Lines Matching full:fallback

126 	 * The requested key size is not supported by HW, do a fallback  in geode_setkey_cip()
128 tctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip()
129 tctx->fallback.cip->base.crt_flags |= in geode_setkey_cip()
132 return crypto_cipher_setkey(tctx->fallback.cip, key, len); in geode_setkey_cip()
152 * The requested key size is not supported by HW, do a fallback in geode_setkey_skcipher()
154 crypto_skcipher_clear_flags(tctx->fallback.skcipher, in geode_setkey_skcipher()
156 crypto_skcipher_set_flags(tctx->fallback.skcipher, in geode_setkey_skcipher()
159 return crypto_skcipher_setkey(tctx->fallback.skcipher, key, len); in geode_setkey_skcipher()
168 crypto_cipher_encrypt_one(tctx->fallback.cip, out, in); in geode_encrypt()
183 crypto_cipher_decrypt_one(tctx->fallback.cip, out, in); in geode_decrypt()
196 tctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip()
199 if (IS_ERR(tctx->fallback.cip)) { in fallback_init_cip()
200 printk(KERN_ERR "Error allocating fallback algo %s\n", name); in fallback_init_cip()
201 return PTR_ERR(tctx->fallback.cip); in fallback_init_cip()
211 crypto_free_cipher(tctx->fallback.cip); in fallback_exit_cip()
242 tctx->fallback.skcipher = in geode_init_skcipher()
245 if (IS_ERR(tctx->fallback.skcipher)) { in geode_init_skcipher()
246 printk(KERN_ERR "Error allocating fallback algo %s\n", name); in geode_init_skcipher()
247 return PTR_ERR(tctx->fallback.skcipher); in geode_init_skcipher()
251 crypto_skcipher_reqsize(tctx->fallback.skcipher)); in geode_init_skcipher()
259 crypto_free_skcipher(tctx->fallback.skcipher); in geode_exit_skcipher()
274 skcipher_request_set_tfm(subreq, tctx->fallback.skcipher); in geode_skcipher_crypt()