Home
last modified time | relevance | path

Searched refs:tfms (Results 1 – 9 of 9) sorted by relevance

/Linux-v6.1/net/xfrm/
Dxfrm_ipcomp.c29 struct crypto_comp * __percpu *tfms; member
45 struct crypto_comp *tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_decompress()
137 tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_compress()
235 static void ipcomp_free_tfms(struct crypto_comp * __percpu *tfms) in ipcomp_free_tfms() argument
241 if (pos->tfms == tfms) in ipcomp_free_tfms()
253 if (!tfms) in ipcomp_free_tfms()
257 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); in ipcomp_free_tfms()
260 free_percpu(tfms); in ipcomp_free_tfms()
266 struct crypto_comp * __percpu *tfms; in ipcomp_alloc_tfms() local
274 tfm = this_cpu_read(*pos->tfms); in ipcomp_alloc_tfms()
[all …]
/Linux-v6.1/arch/x86/boot/
Dcpuflags.c89 u32 tfms; in get_cpuflags() local
105 cpuid(0x1, &tfms, &ignored, &cpu.flags[4], in get_cpuflags()
107 cpu.level = (tfms >> 8) & 15; in get_cpuflags()
109 cpu.model = (tfms >> 4) & 15; in get_cpuflags()
111 cpu.model += ((tfms >> 16) & 0xf) << 4; in get_cpuflags()
/Linux-v6.1/block/
Dblk-crypto-fallback.c78 struct crypto_skcipher *tfms[BLK_ENCRYPTION_MODE_MAX]; member
101 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], blank_key, in blk_crypto_fallback_evict_keyslot()
122 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], key->raw, in blk_crypto_fallback_keyslot_program()
196 ciph_req = skcipher_request_alloc(slotp->tfms[slotp->crypto_mode], in blk_crypto_fallback_alloc_cipher_req()
636 slotp->tfms[mode_num] = crypto_alloc_skcipher(cipher_str, 0, 0); in blk_crypto_fallback_start_using_mode()
637 if (IS_ERR(slotp->tfms[mode_num])) { in blk_crypto_fallback_start_using_mode()
638 err = PTR_ERR(slotp->tfms[mode_num]); in blk_crypto_fallback_start_using_mode()
644 slotp->tfms[mode_num] = NULL; in blk_crypto_fallback_start_using_mode()
648 crypto_skcipher_set_flags(slotp->tfms[mode_num], in blk_crypto_fallback_start_using_mode()
662 crypto_free_skcipher(slotp->tfms[mode_num]); in blk_crypto_fallback_start_using_mode()
[all …]
/Linux-v6.1/net/ipv6/
Dseg6_hmac.c130 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac()
365 algo->tfms = alloc_percpu(struct crypto_shash *); in seg6_hmac_init_algo()
366 if (!algo->tfms) in seg6_hmac_init_algo()
373 p_tfm = per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_init_algo()
377 p_tfm = raw_cpu_ptr(algo->tfms); in seg6_hmac_init_algo()
424 tfm = *per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_exit()
427 free_percpu(algo->tfms); in seg6_hmac_exit()
/Linux-v6.1/include/net/
Dipcomp.h15 struct crypto_comp * __percpu *tfms; member
Dseg6_hmac.h38 struct crypto_shash * __percpu *tfms; member
/Linux-v6.1/drivers/md/
Ddm-crypt.c178 struct crypto_skcipher **tfms; member
249 return cc->cipher_tfm.tfms[0]; in any_tfm()
1475 skcipher_request_set_tfm(ctx->r.req, cc->cipher_tfm.tfms[key_index]); in crypt_alloc_req_skcipher()
2262 if (!cc->cipher_tfm.tfms) in crypt_free_tfms_skcipher()
2266 if (cc->cipher_tfm.tfms[i] && !IS_ERR(cc->cipher_tfm.tfms[i])) { in crypt_free_tfms_skcipher()
2267 crypto_free_skcipher(cc->cipher_tfm.tfms[i]); in crypt_free_tfms_skcipher()
2268 cc->cipher_tfm.tfms[i] = NULL; in crypt_free_tfms_skcipher()
2271 kfree(cc->cipher_tfm.tfms); in crypt_free_tfms_skcipher()
2272 cc->cipher_tfm.tfms = NULL; in crypt_free_tfms_skcipher()
2288 cc->cipher_tfm.tfms = kcalloc(cc->tfms_count, in crypt_alloc_tfms_skcipher()
[all …]
/Linux-v6.1/arch/x86/kernel/cpu/
Dcommon.c942 u32 junk, tfms, cap0, misc; in cpu_detect() local
944 cpuid(0x00000001, &tfms, &misc, &junk, &cap0); in cpu_detect()
945 c->x86 = x86_family(tfms); in cpu_detect()
946 c->x86_model = x86_model(tfms); in cpu_detect()
947 c->x86_stepping = x86_stepping(tfms); in cpu_detect()
/Linux-v6.1/drivers/gpu/drm/gma500/
Dmmu.c453 uint32_t tfms, misc, cap0, cap4, clflush_size; in psb_mmu_driver_init() local
460 cpuid(0x00000001, &tfms, &misc, &cap0, &cap4); in psb_mmu_driver_init()