/linux/drivers/crypto/vmx/ |
A D | aes.c | 23 struct crypto_cipher *fallback; member 31 struct crypto_cipher *fallback; in p8_aes_init() local 35 if (IS_ERR(fallback)) { in p8_aes_init() 38 alg, PTR_ERR(fallback)); in p8_aes_init() 39 return PTR_ERR(fallback); in p8_aes_init() 42 crypto_cipher_set_flags(fallback, in p8_aes_init() 46 ctx->fallback = fallback; in p8_aes_init() 55 if (ctx->fallback) { in p8_aes_exit() 56 crypto_free_cipher(ctx->fallback); in p8_aes_exit() 57 ctx->fallback = NULL; in p8_aes_exit() [all …]
|
A D | aes_cbc.c | 19 struct crypto_skcipher *fallback; member 27 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local 29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init() 32 if (IS_ERR(fallback)) { in p8_aes_cbc_init() 34 PTR_ERR(fallback)); in p8_aes_cbc_init() 35 return PTR_ERR(fallback); in p8_aes_cbc_init() 39 crypto_skcipher_reqsize(fallback)); in p8_aes_cbc_init() 40 ctx->fallback = fallback; in p8_aes_cbc_init() 48 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit() 66 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_cbc_setkey() [all …]
|
A D | aes_ctr.c | 19 struct crypto_skcipher *fallback; member 26 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local 28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init() 31 if (IS_ERR(fallback)) { in p8_aes_ctr_init() 33 PTR_ERR(fallback)); in p8_aes_ctr_init() 34 return PTR_ERR(fallback); in p8_aes_ctr_init() 38 crypto_skcipher_reqsize(fallback)); in p8_aes_ctr_init() 39 ctx->fallback = fallback; in p8_aes_ctr_init() 47 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit() 64 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_ctr_setkey() [all …]
|
A D | aes_xts.c | 20 struct crypto_skcipher *fallback; member 29 struct crypto_skcipher *fallback; in p8_aes_xts_init() local 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 34 if (IS_ERR(fallback)) { in p8_aes_xts_init() 36 PTR_ERR(fallback)); in p8_aes_xts_init() 37 return PTR_ERR(fallback); in p8_aes_xts_init() 41 crypto_skcipher_reqsize(fallback)); in p8_aes_xts_init() 42 ctx->fallback = fallback; in p8_aes_xts_init() 50 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit() 73 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_xts_setkey() [all …]
|
/linux/drivers/firmware/broadcom/ |
A D | bcm47xx_sprom.c | 75 fallback); \ 118 bool fallback) in nvram_read_leddc() argument 192 bool fb = fallback; in bcm47xx_sprom_fill_auto() 513 bool fb = fallback; in bcm47xx_fill_sprom_ethernet() 517 fallback); in bcm47xx_fill_sprom_ethernet() 519 fallback); in bcm47xx_fill_sprom_ethernet() 523 fallback); in bcm47xx_fill_sprom_ethernet() 525 fallback); in bcm47xx_fill_sprom_ethernet() 556 bool fallback) in bcm47xx_fill_board_data() argument 565 bool fallback) in bcm47xx_fill_sprom() argument [all …]
|
/linux/drivers/crypto/ |
A D | geode-aes.c | 130 tctx->fallback.cip->base.crt_flags |= in geode_setkey_cip() 155 crypto_skcipher_clear_flags(tctx->fallback.skcipher, in geode_setkey_skcipher() 157 crypto_skcipher_set_flags(tctx->fallback.skcipher, in geode_setkey_skcipher() 197 tctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip() 200 if (IS_ERR(tctx->fallback.cip)) { in fallback_init_cip() 202 return PTR_ERR(tctx->fallback.cip); in fallback_init_cip() 212 crypto_free_cipher(tctx->fallback.cip); in fallback_exit_cip() 243 tctx->fallback.skcipher = in geode_init_skcipher() 246 if (IS_ERR(tctx->fallback.skcipher)) { in geode_init_skcipher() 248 return PTR_ERR(tctx->fallback.skcipher); in geode_init_skcipher() [all …]
|
