/linux-master/drivers/crypto/xilinx/ |
H A D | zynqmp-aes-gcm.c | 244 struct crypto_tfm *tfm = crypto_aead_tfm(aead); local 246 (struct zynqmp_aead_tfm_ctx *)crypto_tfm_ctx(tfm); 276 struct crypto_tfm *tfm = crypto_aead_tfm(aead); local 278 (struct zynqmp_aead_tfm_ctx *)crypto_tfm_ctx(tfm); 312 struct crypto_tfm *tfm = crypto_aead_tfm(aead); local 314 (struct zynqmp_aead_tfm_ctx *)crypto_tfm_ctx(tfm); 340 struct crypto_tfm *tfm = crypto_aead_tfm(aead); local 342 (struct zynqmp_aead_tfm_ctx *)crypto_tfm_ctx(tfm);
|
/linux-master/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 29 struct crypto_akcipher *tfm; member in struct:virtio_crypto_akcipher_ctx 365 static int virtio_crypto_rsa_set_key(struct crypto_akcipher *tfm, argument 372 struct virtio_crypto_akcipher_ctx *ctx = akcipher_tfm_ctx(tfm); 429 static int virtio_crypto_rsa_raw_set_priv_key(struct crypto_akcipher *tfm, argument 433 return virtio_crypto_rsa_set_key(tfm, key, keylen, 1, 439 static int virtio_crypto_p1pad_rsa_sha1_set_priv_key(struct crypto_akcipher *tfm, argument 443 return virtio_crypto_rsa_set_key(tfm, key, keylen, 1, 448 static int virtio_crypto_rsa_raw_set_pub_key(struct crypto_akcipher *tfm, argument 452 return virtio_crypto_rsa_set_key(tfm, key, keylen, 0, 457 static int virtio_crypto_p1pad_rsa_sha1_set_pub_key(struct crypto_akcipher *tfm, argument 466 virtio_crypto_rsa_max_size(struct crypto_akcipher *tfm) argument 474 virtio_crypto_rsa_init_tfm(struct crypto_akcipher *tfm) argument 486 virtio_crypto_rsa_exit_tfm(struct crypto_akcipher *tfm) argument [all...] |
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_comp_algs.c | 72 struct crypto_acomp *tfm = crypto_acomp_reqtfm(areq); local 81 crypto_tfm_alg_driver_name(crypto_acomp_tfm(tfm)), 109 struct crypto_acomp *tfm = crypto_acomp_reqtfm(areq); local 127 crypto_tfm_alg_driver_name(crypto_acomp_tfm(tfm)), 194 struct crypto_tfm *tfm = crypto_acomp_tfm(acomp_tfm); local 195 struct qat_compression_ctx *ctx = crypto_tfm_ctx(tfm); 199 if (tfm->node == NUMA_NO_NODE) 202 node = tfm->node; 217 struct crypto_tfm *tfm = crypto_acomp_tfm(acomp_tfm); local 218 struct qat_compression_ctx *ctx = crypto_tfm_ctx(tfm); 230 struct crypto_tfm *tfm = crypto_acomp_tfm(acomp_tfm); local [all...] |
/linux-master/drivers/crypto/hisilicon/zip/ |
H A D | zip_crypto.c | 316 struct hisi_zip_ctx *ctx = crypto_tfm_ctx(acomp_req->base.tfm); 337 struct hisi_zip_ctx *ctx = crypto_tfm_ctx(acomp_req->base.tfm); 538 static int hisi_zip_acomp_init(struct crypto_acomp *tfm) argument 540 const char *alg_name = crypto_tfm_alg_name(&tfm->base); 541 struct hisi_zip_ctx *ctx = crypto_tfm_ctx(&tfm->base); 545 ret = hisi_zip_ctx_init(ctx, COMP_NAME_TO_TYPE(alg_name), tfm->base.node); 576 static void hisi_zip_acomp_exit(struct crypto_acomp *tfm) argument 578 struct hisi_zip_ctx *ctx = crypto_tfm_ctx(&tfm->base);
|
/linux-master/drivers/crypto/allwinner/sun8i-ce/ |
H A D | sun8i-ce-hash.c | 26 int sun8i_ce_hash_init_tfm(struct crypto_ahash *tfm) argument 28 struct sun8i_ce_hash_tfm_ctx *op = crypto_ahash_ctx(tfm); 29 struct ahash_alg *alg = crypto_ahash_alg(tfm); 37 op->fallback_tfm = crypto_alloc_ahash(crypto_ahash_alg_name(tfm), 0, 44 crypto_ahash_set_statesize(tfm, 47 crypto_ahash_set_reqsize(tfm, 64 void sun8i_ce_hash_exit_tfm(struct crypto_ahash *tfm) argument 66 struct sun8i_ce_hash_tfm_ctx *tfmctx = crypto_ahash_ctx(tfm); 75 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 76 struct sun8i_ce_hash_tfm_ctx *tfmctx = crypto_ahash_ctx(tfm); 89 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 101 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 113 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 138 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 153 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 181 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 208 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 241 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local 333 struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq); local [all...] |
