| /Linux-v5.4/drivers/crypto/vmx/ |
| D | aes.c | 22 struct crypto_cipher *fallback; member 30 struct crypto_cipher *fallback; in p8_aes_init() local 33 fallback = crypto_alloc_cipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_aes_init() 34 if (IS_ERR(fallback)) { in p8_aes_init() 37 alg, PTR_ERR(fallback)); in p8_aes_init() 38 return PTR_ERR(fallback); in p8_aes_init() 41 crypto_cipher_set_flags(fallback, in p8_aes_init() 45 ctx->fallback = fallback; in p8_aes_init() 54 if (ctx->fallback) { in p8_aes_exit() 55 crypto_free_cipher(ctx->fallback); in p8_aes_exit() [all …]
|
| D | aes_cbc.c | 19 struct crypto_skcipher *fallback; member 27 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local 29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init() 32 if (IS_ERR(fallback)) { in p8_aes_cbc_init() 34 PTR_ERR(fallback)); in p8_aes_cbc_init() 35 return PTR_ERR(fallback); in p8_aes_cbc_init() 39 crypto_skcipher_reqsize(fallback)); in p8_aes_cbc_init() 40 ctx->fallback = fallback; in p8_aes_cbc_init() 48 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit() 66 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_cbc_setkey() [all …]
|
| D | aes_ctr.c | 19 struct crypto_skcipher *fallback; member 26 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local 28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init() 31 if (IS_ERR(fallback)) { in p8_aes_ctr_init() 33 PTR_ERR(fallback)); in p8_aes_ctr_init() 34 return PTR_ERR(fallback); in p8_aes_ctr_init() 38 crypto_skcipher_reqsize(fallback)); in p8_aes_ctr_init() 39 ctx->fallback = fallback; in p8_aes_ctr_init() 47 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit() 64 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_ctr_setkey() [all …]
|
| D | aes_xts.c | 20 struct crypto_skcipher *fallback; member 29 struct crypto_skcipher *fallback; in p8_aes_xts_init() local 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 34 if (IS_ERR(fallback)) { in p8_aes_xts_init() 36 PTR_ERR(fallback)); in p8_aes_xts_init() 37 return PTR_ERR(fallback); in p8_aes_xts_init() 41 crypto_skcipher_reqsize(fallback)); in p8_aes_xts_init() 42 ctx->fallback = fallback; in p8_aes_xts_init() 50 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit() 73 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_xts_setkey() [all …]
|
| /Linux-v5.4/drivers/firmware/broadcom/ |
| D | bcm47xx_sprom.c | 49 const char *name, char *buf, int len, bool fallback) in get_nvram_var() argument 57 if (fallback && err == -ENOENT && prefix) { in get_nvram_var() 67 type *val, type allset, bool fallback) \ 74 fallback); \ 96 u16 *val_lo, u16 *val_hi, bool fallback) in NVRAM_READ_VAL() 102 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in NVRAM_READ_VAL() 117 bool fallback) in nvram_read_leddc() argument 123 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_leddc() 141 u8 val[6], bool fallback) in nvram_read_macaddr() argument 146 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_macaddr() [all …]
|
| /Linux-v5.4/drivers/crypto/ |
| D | atmel-ecc.c | 43 struct crypto_kpp *fallback; member 111 return crypto_kpp_set_secret(ctx->fallback, buf, len); in atmel_ecdh_set_secret() 158 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key() 187 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret() 263 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local 272 fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in atmel_ecdh_init_tfm() 273 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm() 275 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm() 276 return PTR_ERR(fallback); in atmel_ecdh_init_tfm() 279 crypto_kpp_set_flags(fallback, crypto_kpp_get_flags(tfm)); in atmel_ecdh_init_tfm() [all …]
|
| D | padlock-sha.c | 24 struct shash_desc fallback; member 28 struct crypto_shash *fallback; member 36 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init() 37 return crypto_shash_init(&dctx->fallback); in padlock_sha_init() 45 return crypto_shash_update(&dctx->fallback, data, length); in padlock_sha_update() 52 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export() 60 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import() 61 return crypto_shash_import(&dctx->fallback, in); in padlock_sha_import() 86 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha1_finup() 91 return crypto_shash_finup(&dctx->fallback, in, count, out); in padlock_sha1_finup() [all …]
