/Linux-v4.19/drivers/crypto/vmx/ |
D | aes.c | 33 struct crypto_cipher *fallback; member 41 struct crypto_cipher *fallback; in p8_aes_init() local 44 fallback = crypto_alloc_cipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_aes_init() 45 if (IS_ERR(fallback)) { in p8_aes_init() 48 alg, PTR_ERR(fallback)); in p8_aes_init() 49 return PTR_ERR(fallback); in p8_aes_init() 52 crypto_cipher_set_flags(fallback, in p8_aes_init() 56 ctx->fallback = fallback; in p8_aes_init() 65 if (ctx->fallback) { in p8_aes_exit() 66 crypto_free_cipher(ctx->fallback); in p8_aes_exit() [all …]
|
D | aes_cbc.c | 35 struct crypto_skcipher *fallback; member 43 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local 46 fallback = crypto_alloc_skcipher(alg, 0, in p8_aes_cbc_init() 49 if (IS_ERR(fallback)) { in p8_aes_cbc_init() 52 alg, PTR_ERR(fallback)); in p8_aes_cbc_init() 53 return PTR_ERR(fallback); in p8_aes_cbc_init() 57 fallback, in p8_aes_cbc_init() 59 ctx->fallback = fallback; in p8_aes_cbc_init() 68 if (ctx->fallback) { in p8_aes_cbc_exit() 69 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit() [all …]
|
D | aes_ctr.c | 35 struct crypto_skcipher *fallback; member 42 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local 45 fallback = crypto_alloc_skcipher(alg, 0, in p8_aes_ctr_init() 47 if (IS_ERR(fallback)) { in p8_aes_ctr_init() 50 alg, PTR_ERR(fallback)); in p8_aes_ctr_init() 51 return PTR_ERR(fallback); in p8_aes_ctr_init() 55 fallback, in p8_aes_ctr_init() 57 ctx->fallback = fallback; in p8_aes_ctr_init() 66 if (ctx->fallback) { in p8_aes_ctr_exit() 67 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit() [all …]
|
D | aes_xts.c | 36 struct crypto_skcipher *fallback; member 45 struct crypto_skcipher *fallback; in p8_aes_xts_init() local 48 fallback = crypto_alloc_skcipher(alg, 0, in p8_aes_xts_init() 50 if (IS_ERR(fallback)) { in p8_aes_xts_init() 53 alg, PTR_ERR(fallback)); in p8_aes_xts_init() 54 return PTR_ERR(fallback); in p8_aes_xts_init() 58 fallback, in p8_aes_xts_init() 60 ctx->fallback = fallback; in p8_aes_xts_init() 69 if (ctx->fallback) { in p8_aes_xts_exit() 70 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit() [all …]
|
D | ghash.c | 43 struct crypto_shash *fallback; member 56 struct crypto_shash *fallback; in p8_ghash_init_tfm() local 60 fallback = crypto_alloc_shash(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_ghash_init_tfm() 61 if (IS_ERR(fallback)) { in p8_ghash_init_tfm() 64 alg, PTR_ERR(fallback)); in p8_ghash_init_tfm() 65 return PTR_ERR(fallback); in p8_ghash_init_tfm() 68 crypto_shash_set_flags(fallback, in p8_ghash_init_tfm() 74 + crypto_shash_descsize(fallback)) { in p8_ghash_init_tfm() 79 crypto_shash_descsize(fallback)); in p8_ghash_init_tfm() 82 ctx->fallback = fallback; in p8_ghash_init_tfm() [all …]
|
/Linux-v4.19/drivers/firmware/broadcom/ |
D | bcm47xx_sprom.c | 49 const char *name, char *buf, int len, bool fallback) in get_nvram_var() argument 57 if (fallback && err == -ENOENT && prefix) { in get_nvram_var() 67 type *val, type allset, bool fallback) \ 74 fallback); \ 96 u16 *val_lo, u16 *val_hi, bool fallback) in NVRAM_READ_VAL() 102 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in NVRAM_READ_VAL() 117 bool fallback) in nvram_read_leddc() argument 123 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_leddc() 141 u8 val[6], bool fallback) in nvram_read_macaddr() argument 146 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_macaddr() [all …]
|
/Linux-v4.19/drivers/crypto/ |
D | padlock-sha.c | 29 struct shash_desc fallback; member 33 struct crypto_shash *fallback; member 41 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init() 42 dctx->fallback.flags = desc->flags & CRYPTO_TFM_REQ_MAY_SLEEP; in padlock_sha_init() 43 return crypto_shash_init(&dctx->fallback); in padlock_sha_init() 51 dctx->fallback.flags = desc->flags & CRYPTO_TFM_REQ_MAY_SLEEP; in padlock_sha_update() 52 return crypto_shash_update(&dctx->fallback, data, length); in padlock_sha_update() 59 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export() 67 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import() 68 dctx->fallback.flags = desc->flags & CRYPTO_TFM_REQ_MAY_SLEEP; in padlock_sha_import() [all …]
|