/linux-master/crypto/ |
H A D | tcrypt.c | 57 #define get_driver_name(tfm_type, tfm) crypto_tfm_alg_driver_name(tfm_type ## _tfm(tfm)) 249 struct crypto_aead *tfm; local 277 tfm = crypto_alloc_aead(algo, 0, 0); 278 if (IS_ERR(tfm)) { 280 algo, PTR_ERR(tfm)); 284 ret = crypto_aead_setauthsize(tfm, authsize); 313 data[i].req = aead_request_alloc(tfm, GFP_KERNEL); 331 get_driver_name(crypto_aead, tfm), e); 337 int bs = round_up(*b_size, crypto_aead_blocksize(tfm)); 524 struct crypto_aead *tfm; local 872 struct crypto_ahash *tfm; local 1065 struct crypto_skcipher *tfm; local 1302 struct crypto_skcipher *tfm; local [all...] |
H A D | rsa.c | 116 static inline struct rsa_mpi_key *rsa_get_key(struct crypto_akcipher *tfm) argument 118 return akcipher_tfm_ctx(tfm); 123 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); local 124 const struct rsa_mpi_key *pkey = rsa_get_key(tfm); 162 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); local 163 const struct rsa_mpi_key *pkey = rsa_get_key(tfm); 264 static int rsa_set_pub_key(struct crypto_akcipher *tfm, const void *key, argument 267 struct rsa_mpi_key *mpi_key = akcipher_tfm_ctx(tfm); 303 static int rsa_set_priv_key(struct crypto_akcipher *tfm, const void *key, argument 306 struct rsa_mpi_key *mpi_key = akcipher_tfm_ctx(tfm); 366 rsa_max_size(struct crypto_akcipher *tfm) argument 373 rsa_exit_tfm(struct crypto_akcipher *tfm) argument [all...] |
H A D | dh.c | 42 static inline struct dh_ctx *dh_get_ctx(struct crypto_kpp *tfm) argument 44 return kpp_tfm_ctx(tfm); 71 static int dh_set_secret(struct crypto_kpp *tfm, const void *buf, argument 74 struct dh_ctx *ctx = dh_get_ctx(tfm); 169 struct crypto_kpp *tfm = crypto_kpp_reqtfm(req); local 170 struct dh_ctx *ctx = dh_get_ctx(tfm); 251 static unsigned int dh_max_size(struct crypto_kpp *tfm) argument 253 struct dh_ctx *ctx = dh_get_ctx(tfm); 258 static void dh_exit_tfm(struct crypto_kpp *tfm) argument 260 struct dh_ctx *ctx = dh_get_ctx(tfm); 306 dh_safe_prime_instance_ctx( struct crypto_kpp *tfm) argument 312 dh_safe_prime_init_tfm(struct crypto_kpp *tfm) argument 328 dh_safe_prime_exit_tfm(struct crypto_kpp *tfm) argument 457 dh_safe_prime_set_secret(struct crypto_kpp *tfm, const void *buffer, unsigned int len) argument 544 dh_safe_prime_max_size(struct crypto_kpp *tfm) argument [all...] |
H A D | pcbc.c | 22 struct crypto_cipher *tfm) 24 int bsize = crypto_cipher_blocksize(tfm); 32 crypto_cipher_encrypt_one(tfm, dst, iv); 44 struct crypto_cipher *tfm) 46 int bsize = crypto_cipher_blocksize(tfm); 55 crypto_cipher_encrypt_one(tfm, src, iv); 66 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 67 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); 89 struct crypto_cipher *tfm) 91 int bsize = crypto_cipher_blocksize(tfm); 20 crypto_pcbc_encrypt_segment(struct skcipher_request *req, struct skcipher_walk *walk, struct crypto_cipher *tfm) argument 42 crypto_pcbc_encrypt_inplace(struct skcipher_request *req, struct skcipher_walk *walk, struct crypto_cipher *tfm) argument 87 crypto_pcbc_decrypt_segment(struct skcipher_request *req, struct skcipher_walk *walk, struct crypto_cipher *tfm) argument 109 crypto_pcbc_decrypt_inplace(struct skcipher_request *req, struct skcipher_walk *walk, struct crypto_cipher *tfm) argument 133 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 325 struct crypto_shash *tfm; local 336 tfm = crypto_alloc_shash(ctx->digest_algo, 0, 0); 337 if (IS_ERR(tfm)) 338 return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm); 340 desc_size = crypto_shash_descsize(tfm) + sizeof(*desc); 341 digest_size = crypto_shash_digestsize(tfm); 356 desc->tfm = tfm; 385 crypto_free_shash(tfm); [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | ghash.c | 55 static int p8_ghash_setkey(struct crypto_shash *tfm, const u8 *key, argument 58 struct p8_ghash_ctx *ctx = crypto_tfm_ctx(crypto_shash_tfm(tfm)); 121 struct p8_ghash_ctx *ctx = crypto_tfm_ctx(crypto_shash_tfm(desc->tfm)); 156 struct p8_ghash_ctx *ctx = crypto_tfm_ctx(crypto_shash_tfm(desc->tfm));
|