|
| D | geode-aes.c | 136 op->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip() 137 op->fallback.cip->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); in geode_setkey_cip() 139 ret = crypto_cipher_setkey(op->fallback.cip, key, len); in geode_setkey_cip() 142 tfm->crt_flags |= (op->fallback.cip->base.crt_flags & CRYPTO_TFM_RES_MASK); in geode_setkey_cip() 169 op->fallback.blk->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_blk() 170 op->fallback.blk->base.crt_flags |= (tfm->crt_flags & CRYPTO_TFM_REQ_MASK); in geode_setkey_blk() 172 ret = crypto_blkcipher_setkey(op->fallback.blk, key, len); in geode_setkey_blk() 175 tfm->crt_flags |= (op->fallback.blk->base.crt_flags & CRYPTO_TFM_RES_MASK); in geode_setkey_blk() 189 desc->tfm = op->fallback.blk; in fallback_blk_dec() 205 desc->tfm = op->fallback.blk; in fallback_blk_enc() [all …]
|
| D | sahara.c | 149 struct crypto_sync_skcipher *fallback; member 621 crypto_sync_skcipher_clear_flags(ctx->fallback, CRYPTO_TFM_REQ_MASK); in sahara_aes_setkey() 622 crypto_sync_skcipher_set_flags(ctx->fallback, tfm->base.crt_flags & in sahara_aes_setkey() 625 ret = crypto_sync_skcipher_setkey(ctx->fallback, key, keylen); in sahara_aes_setkey() 628 tfm->base.crt_flags |= crypto_sync_skcipher_get_flags(ctx->fallback) & in sahara_aes_setkey() 666 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_ecb_encrypt() 668 skcipher_request_set_sync_tfm(subreq, ctx->fallback); in sahara_aes_ecb_encrypt() 688 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_ecb_decrypt() 690 skcipher_request_set_sync_tfm(subreq, ctx->fallback); in sahara_aes_ecb_decrypt() 710 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in sahara_aes_cbc_encrypt() [all …]
|
| D | img-hash.c | 112 struct crypto_ahash *fallback; member 487 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_init() 551 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_update() 566 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_final() 580 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_finup() 596 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_import() 609 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback); in img_hash_export() 677 ctx->fallback = crypto_alloc_ahash(alg_name, 0, in img_hash_cra_init() 679 if (IS_ERR(ctx->fallback)) { in img_hash_cra_init() 681 err = PTR_ERR(ctx->fallback); in img_hash_cra_init() [all …]
|
| /Linux-v5.4/Documentation/driver-api/firmware/ |
| D | fallback-mechanisms.rst | 5 A fallback mechanism is supported to allow to overcome failures to do a direct 8 configuration options related to supporting the firmware fallback mechanism are: 10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback 12 CONFIG_FW_LOADER_USER_HELPER_FALLBACK is disabled, only the custom fallback 15 enable the kobject uevent fallback mechanism on all firmware API calls 18 fallback mechanism: if this kconfig option is enabled and your second 20 informing the kernel that you have a custom fallback mechanism and it will 28 the kobject uevent fallback mechanism will never take effect even 31 Justifying the firmware fallback mechanism 36 fallback mechanism: [all …]
|
| /Linux-v5.4/arch/s390/crypto/ |
| D | aes_s390.c | 49 } fallback; member 57 struct crypto_sync_skcipher *fallback; member 77 sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in setkey_fallback_cip() 78 sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & in setkey_fallback_cip() 81 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 84 tfm->crt_flags |= (sctx->fallback.cip->base.crt_flags & in setkey_fallback_cip() 116 crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); in crypto_aes_encrypt() 127 crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); in crypto_aes_decrypt() 139 sctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip() 142 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip() [all …]
|
| /Linux-v5.4/scripts/dtc/ |
