Home
last modified time | relevance | path

Searched refs:fallback (Results 1 – 25 of 203) sorted by relevance

123456789

/Linux-v5.4/drivers/crypto/vmx/
Daes.c22 struct crypto_cipher *fallback; member
30 struct crypto_cipher *fallback; in p8_aes_init() local
33 fallback = crypto_alloc_cipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_aes_init()
34 if (IS_ERR(fallback)) { in p8_aes_init()
37 alg, PTR_ERR(fallback)); in p8_aes_init()
38 return PTR_ERR(fallback); in p8_aes_init()
41 crypto_cipher_set_flags(fallback, in p8_aes_init()
45 ctx->fallback = fallback; in p8_aes_init()
54 if (ctx->fallback) { in p8_aes_exit()
55 crypto_free_cipher(ctx->fallback); in p8_aes_exit()
[all …]
Daes_cbc.c19 struct crypto_skcipher *fallback; member
27 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local
29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init()
32 if (IS_ERR(fallback)) { in p8_aes_cbc_init()
34 PTR_ERR(fallback)); in p8_aes_cbc_init()
35 return PTR_ERR(fallback); in p8_aes_cbc_init()
39 crypto_skcipher_reqsize(fallback)); in p8_aes_cbc_init()
40 ctx->fallback = fallback; in p8_aes_cbc_init()
48 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit()
66 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_cbc_setkey()
[all …]
Daes_ctr.c19 struct crypto_skcipher *fallback; member
26 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local
28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init()
31 if (IS_ERR(fallback)) { in p8_aes_ctr_init()
33 PTR_ERR(fallback)); in p8_aes_ctr_init()
34 return PTR_ERR(fallback); in p8_aes_ctr_init()
38 crypto_skcipher_reqsize(fallback)); in p8_aes_ctr_init()
39 ctx->fallback = fallback; in p8_aes_ctr_init()
47 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit()
64 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_ctr_setkey()
[all …]
Daes_xts.c20 struct crypto_skcipher *fallback; member
29 struct crypto_skcipher *fallback; in p8_aes_xts_init() local
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
34 if (IS_ERR(fallback)) { in p8_aes_xts_init()
36 PTR_ERR(fallback)); in p8_aes_xts_init()
37 return PTR_ERR(fallback); in p8_aes_xts_init()
41 crypto_skcipher_reqsize(fallback)); in p8_aes_xts_init()
42 ctx->fallback = fallback; in p8_aes_xts_init()
50 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit()
73 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_xts_setkey()
[all …]
/Linux-v5.4/drivers/firmware/broadcom/
Dbcm47xx_sprom.c49 const char *name, char *buf, int len, bool fallback) in get_nvram_var() argument
57 if (fallback && err == -ENOENT && prefix) { in get_nvram_var()
67 type *val, type allset, bool fallback) \
74 fallback); \
96 u16 *val_lo, u16 *val_hi, bool fallback) in NVRAM_READ_VAL()
102 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in NVRAM_READ_VAL()
117 bool fallback) in nvram_read_leddc() argument
123 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_leddc()
141 u8 val[6], bool fallback) in nvram_read_macaddr() argument
146 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_macaddr()
[all …]
/Linux-v5.4/drivers/crypto/
Datmel-ecc.c43 struct crypto_kpp *fallback; member
111 return crypto_kpp_set_secret(ctx->fallback, buf, len); in atmel_ecdh_set_secret()
158 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key()
187 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret()
263 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local
272 fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in atmel_ecdh_init_tfm()
273 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm()
275 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm()
276 return PTR_ERR(fallback); in atmel_ecdh_init_tfm()
279 crypto_kpp_set_flags(fallback, crypto_kpp_get_flags(tfm)); in atmel_ecdh_init_tfm()
[all …]
Dpadlock-sha.c24 struct shash_desc fallback; member
28 struct crypto_shash *fallback; member
36 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init()
37 return crypto_shash_init(&dctx->fallback); in padlock_sha_init()
45 return crypto_shash_update(&dctx->fallback, data, length); in padlock_sha_update()
52 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export()
60 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import()
61 return crypto_shash_import(&dctx->fallback, in); in padlock_sha_import()
86 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha1_finup()
91 return crypto_shash_finup(&dctx->fallback, in, count, out); in padlock_sha1_finup()
[all …]
Dgeode-aes.c136 op->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip()
137 op->fallback.cip->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); in geode_setkey_cip()