H A D | aes_ctr.c | 23 static int p8_aes_ctr_init(struct crypto_skcipher *tfm) argument 25 struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm); 37 crypto_skcipher_set_reqsize(tfm, sizeof(struct skcipher_request) + 43 static void p8_aes_ctr_exit(struct crypto_skcipher *tfm) argument 45 struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm); 50 static int p8_aes_ctr_setkey(struct crypto_skcipher *tfm, const u8 *key, argument 53 struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm); 92 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 93 const struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm);
|
H A D | aes_xts.c | 26 static int p8_aes_xts_init(struct crypto_skcipher *tfm) argument 28 struct p8_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 40 crypto_skcipher_set_reqsize(tfm, sizeof(struct skcipher_request) + 46 static void p8_aes_xts_exit(struct crypto_skcipher *tfm) argument 48 struct p8_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 53 static int p8_aes_xts_setkey(struct crypto_skcipher *tfm, const u8 *key, argument 56 struct p8_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 59 ret = xts_verify_key(tfm, key, keylen); 80 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 81 const struct p8_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm); [all...] |
H A D | aes.c | 28 static int p8_aes_init(struct crypto_tfm *tfm) argument 30 const char *alg = crypto_tfm_alg_name(tfm); 32 struct p8_aes_ctx *ctx = crypto_tfm_ctx(tfm); 45 tfm)); 51 static void p8_aes_exit(struct crypto_tfm *tfm) argument 53 struct p8_aes_ctx *ctx = crypto_tfm_ctx(tfm); 61 static int p8_aes_setkey(struct crypto_tfm *tfm, const u8 *key, argument 65 struct p8_aes_ctx *ctx = crypto_tfm_ctx(tfm); 81 static void p8_aes_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) argument 83 struct p8_aes_ctx *ctx = crypto_tfm_ctx(tfm); 98 p8_aes_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) argument [all...] |
H A D | aes_cbc.c | 24 static int p8_aes_cbc_init(struct crypto_skcipher *tfm) argument 26 struct p8_aes_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); 38 crypto_skcipher_set_reqsize(tfm, sizeof(struct skcipher_request) + 44 static void p8_aes_cbc_exit(struct crypto_skcipher *tfm) argument 46 struct p8_aes_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); 51 static int p8_aes_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key, argument 54 struct p8_aes_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); 73 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 74 const struct p8_aes_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
|
/linux-master/arch/arm64/crypto/ |
H A D | aes-glue.c | 137 static int skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, argument 140 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); 145 static int __maybe_unused xts_set_key(struct crypto_skcipher *tfm, argument 148 struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm); 151 ret = xts_verify_key(tfm, in_key, key_len); 162 static int __maybe_unused essiv_cbc_set_key(struct crypto_skcipher *tfm, argument 166 struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); 181 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 182 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); 201 struct crypto_skcipher *tfm local 222 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 251 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 279 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 336 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 391 essiv_cbc_init_tfm(struct crypto_skcipher *tfm) argument 400 essiv_cbc_exit_tfm(struct crypto_skcipher *tfm) argument 409 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 431 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 453 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 499 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 543 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 615 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 800 cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) argument 817 cmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) argument 841 xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) argument [all...] |
