.c | 78 struct crypto_skcipher *tfms[BLK_ENCRYPTION_MODE_MAX]; member 101 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], blank_key, in blk_crypto_fallback_evict_keyslot() 122 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], key->raw, in blk_crypto_fallback_keyslot_program() 196 ciph_req = skcipher_request_alloc(slotp->tfms[slotp->crypto_mode], in blk_crypto_fallback_alloc_cipher_req() 636 slotp->tfms[mode_num] = crypto_alloc_skcipher(cipher_str, 0, 0); in blk_crypto_fallback_start_using_mode() 637 if (IS_ERR(slotp->tfms[mode_num])) { in blk_crypto_fallback_start_using_mode() 638 err = PTR_ERR(slotp->tfms[mode_num]); in blk_crypto_fallback_start_using_mode() 644 slotp->tfms[mode_num] = NULL; in blk_crypto_fallback_start_using_mode() 648 crypto_skcipher_set_flags(slotp->tfms[mode_num], in blk_crypto_fallback_start_using_mode() 662 crypto_free_skcipher(slotp->tfms[mode_num]); in blk_crypto_fallback_start_using_mode() [all …]
|
/Linux-v6.1/net/ipv6/ |
D | seg6_hmac.c | 130 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac() 365 algo->tfms = alloc_percpu(struct crypto_shash *); in seg6_hmac_init_algo() 366 if (!algo->tfms) in seg6_hmac_init_algo() 373 p_tfm = per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_init_algo() 377 p_tfm = raw_cpu_ptr(algo->tfms); in seg6_hmac_init_algo() 424 tfm = *per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_exit() 427 free_percpu(algo->tfms); in seg6_hmac_exit()
|
/Linux-v6.1/include/net/ |
D | ipcomp.h | 15 struct crypto_comp * __percpu *tfms; member
|
D | seg6_hmac.h | 38 struct crypto_shash * __percpu *tfms; member
|
/Linux-v6.1/drivers/md/ |
D | dm-crypt.c | 178 struct crypto_skcipher **tfms; member 249 return cc->cipher_tfm.tfms[0]; in any_tfm() 1475 skcipher_request_set_tfm(ctx->r.req, cc->cipher_tfm.tfms[key_index]); in crypt_alloc_req_skcipher() 2262 if (!cc->cipher_tfm.tfms) in crypt_free_tfms_skcipher() 2266 if (cc->cipher_tfm.tfms[i] && !IS_ERR(cc->cipher_tfm.tfms[i])) { in crypt_free_tfms_skcipher() 2267 crypto_free_skcipher(cc->cipher_tfm.tfms[i]); in crypt_free_tfms_skcipher() 2268 cc->cipher_tfm.tfms[i] = NULL; in crypt_free_tfms_skcipher() 2271 kfree(cc->cipher_tfm.tfms); in crypt_free_tfms_skcipher() 2272 cc->cipher_tfm.tfms = NULL; in crypt_free_tfms_skcipher() 2288 cc->cipher_tfm.tfms = kcalloc(cc->tfms_count, in crypt_alloc_tfms_skcipher() [all …]
|
/Linux-v6.1/arch/x86/kernel/cpu/ |
D | common.c | 942 u32 junk, tfms, cap0, misc; in cpu_detect() local 944 cpuid(0x00000001, &tfms, &misc, &junk, &cap0); in cpu_detect() 945 c->x86 = x86_family(tfms); in cpu_detect() 946 c->x86_model = x86_model(tfms); in cpu_detect() 947 c->x86_stepping = x86_stepping(tfms); in cpu_detect()
|
/Linux-v6.1/drivers/gpu/drm/gma500/ |
D | mmu.c | 453 uint32_t tfms, misc, cap0, cap4, clflush_size; in psb_mmu_driver_init() local 460 cpuid(0x00000001, &tfms, &misc, &cap0, &cap4); in psb_mmu_driver_init()
|