139 ret = crypto_cipher_setkey(op->fallback.cip, key, len); in geode_setkey_cip()
142 tfm->crt_flags |= (op->fallback.cip->base.crt_flags & CRYPTO_TFM_RES_MASK); in geode_setkey_cip()
169 op->fallback.blk->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_blk()
170 op->fallback.blk->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); in geode_setkey_blk()
172 ret = crypto_blkcipher_setkey(op->fallback.blk, key, len); in geode_setkey_blk()
175 tfm->crt_flags |= (op->fallback.blk->base.crt_flags & CRYPTO_TFM_RES_MASK); in geode_setkey_blk()
189 desc->tfm = op->fallback.blk; in fallback_blk_dec()
205 desc->tfm = op->fallback.blk; in fallback_blk_enc()
[all …]
Dsahara.c149 struct crypto_sync_skcipher *fallback; member
621 crypto_sync_skcipher_clear_flags(ctx->fallback, CRYPTO_TFM_REQ_MASK); in sahara_aes_setkey()
622 crypto_sync_skcipher_set_flags(ctx->fallback, tfm->base.crt_flags & in sahara_aes_setkey()
625 ret = crypto_sync_skcipher_setkey(ctx->fallback, key, keylen); in sahara_aes_setkey()
628 tfm->base.crt_flags |= crypto_sync_skcipher_get_flags(ctx->fallback) & in sahara_aes_setkey()
666 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_ecb_encrypt()
668 skcipher_request_set_sync_tfm(subreq, ctx->fallback); in sahara_aes_ecb_encrypt()
688 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_ecb_decrypt()
690 skcipher_request_set_sync_tfm(subreq, ctx->fallback); in sahara_aes_ecb_decrypt()
710 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_cbc_encrypt()
[all …]
Dimg-hash.c112 struct crypto_ahash *fallback; member
487 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_init()
551 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_update()
566 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_final()
580 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_finup()
596 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_import()
609 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_export()
677 ctx->fallback = crypto_alloc_ahash(alg_name, 0, in img_hash_cra_init()
679 if (IS_ERR(ctx->fallback)) { in img_hash_cra_init()
681 err = PTR_ERR(ctx->fallback); in img_hash_cra_init()
[all …]
/Linux-v5.4/Documentation/driver-api/firmware/
Dfallback-mechanisms.rst5 A fallback mechanism is supported to allow to overcome failures to do a direct
8 configuration options related to supporting the firmware fallback mechanism are:
10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback
12 CONFIG_FW_LOADER_USER_HELPER_FALLBACK is disabled, only the custom fallback
15 enable the kobject uevent fallback mechanism on all firmware API calls
18 fallback mechanism: if this kconfig option is enabled and your second
20 informing the kernel that you have a custom fallback mechanism and it will
28 the kobject uevent fallback mechanism will never take effect even
31 Justifying the firmware fallback mechanism
36 fallback mechanism:
[all …]
/Linux-v5.4/arch/s390/crypto/
Daes_s390.c49 } fallback; member
57 struct crypto_sync_skcipher *fallback; member
77 sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in setkey_fallback_cip()
78 sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & in setkey_fallback_cip()
81 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip()
84 tfm->crt_flags |= (sctx->fallback.cip->base.crt_flags & in setkey_fallback_cip()
116 crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); in crypto_aes_encrypt()
127 crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); in crypto_aes_decrypt()
139 sctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip()
142 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip()
[all …]
/Linux-v5.4/scripts/dtc/
Ddtc.c114 static const char *guess_type_by_name(const char *fname, const char *fallback) in guess_type_by_name() argument
120 return fallback; in guess_type_by_name()
127 return fallback; in guess_type_by_name()
130 static const char *guess_input_format(const char *fname, const char *fallback) in guess_input_format() argument
137 return fallback; in guess_input_format()
143 return fallback; in guess_input_format()
147 return fallback; in guess_input_format()
150 return fallback; in guess_input_format()
157 return guess_type_by_name(fname, fallback); in guess_input_format()
/Linux-v5.4/drivers/base/firmware_loader/
DKconfig72 bool "Enable the firmware sysfs fallback mechanism"
76 loading to the kernel through userspace as a fallback mechanism
81 built-in. For details on how to work with the sysfs fallback mechanism
82 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst.