D | geode-aes.c | 140 op->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip() 141 op->fallback.cip->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); in geode_setkey_cip() 143 ret = crypto_cipher_setkey(op->fallback.cip, key, len); in geode_setkey_cip() 146 tfm->crt_flags |= (op->fallback.cip->base.crt_flags & CRYPTO_TFM_RES_MASK); in geode_setkey_cip() 173 op->fallback.blk->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_blk() 174 op->fallback.blk->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); in geode_setkey_blk() 176 ret = crypto_blkcipher_setkey(op->fallback.blk, key, len); in geode_setkey_blk() 179 tfm->crt_flags |= (op->fallback.blk->base.crt_flags & CRYPTO_TFM_RES_MASK); in geode_setkey_blk() 193 desc->tfm = op->fallback.blk; in fallback_blk_dec() 209 desc->tfm = op->fallback.blk; in fallback_blk_enc() [all …]
|
D | atmel-ecc.c | 85 struct crypto_kpp *fallback; member 405 return crypto_kpp_set_secret(ctx->fallback, buf, len); in atmel_ecdh_set_secret() 452 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key() 478 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret() 553 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local 562 fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in atmel_ecdh_init_tfm() 563 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm() 565 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm() 566 return PTR_ERR(fallback); in atmel_ecdh_init_tfm() 569 crypto_kpp_set_flags(fallback, crypto_kpp_get_flags(tfm)); in atmel_ecdh_init_tfm() [all …]
|
D | sahara.c | 152 struct crypto_skcipher *fallback; member 624 crypto_skcipher_clear_flags(ctx->fallback, CRYPTO_TFM_REQ_MASK); in sahara_aes_setkey() 625 crypto_skcipher_set_flags(ctx->fallback, tfm->base.crt_flags & in sahara_aes_setkey() 628 ret = crypto_skcipher_setkey(ctx->fallback, key, keylen); in sahara_aes_setkey() 631 tfm->base.crt_flags |= crypto_skcipher_get_flags(ctx->fallback) & in sahara_aes_setkey() 669 SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_ecb_encrypt() 671 skcipher_request_set_tfm(subreq, ctx->fallback); in sahara_aes_ecb_encrypt() 691 SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_ecb_decrypt() 693 skcipher_request_set_tfm(subreq, ctx->fallback); in sahara_aes_ecb_decrypt() 713 SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_cbc_encrypt() [all …]
|
D | img-hash.c | 115 struct crypto_ahash *fallback; member 490 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_init() 554 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_update() 569 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_final() 583 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_finup() 599 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_import() 612 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_export() 680 ctx->fallback = crypto_alloc_ahash(alg_name, 0, in img_hash_cra_init() 682 if (IS_ERR(ctx->fallback)) { in img_hash_cra_init() 684 err = PTR_ERR(ctx->fallback); in img_hash_cra_init() [all …]
|
/Linux-v4.19/Documentation/driver-api/firmware/ |
D | fallback-mechanisms.rst | 5 A fallback mechanism is supported to allow to overcome failures to do a direct 8 configuration options related to supporting the firmware fallback mechanism are: 10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback 12 CONFIG_FW_LOADER_USER_HELPER_FALLBACK is disabled, only the custom fallback 15 enable the kobject uevent fallback mechanism on all firmware API calls 18 fallback mechanism: if this kconfig option is enabled and your second 20 informing the kernel that you have a custom fallback mechanism and it will 28 the kobject uevent fallback mechanism will never take effect even 31 Justifying the firmware fallback mechanism 36 fallback mechanism: [all …]
|
/Linux-v4.19/kernel/sched/ |
D | membarrier.c | 45 bool fallback = false; in membarrier_global_expedited() local 64 fallback = true; in membarrier_global_expedited() 86 if (!fallback) in membarrier_global_expedited() 93 if (!fallback) { in membarrier_global_expedited() 113 bool fallback = false; in membarrier_private_expedited() local 144 fallback = true; in membarrier_private_expedited() 164 if (!fallback) in membarrier_private_expedited() 171 if (!fallback) { in membarrier_private_expedited()
|
/Linux-v4.19/arch/s390/crypto/ |
