Home
last modified time | relevance | path

Searched full:fallback (Results 1 – 25 of 2160) sorted by relevance

12345678910>>...87

/kernel/linux/linux-6.6/drivers/crypto/vmx/
Daes.c23 struct crypto_cipher *fallback; member
31 struct crypto_cipher *fallback; in p8_aes_init() local
34 fallback = crypto_alloc_cipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_aes_init()
35 if (IS_ERR(fallback)) { in p8_aes_init()
38 alg, PTR_ERR(fallback)); in p8_aes_init()
39 return PTR_ERR(fallback); in p8_aes_init()
42 crypto_cipher_set_flags(fallback, in p8_aes_init()
46 ctx->fallback = fallback; in p8_aes_init()
55 if (ctx->fallback) { in p8_aes_exit()
56 crypto_free_cipher(ctx->fallback); in p8_aes_exit()
[all …]
Daes_cbc.c19 struct crypto_skcipher *fallback; member
27 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local
29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init()
32 if (IS_ERR(fallback)) { in p8_aes_cbc_init()
33 pr_err("Failed to allocate cbc(aes) fallback: %ld\n", in p8_aes_cbc_init()
34 PTR_ERR(fallback)); in p8_aes_cbc_init()
35 return PTR_ERR(fallback); in p8_aes_cbc_init()
39 crypto_skcipher_reqsize(fallback)); in p8_aes_cbc_init()
40 ctx->fallback = fallback; in p8_aes_cbc_init()
48 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit()
[all …]
Daes_ctr.c19 struct crypto_skcipher *fallback; member
26 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local
28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init()
31 if (IS_ERR(fallback)) { in p8_aes_ctr_init()
32 pr_err("Failed to allocate ctr(aes) fallback: %ld\n", in p8_aes_ctr_init()
33 PTR_ERR(fallback)); in p8_aes_ctr_init()
34 return PTR_ERR(fallback); in p8_aes_ctr_init()
38 crypto_skcipher_reqsize(fallback)); in p8_aes_ctr_init()
39 ctx->fallback = fallback; in p8_aes_ctr_init()
47 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit()
[all …]
Daes_xts.c20 struct crypto_skcipher *fallback; member
29 struct crypto_skcipher *fallback; in p8_aes_xts_init() local
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
34 if (IS_ERR(fallback)) { in p8_aes_xts_init()
35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init()
36 PTR_ERR(fallback)); in p8_aes_xts_init()
37 return PTR_ERR(fallback); in p8_aes_xts_init()
41 crypto_skcipher_reqsize(fallback)); in p8_aes_xts_init()
42 ctx->fallback = fallback; in p8_aes_xts_init()
50 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit()
[all …]
/kernel/linux/linux-5.10/drivers/crypto/vmx/
Daes.c22 struct crypto_cipher *fallback; member
30 struct crypto_cipher *fallback; in p8_aes_init() local
33 fallback = crypto_alloc_cipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_aes_init()
34 if (IS_ERR(fallback)) { in p8_aes_init()
37 alg, PTR_ERR(fallback)); in p8_aes_init()
38 return PTR_ERR(fallback); in p8_aes_init()
41 crypto_cipher_set_flags(fallback, in p8_aes_init()
45 ctx->fallback = fallback; in p8_aes_init()
54 if (ctx->fallback) { in p8_aes_exit()
55 crypto_free_cipher(ctx->fallback); in p8_aes_exit()
[all …]
Daes_cbc.c19 struct crypto_skcipher *fallback; member
27 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local
29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init()
32 if (IS_ERR(fallback)) { in p8_aes_cbc_init()
33 pr_err("Failed to allocate cbc(aes) fallback: %ld\n", in p8_aes_cbc_init()
34 PTR_ERR(fallback)); in p8_aes_cbc_init()
35 return PTR_ERR(fallback); in p8_aes_cbc_init()
39 crypto_skcipher_reqsize(fallback)); in p8_aes_cbc_init()
40 ctx->fallback = fallback; in p8_aes_cbc_init()
48 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit()
[all …]
Daes_ctr.c19 struct crypto_skcipher *fallback; member
