lmk 153 drivers/md/dm-crypt.c struct iv_lmk_private lmk; lmk 388 drivers/md/dm-crypt.c struct iv_lmk_private *lmk = &cc->iv_gen_private.lmk; lmk 390 drivers/md/dm-crypt.c if (lmk->hash_tfm && !IS_ERR(lmk->hash_tfm)) lmk 391 drivers/md/dm-crypt.c crypto_free_shash(lmk->hash_tfm); lmk 392 drivers/md/dm-crypt.c lmk->hash_tfm = NULL; lmk 394 drivers/md/dm-crypt.c kzfree(lmk->seed); lmk 395 drivers/md/dm-crypt.c lmk->seed = NULL; lmk 401 drivers/md/dm-crypt.c struct iv_lmk_private *lmk = &cc->iv_gen_private.lmk; lmk 408 drivers/md/dm-crypt.c lmk->hash_tfm = crypto_alloc_shash("md5", 0, 0); lmk 409 drivers/md/dm-crypt.c if (IS_ERR(lmk->hash_tfm)) { lmk 411 drivers/md/dm-crypt.c return PTR_ERR(lmk->hash_tfm); lmk 416 drivers/md/dm-crypt.c lmk->seed = NULL; lmk 420 drivers/md/dm-crypt.c lmk->seed = kzalloc(LMK_SEED_SIZE, GFP_KERNEL); lmk 421 drivers/md/dm-crypt.c if (!lmk->seed) { lmk 432 drivers/md/dm-crypt.c struct iv_lmk_private *lmk = &cc->iv_gen_private.lmk; lmk 436 drivers/md/dm-crypt.c if (lmk->seed) lmk 437 drivers/md/dm-crypt.c memcpy(lmk->seed, cc->key + (cc->tfms_count * subkey_size), lmk 438 drivers/md/dm-crypt.c crypto_shash_digestsize(lmk->hash_tfm)); lmk 445 drivers/md/dm-crypt.c struct iv_lmk_private *lmk = &cc->iv_gen_private.lmk; lmk 447 drivers/md/dm-crypt.c if (lmk->seed) lmk 448 drivers/md/dm-crypt.c memset(lmk->seed, 0, LMK_SEED_SIZE); lmk 457 drivers/md/dm-crypt.c struct iv_lmk_private *lmk = &cc->iv_gen_private.lmk; lmk 458 drivers/md/dm-crypt.c SHASH_DESC_ON_STACK(desc, lmk->hash_tfm); lmk 463 drivers/md/dm-crypt.c desc->tfm = lmk->hash_tfm; lmk 469 drivers/md/dm-crypt.c if (lmk->seed) { lmk 470 drivers/md/dm-crypt.c r = crypto_shash_update(desc, lmk->seed, LMK_SEED_SIZE);