| D | dtc.c | 114 static const char *guess_type_by_name(const char *fname, const char *fallback) in guess_type_by_name() argument 120 return fallback; in guess_type_by_name() 127 return fallback; in guess_type_by_name() 130 static const char *guess_input_format(const char *fname, const char *fallback) in guess_input_format() argument 137 return fallback; in guess_input_format() 143 return fallback; in guess_input_format() 147 return fallback; in guess_input_format() 150 return fallback; in guess_input_format() 157 return guess_type_by_name(fname, fallback); in guess_input_format()
|
| /Linux-v5.4/drivers/base/firmware_loader/ |
| D | Kconfig | 72 bool "Enable the firmware sysfs fallback mechanism" 76 loading to the kernel through userspace as a fallback mechanism 81 built-in. For details on how to work with the sysfs fallback mechanism 82 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst. 87 the requested firmware a sysfs fallback loading facility is made 90 this is known as the driver using the custom fallback mechanism. 91 If the custom fallback mechanism is used userspace must always 92 acknowledge failure to find firmware as the timeout for the fallback 98 can no longer be relied upon as a fallback mechanism. Linux no longer 99 relies on or uses a fallback mechanism in userspace. If you need to [all …]
|
| /Linux-v5.4/Documentation/devicetree/bindings/eeprom/ |
| D | at24.txt | 32 If <manufacturer> is not "atmel", then a fallback must be used 51 "nxp,se97b" - the fallback is "atmel,24c02", 52 "renesas,r1ex24002" - the fallback is "atmel,24c02" 53 "renesas,r1ex24016" - the fallback is "atmel,24c16" 54 "renesas,r1ex24128" - the fallback is "atmel,24c128" 55 "rohm,br24t01" - the fallback is "atmel,24c01"
|
| /Linux-v5.4/block/ |
| D | blk-mq-virtio.c | 31 goto fallback; in blk_mq_virtio_map_queues() 36 goto fallback; in blk_mq_virtio_map_queues() 43 fallback: in blk_mq_virtio_map_queues()
|
| D | blk-mq-rdma.c | 33 goto fallback; in blk_mq_rdma_map_queues() 41 fallback: in blk_mq_rdma_map_queues()
|
| D | blk-mq-pci.c | 35 goto fallback; in blk_mq_pci_map_queues() 43 fallback: in blk_mq_pci_map_queues()
|
| /Linux-v5.4/drivers/gpu/drm/ |
| D | drm_edid_load.c | 269 char *edidname, *last, *colon, *fwstr, *edidstr, *fallback = NULL; in drm_load_edid_firmware() local 298 fallback = edidname; in drm_load_edid_firmware() 302 if (!fallback) { in drm_load_edid_firmware() 306 edidname = fallback; in drm_load_edid_firmware()
|
| /Linux-v5.4/drivers/crypto/qce/ |
| D | ablkcipher.c | 167 goto fallback; in qce_ablkcipher_setkey() 173 fallback: in qce_ablkcipher_setkey() 174 ret = crypto_sync_skcipher_setkey(ctx->fallback, key, keylen); in qce_ablkcipher_setkey() 224 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, ctx->fallback); in qce_ablkcipher_crypt() 226 skcipher_request_set_sync_tfm(subreq, ctx->fallback); in qce_ablkcipher_crypt() 257 ctx->fallback = crypto_alloc_sync_skcipher(crypto_tfm_alg_name(tfm), in qce_ablkcipher_init() 259 return PTR_ERR_OR_ZERO(ctx->fallback); in qce_ablkcipher_init() 266 crypto_free_sync_skcipher(ctx->fallback); in qce_ablkcipher_exit()
|
| /Linux-v5.4/scripts/atomic/ |
| D | gen-atomics.sh | 13 gen-atomic-fallback.sh linux/atomic-fallback.h
|
| /Linux-v5.4/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-xts.c | 111 unsigned int fallback = 0; in ccp_aes_xts_crypt() local 140 fallback = 1; in ccp_aes_xts_crypt() 143 fallback = 1; in ccp_aes_xts_crypt() 146 fallback = 1; in ccp_aes_xts_crypt() 147 if (fallback) { in ccp_aes_xts_crypt()
|
| /Linux-v5.4/net/smc/ |
| D | smc_diag.c | 82 struct smc_diag_fallback fallback; in __smc_diag_dump() local 105 fallback.reason = smc->fallback_rsn; in __smc_diag_dump() 106 fallback.peer_diagnosis = smc->peer_diagnosis; in __smc_diag_dump() 107 if (nla_put(skb, SMC_DIAG_FALLBACK, sizeof(fallback), &fallback) < 0) in __smc_diag_dump()
|
| /Linux-v5.4/Documentation/devicetree/bindings/thermal/ |
| D | qcom-tsens.txt | 12 The generic "qcom,tsens-v2" property must be used as a fallback for any SoC 15 Similarly, the generic "qcom,tsens-v1" property must be used as a fallback for 28 Example 1 (legacy support before a fallback tsens-v2 property was introduced):
|
| /Linux-v5.4/Documentation/devicetree/bindings/spi/ |
| D | spi-rspi.txt | 5 "renesas,rspi-<soctype>", "renesas,rspi" as fallback. 7 "renesas,rspi-<soctype>", "renesas,rspi-rz" as fallback. 10 "renesas,qspi-<soctype>", "renesas,qspi" as fallback.
|