/kernel/linux/linux-5.10/net/xfrm/ |
H A D | xfrm_ipcomp.c | 29 struct crypto_comp * __percpu *tfms; member 46 struct crypto_comp *tfm = *per_cpu_ptr(ipcd->tfms, cpu); in ipcomp_decompress() 146 tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_compress() 244 static void ipcomp_free_tfms(struct crypto_comp * __percpu *tfms) in ipcomp_free_tfms() argument 250 if (pos->tfms == tfms) in ipcomp_free_tfms() 262 if (!tfms) in ipcomp_free_tfms() 266 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); in ipcomp_free_tfms() 269 free_percpu(tfms); in ipcomp_free_tfms() 275 struct crypto_comp * __percpu *tfms; in ipcomp_alloc_tfms() local [all...] |
/kernel/linux/linux-6.6/net/xfrm/ |
H A D | xfrm_ipcomp.c | 29 struct crypto_comp * __percpu *tfms; member 45 struct crypto_comp *tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_decompress() 134 tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_compress() 232 static void ipcomp_free_tfms(struct crypto_comp * __percpu *tfms) in ipcomp_free_tfms() argument 238 if (pos->tfms == tfms) in ipcomp_free_tfms() 250 if (!tfms) in ipcomp_free_tfms() 254 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); in ipcomp_free_tfms() 257 free_percpu(tfms); in ipcomp_free_tfms() 263 struct crypto_comp * __percpu *tfms; in ipcomp_alloc_tfms() local [all...] |
/kernel/linux/linux-5.10/arch/x86/boot/ |
H A D | cpuflags.c | 90 u32 tfms; in get_cpuflags() local 106 cpuid(0x1, &tfms, &ignored, &cpu.flags[4], in get_cpuflags() 108 cpu.level = (tfms >> 8) & 15; in get_cpuflags() 110 cpu.model = (tfms >> 4) & 15; in get_cpuflags() 112 cpu.model += ((tfms >> 16) & 0xf) << 4; in get_cpuflags()
|
/kernel/linux/linux-6.6/arch/x86/boot/ |
H A D | cpuflags.c | 80 u32 tfms; in get_cpuflags() local 96 cpuid(0x1, &tfms, &ignored, &cpu.flags[4], in get_cpuflags() 98 cpu.level = (tfms >> 8) & 15; in get_cpuflags() 100 cpu.model = (tfms >> 4) & 15; in get_cpuflags() 102 cpu.model += ((tfms >> 16) & 0xf) << 4; in get_cpuflags()
|
/kernel/linux/linux-5.10/block/ |
H A D | blk-crypto-fallback.c | 65 * all of a mode's tfms when that mode starts being used. Since each mode may 67 * keyslot; thus, a keyslot may contain tfms for multiple modes. However, to 70 * be used at a time - the rest of the unused tfms have their keys cleared. 77 struct crypto_skcipher *tfms[BLK_ENCRYPTION_MODE_MAX]; member 99 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], blank_key, in blk_crypto_evict_keyslot() 119 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], key->raw, in blk_crypto_keyslot_program() 195 ciph_req = skcipher_request_alloc(slotp->tfms[slotp->crypto_mode], in blk_crypto_alloc_cipher_req() 609 * Ensure that updates to blk_crypto_keyslots[i].tfms[mode_num] in blk_crypto_fallback_start_using_mode() 625 slotp->tfms[mode_num] = crypto_alloc_skcipher(cipher_str, 0, 0); in blk_crypto_fallback_start_using_mode() 626 if (IS_ERR(slotp->tfms[mode_nu in blk_crypto_fallback_start_using_mode() [all...] |
/kernel/linux/linux-6.6/block/ |
H A D | blk-crypto-fallback.c | 66 * all of a mode's tfms when that mode starts being used. Since each mode may 68 * keyslot; thus, a keyslot may contain tfms for multiple modes. However, to 71 * be used at a time - the rest of the unused tfms have their keys cleared. 78 struct crypto_skcipher *tfms[BLK_ENCRYPTION_MODE_MAX]; member 101 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], blank_key, in blk_crypto_fallback_evict_keyslot() 122 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], key->raw, in blk_crypto_fallback_keyslot_program() 196 ciph_req = skcipher_request_alloc(slotp->tfms[slotp->crypto_mode], in blk_crypto_fallback_alloc_cipher_req() 630 * Ensure that updates to blk_crypto_keyslots[i].tfms[mode_num] in blk_crypto_fallback_start_using_mode() 646 slotp->tfms[mode_num] = crypto_alloc_skcipher(cipher_str, 0, 0); in blk_crypto_fallback_start_using_mode() 647 if (IS_ERR(slotp->tfms[mode_nu in blk_crypto_fallback_start_using_mode() [all...] |