H A D | aes-ce-ccm-glue.c | 47 static int ccm_setkey(struct crypto_aead *tfm, const u8 *in_key, argument 50 struct crypto_aes_ctx *ctx = crypto_aead_ctx(tfm); 55 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) argument
|
/linux-master/fs/ext4/ |
H A D | ext4.h | 2473 desc.shash.tfm = sbi->s_chksum_driver;
|
/linux-master/drivers/misc/sgi-gru/ |
H A D | grufault.c | 146 struct gru_tlb_fault_map *tfm; local 148 tfm = get_tfm_for_cpu(gru, gru_cpu_fault_map_id()); 149 prefetchw(tfm); /* Helps on hardware, required for emulator */ 151 k = tfm->fault_bits[i]; 153 k = xchg(&tfm->fault_bits[i], 0UL); 155 k = tfm->done_bits[i]; 157 k = xchg(&tfm->done_bits[i], 0UL); 165 gru_flush_cache(tfm);
|
/linux-master/drivers/md/ |
H A D | dm-verity-target.c | 143 ahash_request_set_tfm(req, v->tfm); 1039 if (v->tfm) 1040 crypto_free_ahash(v->tfm); 1360 v->tfm = crypto_alloc_ahash(v->alg_name, 0, 1362 if (IS_ERR(v->tfm)) { 1364 r = PTR_ERR(v->tfm); 1365 v->tfm = NULL; 1375 crypto_hash_alg_common(v->tfm)->base.cra_driver_name); 1377 v->digest_size = crypto_ahash_digestsize(v->tfm); 1384 crypto_ahash_reqsize(v->tfm); [all...] |
H A D | dm-verity.h | 42 struct crypto_ahash *tfm; member in struct:dm_verity
|
/linux-master/drivers/crypto/ |
H A D | n2_core.c | 262 static inline struct n2_ahash_alg *n2_ahash_alg(struct crypto_tfm *tfm) argument 264 struct crypto_alg *alg = tfm->__crt_alg; 277 static inline struct n2_hmac_alg *n2_hmac_alg(struct crypto_tfm *tfm) argument 279 struct crypto_alg *alg = tfm->__crt_alg; 315 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); local 316 struct n2_hash_ctx *ctx = crypto_ahash_ctx(tfm); 327 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); local 328 struct n2_hash_ctx *ctx = crypto_ahash_ctx(tfm); 341 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); local 342 struct n2_hash_ctx *ctx = crypto_ahash_ctx(tfm); 354 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); local 376 n2_hash_cra_init(struct crypto_tfm *tfm) argument 403 n2_hash_cra_exit(struct crypto_tfm *tfm) argument 411 n2_hmac_cra_init(struct crypto_tfm *tfm) argument 452 n2_hmac_cra_exit(struct crypto_tfm *tfm) argument 461 n2_hmac_async_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) argument 525 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); local 631 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); local 716 n2_skcipher_alg(struct crypto_skcipher *tfm) argument 730 struct crypto_tfm *tfm = crypto_skcipher_tfm(skcipher); local 758 struct crypto_tfm *tfm = crypto_skcipher_tfm(skcipher); local 777 struct crypto_tfm *tfm = crypto_skcipher_tfm(skcipher); local 948 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 1000 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); local 1300 n2_skcipher_init_tfm(struct crypto_skcipher *tfm) argument [all...] |
/linux-master/drivers/block/zram/ |
H A D | zcomp.c | 39 if (!IS_ERR_OR_NULL(zstrm->tfm)) 40 crypto_free_comp(zstrm->tfm); 42 zstrm->tfm = NULL; 47 * Initialize zcomp_strm structure with ->tfm initialized by backend, and 52 zstrm->tfm = crypto_alloc_comp(comp->name, 0, 0); 58 if (IS_ERR_OR_NULL(zstrm->tfm) || !zstrm->buffer) { 137 return crypto_comp_compress(zstrm->tfm, 147 return crypto_comp_decompress(zstrm->tfm,
|
H A D | zcomp.h | 11 /* The members ->buffer and ->tfm are protected by ->lock. */ 15 struct crypto_comp *tfm; member in struct:zcomp_strm
|
/linux-master/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 269 struct crypto_sync_skcipher *tfm; local 271 tfm = crypto_alloc_sync_skcipher(cname, 0, 0); 272 if (IS_ERR(tfm)) 274 if (crypto_sync_skcipher_setkey(tfm, key->data, key->len)) { 275 crypto_free_sync_skcipher(tfm); 278 return tfm; 284 struct crypto_ahash *tfm; local 286 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); 287 if (IS_ERR(tfm)) 289 if (crypto_ahash_setkey(tfm, ke [all...] |