Lines Matching defs:tfm
128 struct crypto_aead *tfm;
258 static void *tipc_aead_mem_alloc(struct crypto_aead *tfm,
411 crypto_free_aead(tfm_entry->tfm);
416 crypto_free_aead(head->tfm);
484 struct crypto_aead *tfm;
488 tfm = (*tfm_entry)->tfm;
491 return tfm;
511 struct crypto_aead *tfm;
536 tfm = crypto_alloc_aead(ukey->alg_name, 0, 0);
537 if (IS_ERR(tfm)) {
538 err = PTR_ERR(tfm);
543 crypto_aead_ivsize(tfm) != TIPC_AES_GCM_IV_SIZE)) {
544 crypto_free_aead(tfm);
549 err = crypto_aead_setauthsize(tfm, TIPC_AES_GCM_TAG_SIZE);
550 err |= crypto_aead_setkey(tfm, ukey->key, keylen);
552 crypto_free_aead(tfm);
558 crypto_free_aead(tfm);
563 tfm_entry->tfm = tfm;
665 * @tfm: cipher handle to be registered with the request
678 static void *tipc_aead_mem_alloc(struct crypto_aead *tfm,
687 iv_size = crypto_aead_ivsize(tfm);
688 req_size = sizeof(**req) + crypto_aead_reqsize(tfm);
692 len += crypto_aead_alignmask(tfm) & ~(crypto_tfm_ctx_alignment() - 1);
703 crypto_aead_alignmask(tfm) + 1);
730 struct crypto_aead *tfm = tipc_aead_tfm_next(aead);
777 ctx = tipc_aead_mem_alloc(tfm, sizeof(*tx_ctx), &iv, &req, &sg, nsg);
806 aead_request_set_tfm(req, tfm);
886 struct crypto_aead *tfm;
905 tfm = tipc_aead_tfm_next(aead);
906 ctx = tipc_aead_mem_alloc(tfm, sizeof(*rx_ctx), &iv, &req, &sg, nsg);
931 aead_request_set_tfm(req, tfm);