A D | atmel-ecc.c | 42 struct crypto_kpp *fallback; member 145 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key() 174 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret() 250 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local 261 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm() 263 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm() 264 return PTR_ERR(fallback); in atmel_ecdh_init_tfm() 268 ctx->fallback = fallback; in atmel_ecdh_init_tfm() 278 crypto_free_kpp(ctx->fallback); in atmel_ecdh_exit_tfm() 286 if (ctx->fallback) in atmel_ecdh_max_size() [all …]
|
A D | padlock-sha.c | 25 struct shash_desc fallback; member 29 struct crypto_shash *fallback; member 37 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init() 38 return crypto_shash_init(&dctx->fallback); in padlock_sha_init() 53 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export() 61 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import() 62 return crypto_shash_import(&dctx->fallback, in); in padlock_sha_import() 87 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha1_finup() 148 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha256_finup() 209 ctx->fallback = fallback_tfm; in padlock_init_tfm() [all …]
|
A D | sa2ul.c | 874 ctx->fallback.skcipher = child; in sa_cipher_cra_init() 1512 ctx->fallback.ahash = in sa_sha_cra_init_alg() 1515 if (IS_ERR(ctx->fallback.ahash)) { in sa_sha_cra_init_alg() 1518 return PTR_ERR(ctx->fallback.ahash); in sa_sha_cra_init_alg() 1687 crypto_free_ahash(ctx->fallback.ahash); in sa_sha_cra_exit() 1730 const char *fallback) in sa_cra_init_aead() argument 1745 ctx->fallback.aead = crypto_alloc_aead(fallback, 0, in sa_cra_init_aead() 1748 if (IS_ERR(ctx->fallback.aead)) { in sa_cra_init_aead() 1750 fallback); in sa_cra_init_aead() 1751 return PTR_ERR(ctx->fallback.aead); in sa_cra_init_aead() [all …]
|
/linux/arch/s390/crypto/ |
A D | aes_s390.c | 50 } fallback; member 58 struct crypto_skcipher *fallback; member 136 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip() 139 return PTR_ERR(sctx->fallback.cip); in fallback_init_cip() 149 crypto_free_cipher(sctx->fallback.cip); in fallback_exit_cip() 150 sctx->fallback.cip = NULL; in fallback_exit_cip() 262 if (IS_ERR(sctx->fallback.skcipher)) { in fallback_init_skcipher() 265 return PTR_ERR(sctx->fallback.skcipher); in fallback_init_skcipher() 498 if (IS_ERR(xts_ctx->fallback)) { in xts_fallback_init() 501 return PTR_ERR(xts_ctx->fallback); in xts_fallback_init() [all …]
|
/linux/Documentation/driver-api/firmware/ |
A D | fallback-mechanisms.rst | 31 Justifying the firmware fallback mechanism 36 fallback mechanism: 54 Types of fallback mechanisms 60 * Kobject uevent fallback mechanism 61 * Custom fallback mechanism 114 .. kernel-doc:: drivers/base/firmware_loader/fallback.c 117 Firmware kobject uevent fallback mechanism 164 Firmware custom fallback mechanism 189 Firmware fallback timeout 207 EFI embedded firmware fallback mechanism [all …]
|
/linux/scripts/dtc/ |
A D | dtc.c | 114 static const char *guess_type_by_name(const char *fname, const char *fallback) in guess_type_by_name() argument 120 return fallback; in guess_type_by_name() 129 return fallback; in guess_type_by_name() 132 static const char *guess_input_format(const char *fname, const char *fallback) in guess_input_format() argument 139 return fallback; in guess_input_format() 145 return fallback; in guess_input_format() 149 return fallback; in guess_input_format() 152 return fallback; in guess_input_format() 159 return guess_type_by_name(fname, fallback); in guess_input_format()
|
/linux/drivers/base/firmware_loader/ |