/kernel/linux/linux-5.10/net/ipv6/ |
H A D | seg6_hmac.c | 131 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac() 366 algo->tfms = alloc_percpu(struct crypto_shash *); in seg6_hmac_init_algo() 367 if (!algo->tfms) in seg6_hmac_init_algo() 374 p_tfm = per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_init_algo() 378 p_tfm = raw_cpu_ptr(algo->tfms); in seg6_hmac_init_algo() 427 tfm = *per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_exit() 430 free_percpu(algo->tfms); in seg6_hmac_exit()
|
/kernel/linux/linux-6.6/net/ipv6/ |
H A D | seg6_hmac.c | 130 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac() 365 algo->tfms = alloc_percpu(struct crypto_shash *); in seg6_hmac_init_algo() 366 if (!algo->tfms) in seg6_hmac_init_algo() 373 p_tfm = per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_init_algo() 377 p_tfm = raw_cpu_ptr(algo->tfms); in seg6_hmac_init_algo() 424 tfm = *per_cpu_ptr(algo->tfms, cpu); in seg6_hmac_exit() 427 free_percpu(algo->tfms); in seg6_hmac_exit()
|
/kernel/linux/linux-5.10/include/net/ |
H A D | ipcomp.h | 13 struct crypto_comp * __percpu *tfms; member
|
H A D | seg6_hmac.h | 38 struct crypto_shash * __percpu *tfms; member
|
/kernel/linux/linux-6.6/include/net/ |
H A D | ipcomp.h | 15 struct crypto_comp * __percpu *tfms; member
|
H A D | seg6_hmac.h | 38 struct crypto_shash * __percpu *tfms; member
|
/kernel/linux/linux-5.10/drivers/md/ |
H A D | dm-crypt.c | 176 struct crypto_skcipher **tfms; member 247 return cc->cipher_tfm.tfms[0]; in any_tfm() 1470 skcipher_request_set_tfm(ctx->r.req, cc->cipher_tfm.tfms[key_index]); in crypt_alloc_req_skcipher() 2265 if (!cc->cipher_tfm.tfms) in crypt_free_tfms_skcipher() 2269 if (cc->cipher_tfm.tfms[i] && !IS_ERR(cc->cipher_tfm.tfms[i])) { in crypt_free_tfms_skcipher() 2270 crypto_free_skcipher(cc->cipher_tfm.tfms[i]); in crypt_free_tfms_skcipher() 2271 cc->cipher_tfm.tfms[i] = NULL; in crypt_free_tfms_skcipher() 2274 kfree(cc->cipher_tfm.tfms); in crypt_free_tfms_skcipher() 2275 cc->cipher_tfm.tfms in crypt_free_tfms_skcipher() [all...] |
/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-crypt.c | 183 struct crypto_skcipher **tfms; member 254 return cc->cipher_tfm.tfms[0]; in any_tfm() 1491 skcipher_request_set_tfm(ctx->r.req, cc->cipher_tfm.tfms[key_index]); in crypt_alloc_req_skcipher() 2333 if (!cc->cipher_tfm.tfms) in crypt_free_tfms_skcipher() 2337 if (cc->cipher_tfm.tfms[i] && !IS_ERR(cc->cipher_tfm.tfms[i])) { in crypt_free_tfms_skcipher() 2338 crypto_free_skcipher(cc->cipher_tfm.tfms[i]); in crypt_free_tfms_skcipher() 2339 cc->cipher_tfm.tfms[i] = NULL; in crypt_free_tfms_skcipher() 2342 kfree(cc->cipher_tfm.tfms); in crypt_free_tfms_skcipher() 2343 cc->cipher_tfm.tfms in crypt_free_tfms_skcipher() [all...] |
/kernel/linux/linux-6.6/drivers/gpu/drm/gma500/ |
H A D | mmu.c | 453 uint32_t tfms, misc, cap0, cap4, clflush_size; in psb_mmu_driver_init() local 460 cpuid(0x00000001, &tfms, &misc, &cap0, &cap4); in psb_mmu_driver_init()
|
/kernel/linux/linux-5.10/arch/x86/kernel/cpu/ |
H A D | common.c | 834 u32 junk, tfms, cap0, misc; in cpu_detect() local 836 cpuid(0x00000001, &tfms, &misc, &junk, &cap0); in cpu_detect() 837 c->x86 = x86_family(tfms); in cpu_detect() 838 c->x86_model = x86_model(tfms); in cpu_detect() 839 c->x86_stepping = x86_stepping(tfms); in cpu_detect()
|
/kernel/linux/linux-6.6/arch/x86/kernel/cpu/ |
H A D | common.c | 967 u32 junk, tfms, cap0, misc; in cpu_detect() local 969 cpuid(0x00000001, &tfms, &misc, &junk, &cap0); in cpu_detect() 970 c->x86 = x86_family(tfms); in cpu_detect() 971 c->x86_model = x86_model(tfms); in cpu_detect() 972 c->x86_stepping = x86_stepping(tfms); in cpu_detect()
|
/kernel/linux/linux-5.10/drivers/gpu/drm/gma500/ |
H A D | mmu.c | 473 uint32_t tfms, misc, cap0, cap4, clflush_size; in psb_mmu_driver_init() local 480 cpuid(0x00000001, &tfms, &misc, &cap0, &cap4); in psb_mmu_driver_init()
|