Lines Matching defs:tfm
126 * @tfm: cipher handle/key
130 struct crypto_aead *tfm;
262 static void *tipc_aead_mem_alloc(struct crypto_aead *tfm,
417 crypto_free_aead(tfm_entry->tfm);
422 crypto_free_aead(head->tfm);
491 struct crypto_aead *tfm;
495 tfm = (*tfm_entry)->tfm;
498 return tfm;
518 struct crypto_aead *tfm;
543 tfm = crypto_alloc_aead(ukey->alg_name, 0, 0);
544 if (IS_ERR(tfm)) {
545 err = PTR_ERR(tfm);
550 crypto_aead_ivsize(tfm) != TIPC_AES_GCM_IV_SIZE)) {
551 crypto_free_aead(tfm);
556 err = crypto_aead_setauthsize(tfm, TIPC_AES_GCM_TAG_SIZE);
557 err |= crypto_aead_setkey(tfm, ukey->key, keylen);
559 crypto_free_aead(tfm);
565 crypto_free_aead(tfm);
570 tfm_entry->tfm = tfm;
672 * @tfm: cipher handle to be registered with the request
685 static void *tipc_aead_mem_alloc(struct crypto_aead *tfm,
694 iv_size = crypto_aead_ivsize(tfm);
695 req_size = sizeof(**req) + crypto_aead_reqsize(tfm);
699 len += crypto_aead_alignmask(tfm) & ~(crypto_tfm_ctx_alignment() - 1);
710 crypto_aead_alignmask(tfm) + 1);
737 struct crypto_aead *tfm = tipc_aead_tfm_next(aead);
773 ctx = tipc_aead_mem_alloc(tfm, sizeof(*tx_ctx), &iv, &req, &sg, nsg);
802 aead_request_set_tfm(req, tfm);
882 struct crypto_aead *tfm;
901 tfm = tipc_aead_tfm_next(aead);
902 ctx = tipc_aead_mem_alloc(tfm, sizeof(*rx_ctx), &iv, &req, &sg, nsg);
927 aead_request_set_tfm(req, tfm);