87 the requested firmware a sysfs fallback loading facility is made
90 this is known as the driver using the custom fallback mechanism.
91 If the custom fallback mechanism is used userspace must always
92 acknowledge failure to find firmware as the timeout for the fallback
98 can no longer be relied upon as a fallback mechanism. Linux no longer
99 relies on or uses a fallback mechanism in userspace. If you need to
[all …]
/Linux-v5.4/Documentation/devicetree/bindings/eeprom/
Dat24.txt32 If <manufacturer> is not "atmel", then a fallback must be used
51 "nxp,se97b" - the fallback is "atmel,24c02",
52 "renesas,r1ex24002" - the fallback is "atmel,24c02"
53 "renesas,r1ex24016" - the fallback is "atmel,24c16"
54 "renesas,r1ex24128" - the fallback is "atmel,24c128"
55 "rohm,br24t01" - the fallback is "atmel,24c01"
/Linux-v5.4/block/
Dblk-mq-virtio.c31 goto fallback; in blk_mq_virtio_map_queues()
36 goto fallback; in blk_mq_virtio_map_queues()
43 fallback: in blk_mq_virtio_map_queues()
Dblk-mq-rdma.c33 goto fallback; in blk_mq_rdma_map_queues()
41 fallback: in blk_mq_rdma_map_queues()
Dblk-mq-pci.c35 goto fallback; in blk_mq_pci_map_queues()
43 fallback: in blk_mq_pci_map_queues()
/Linux-v5.4/drivers/gpu/drm/
Ddrm_edid_load.c269 char *edidname, *last, *colon, *fwstr, *edidstr, *fallback = NULL; in drm_load_edid_firmware() local
298 fallback = edidname; in drm_load_edid_firmware()
302 if (!fallback) { in drm_load_edid_firmware()
306 edidname = fallback; in drm_load_edid_firmware()
/Linux-v5.4/drivers/crypto/qce/
Dablkcipher.c167 goto fallback; in qce_ablkcipher_setkey()
173 fallback: in qce_ablkcipher_setkey()
174 ret = crypto_sync_skcipher_setkey(ctx->fallback, key, keylen); in qce_ablkcipher_setkey()
224 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in qce_ablkcipher_crypt()
226 skcipher_request_set_sync_tfm(subreq, ctx->fallback); in qce_ablkcipher_crypt()
257 ctx->fallback = crypto_alloc_sync_skcipher(crypto_tfm_alg_name(tfm), in qce_ablkcipher_init()
259 return PTR_ERR_OR_ZERO(ctx->fallback); in qce_ablkcipher_init()
266 crypto_free_sync_skcipher(ctx->fallback); in qce_ablkcipher_exit()
/Linux-v5.4/scripts/atomic/
Dgen-atomics.sh13 gen-atomic-fallback.sh linux/atomic-fallback.h
/Linux-v5.4/drivers/crypto/ccp/
Dccp-crypto-aes-xts.c111 unsigned int fallback = 0; in ccp_aes_xts_crypt() local
140 fallback = 1; in ccp_aes_xts_crypt()
143 fallback = 1; in ccp_aes_xts_crypt()
146 fallback = 1; in ccp_aes_xts_crypt()
147 if (fallback) { in ccp_aes_xts_crypt()
/Linux-v5.4/net/smc/
Dsmc_diag.c82 struct smc_diag_fallback fallback; in __smc_diag_dump() local
105 fallback.reason = smc->fallback_rsn; in __smc_diag_dump()
106 fallback.peer_diagnosis = smc->peer_diagnosis; in __smc_diag_dump()
107 if (nla_put(skb, SMC_DIAG_FALLBACK, sizeof(fallback), &fallback) < 0) in __smc_diag_dump()
/Linux-v5.4/Documentation/devicetree/bindings/thermal/
Dqcom-tsens.txt12 The generic "qcom,tsens-v2" property must be used as a fallback for any SoC
15 Similarly, the generic "qcom,tsens-v1" property must be used as a fallback for
28 Example 1 (legacy support before a fallback tsens-v2 property was introduced):
/Linux-v5.4/Documentation/devicetree/bindings/spi/
Dspi-rspi.txt5 "renesas,rspi-<soctype>", "renesas,rspi" as fallback.
7 "renesas,rspi-<soctype>", "renesas,rspi-rz" as fallback.
10 "renesas,qspi-<soctype>", "renesas,qspi" as fallback.

123456789