A D | Kconfig | 72 bool "Enable the firmware sysfs fallback mechanism" 76 loading to the kernel through userspace as a fallback mechanism 82 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst. 87 the requested firmware a sysfs fallback loading facility is made 90 this is known as the driver using the custom fallback mechanism. 91 If the custom fallback mechanism is used userspace must always 99 relies on or uses a fallback mechanism in userspace. If you need to 144 bool "Force the firmware sysfs fallback mechanism when possible" 147 Enabling this option forces a sysfs userspace fallback mechanism 149 a fallback mechanism. Firmware calls which do prohibit a fallback [all …]
|
/linux/block/ |
A D | blk-mq-virtio.c | 31 goto fallback; in blk_mq_virtio_map_queues() 36 goto fallback; in blk_mq_virtio_map_queues() 43 fallback: in blk_mq_virtio_map_queues()
|
A D | blk-mq-rdma.c | 33 goto fallback; in blk_mq_rdma_map_queues() 41 fallback: in blk_mq_rdma_map_queues()
|
A D | blk-mq-pci.c | 35 goto fallback; in blk_mq_pci_map_queues() 43 fallback: in blk_mq_pci_map_queues()
|
/linux/tools/testing/selftests/bpf/progs/ |
A D | bpf_dctcp.c | 20 volatile const char fallback[TCP_CA_NAME_MAX]; variable 65 if (!(tp->ecn_flags & TCP_ECN_OK) && fallback[0]) { in BPF_PROG() 68 (void *)fallback, sizeof(fallback)); in BPF_PROG() 76 (void *)fallback, sizeof(fallback)); in BPF_PROG()
|
/linux/Documentation/block/ |
A D | inline-encryption.rst | 132 blk-crypto-fallback 146 handle en/decryption of the bio using blk-crypto-fallback. 152 blk-crypto-fallback completes the original bio. If the original bio is too 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 158 successfully, blk-crypto-fallback restores the bio's original completion 161 Afterwards, blk-crypto-fallback completes the bio. 163 In both cases, the bios that blk-crypto-fallback submits no longer have an 166 blk-crypto-fallback also defines its own blk_crypto_profile and has its own 174 makes sense for blk-crypto-fallback. 177 blk-crypto-fallback is used, the ciphertext written to disk (and hence the [all …]
|
/linux/drivers/gpu/drm/ |
A D | drm_edid_load.c | 269 char *edidname, *last, *colon, *fwstr, *edidstr, *fallback = NULL; in drm_load_edid_firmware() local 298 fallback = edidname; in drm_load_edid_firmware() 302 if (!fallback) { in drm_load_edid_firmware() 306 edidname = fallback; in drm_load_edid_firmware()
|
/linux/drivers/crypto/ccp/ |
A D | ccp-crypto-aes-xts.c | 111 unsigned int fallback = 0; in ccp_aes_xts_crypt() local 140 fallback = 1; in ccp_aes_xts_crypt() 143 fallback = 1; in ccp_aes_xts_crypt() 146 fallback = 1; in ccp_aes_xts_crypt() 147 if (fallback) { in ccp_aes_xts_crypt()
|
/linux/kernel/bpf/preload/iterators/ |
A D | iterators.bpf.c | 59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument 66 return fallback; in get_name() 72 return fallback; in get_name()
|
/linux/include/linux/ |
A D | bcm47xx_sprom.h | 16 bool fallback); 21 bool fallback) in bcm47xx_fill_sprom() argument
|
/linux/mm/kfence/ |
A D | report.c | 53 int skipnr, fallback = 0; in get_stack_skipnr() local 83 fallback = skipnr + 1; in get_stack_skipnr() 93 if (fallback < num_entries) in get_stack_skipnr() 94 return fallback; in get_stack_skipnr()
|
/linux/drivers/crypto/qce/ |
A D | skcipher.c | 205 ret = crypto_skcipher_setkey(ctx->fallback, key, keylen); in qce_skcipher_setkey() 295 skcipher_request_set_tfm(&rctx->fallback_req, ctx->fallback); in qce_skcipher_crypt() 332 ctx->fallback = crypto_alloc_skcipher(crypto_tfm_alg_name(&tfm->base), in qce_skcipher_init_fallback() 334 if (IS_ERR(ctx->fallback)) in qce_skcipher_init_fallback() 335 return PTR_ERR(ctx->fallback); in qce_skcipher_init_fallback() 338 crypto_skcipher_reqsize(ctx->fallback)); in qce_skcipher_init_fallback() 346 crypto_free_skcipher(ctx->fallback); in qce_skcipher_exit()
|
/linux/scripts/atomic/ |
A D | gen-atomics.sh | 13 gen-atomic-fallback.sh linux/atomic/atomic-arch-fallback.h
|