D | aes_s390.c | 49 } fallback; member 57 struct crypto_skcipher *fallback; member 77 sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in setkey_fallback_cip() 78 sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & in setkey_fallback_cip() 81 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 84 tfm->crt_flags |= (sctx->fallback.cip->base.crt_flags & in setkey_fallback_cip() 116 crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); in aes_encrypt() 127 crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); in aes_decrypt() 139 sctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip() 142 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip() [all …]
|
/Linux-v4.19/scripts/dtc/ |
D | dtc.c | 122 static const char *guess_type_by_name(const char *fname, const char *fallback) in guess_type_by_name() argument 128 return fallback; in guess_type_by_name() 133 return fallback; in guess_type_by_name() 136 static const char *guess_input_format(const char *fname, const char *fallback) in guess_input_format() argument 143 return fallback; in guess_input_format() 149 return fallback; in guess_input_format() 153 return fallback; in guess_input_format() 156 return fallback; in guess_input_format() 163 return guess_type_by_name(fname, fallback); in guess_input_format()
|
/Linux-v4.19/drivers/base/firmware_loader/ |
D | Kconfig | 68 bool "Enable the firmware sysfs fallback mechanism" 71 loading to the kernel through userspace as a fallback mechanism 76 built-in. For details on how to work with the sysfs fallback mechanism 77 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst. 82 the requested firmware a sysfs fallback loading facility is made 85 this is known as the driver using the custom fallback mechanism. 86 If the custom fallback mechanism is used userspace must always 87 acknowledge failure to find firmware as the timeout for the fallback 93 can no longer be relied upon as a fallback mechanism. Linux no longer 94 relies on or uses a fallback mechanism in userspace. If you need to [all …]
|
/Linux-v4.19/block/ |
D | blk-mq-virtio.c | 39 goto fallback; in blk_mq_virtio_map_queues() 44 goto fallback; in blk_mq_virtio_map_queues() 51 fallback: in blk_mq_virtio_map_queues()
|
D | blk-mq-rdma.c | 41 goto fallback; in blk_mq_rdma_map_queues() 49 fallback: in blk_mq_rdma_map_queues()
|
D | blk-mq-pci.c | 43 goto fallback; in blk_mq_pci_map_queues() 51 fallback: in blk_mq_pci_map_queues()
|
/Linux-v4.19/Documentation/devicetree/bindings/eeprom/ |
D | at24.txt | 31 If <manufacturer> is not "atmel", then a fallback must be used 50 "nxp,se97b" - the fallback is "atmel,24c02", 51 "renesas,r1ex24002" - the fallback is "atmel,24c02" 52 "renesas,r1ex24128" - the fallback is "atmel,24c128" 53 "rohm,br24t01" - the fallback is "atmel,24c01"
|
/Linux-v4.19/drivers/gpu/drm/ |
D | drm_edid_load.c | 278 char *edidname, *last, *colon, *fwstr, *edidstr, *fallback = NULL; in drm_load_edid_firmware() local 305 fallback = edidname; in drm_load_edid_firmware() 309 if (!fallback) { in drm_load_edid_firmware() 313 edidname = fallback; in drm_load_edid_firmware()
|
/Linux-v4.19/drivers/crypto/qce/ |
D | ablkcipher.c | 177 goto fallback; in qce_ablkcipher_setkey() 191 fallback: in qce_ablkcipher_setkey() 192 ret = crypto_skcipher_setkey(ctx->fallback, key, keylen); in qce_ablkcipher_setkey() 215 SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in qce_ablkcipher_crypt() 217 skcipher_request_set_tfm(subreq, ctx->fallback); in qce_ablkcipher_crypt() 248 ctx->fallback = crypto_alloc_skcipher(crypto_tfm_alg_name(tfm), 0, in qce_ablkcipher_init() 251 return PTR_ERR_OR_ZERO(ctx->fallback); in qce_ablkcipher_init() 258 crypto_free_skcipher(ctx->fallback); in qce_ablkcipher_exit()
|
/Linux-v4.19/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 114 unsigned int fallback = 0; in ccp_aes_xts_crypt() local 146 fallback = 1; in ccp_aes_xts_crypt() 149 fallback = 1; in ccp_aes_xts_crypt() 152 fallback = 1; in ccp_aes_xts_crypt() 153 if (fallback) { in ccp_aes_xts_crypt()
|
/Linux-v4.19/arch/x86/entry/vdso/ |
D | vclock_gettime.c | 276 goto fallback; in __vdso_clock_gettime() 280 goto fallback; in __vdso_clock_gettime() 289 goto fallback; in __vdso_clock_gettime() 293 fallback: in __vdso_clock_gettime()
|
/Linux-v4.19/net/smc/ |
D | smc_diag.c | 82 struct smc_diag_fallback fallback; in __smc_diag_dump() local 105 fallback.reason = smc->fallback_rsn; in __smc_diag_dump() 106 fallback.peer_diagnosis = smc->peer_diagnosis; in __smc_diag_dump() 107 if (nla_put(skb, SMC_DIAG_FALLBACK, sizeof(fallback), &fallback) < 0) in __smc_diag_dump()
|