26 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local
28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init()
31 if (IS_ERR(fallback)) { in p8_aes_ctr_init()
32 pr_err("Failed to allocate ctr(aes) fallback: %ld\n", in p8_aes_ctr_init()
33 PTR_ERR(fallback)); in p8_aes_ctr_init()
34 return PTR_ERR(fallback); in p8_aes_ctr_init()
38 crypto_skcipher_reqsize(fallback)); in p8_aes_ctr_init()
39 ctx->fallback = fallback; in p8_aes_ctr_init()
47 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit()
[all …]
Daes_xts.c20 struct crypto_skcipher *fallback; member
29 struct crypto_skcipher *fallback; in p8_aes_xts_init() local
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
34 if (IS_ERR(fallback)) { in p8_aes_xts_init()
35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init()
36 PTR_ERR(fallback)); in p8_aes_xts_init()
37 return PTR_ERR(fallback); in p8_aes_xts_init()
41 crypto_skcipher_reqsize(fallback)); in p8_aes_xts_init()
42 ctx->fallback = fallback; in p8_aes_xts_init()
50 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit()
[all …]
/kernel/linux/linux-6.6/Documentation/driver-api/firmware/
Dfallback-mechanisms.rst2 Fallback mechanisms
5 A fallback mechanism is supported to allow to overcome failures to do a direct
8 configuration options related to supporting the firmware fallback mechanism are:
10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback
12 CONFIG_FW_LOADER_USER_HELPER_FALLBACK is disabled, only the custom fallback
15 enable the kobject uevent fallback mechanism on all firmware API calls
18 fallback mechanism: if this kconfig option is enabled and your second
20 informing the kernel that you have a custom fallback mechanism and it will
28 the kobject uevent fallback mechanism will never take effect even
31 Justifying the firmware fallback mechanism
[all …]
/kernel/linux/linux-5.10/Documentation/driver-api/firmware/
Dfallback-mechanisms.rst2 Fallback mechanisms
5 A fallback mechanism is supported to allow to overcome failures to do a direct
8 configuration options related to supporting the firmware fallback mechanism are:
10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback
12 CONFIG_FW_LOADER_USER_HELPER_FALLBACK is disabled, only the custom fallback
15 enable the kobject uevent fallback mechanism on all firmware API calls
18 fallback mechanism: if this kconfig option is enabled and your second
20 informing the kernel that you have a custom fallback mechanism and it will
28 the kobject uevent fallback mechanism will never take effect even
31 Justifying the firmware fallback mechanism
[all …]
/kernel/linux/linux-6.6/drivers/firmware/broadcom/
Dbcm47xx_sprom.c50 const char *name, char *buf, int len, bool fallback) in get_nvram_var() argument
58 if (fallback && err == -ENOENT && prefix) { in get_nvram_var()
68 type *val, type allset, bool fallback) \
75 fallback); \
97 u16 *val_lo, u16 *val_hi, bool fallback) in NVRAM_READ_VAL()
103 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in NVRAM_READ_VAL()
118 bool fallback) in nvram_read_leddc() argument
124 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_leddc()
142 u8 val[6], bool fallback) in nvram_read_macaddr() argument
147 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_macaddr()
[all …]
/kernel/linux/linux-5.10/drivers/firmware/broadcom/
Dbcm47xx_sprom.c50 const char *name, char *buf, int len, bool fallback) in get_nvram_var() argument
58 if (fallback && err == -ENOENT && prefix) { in get_nvram_var()
68 type *val, type allset, bool fallback) \
75 fallback); \
97 u16 *val_lo, u16 *val_hi, bool fallback) in NVRAM_READ_VAL()
103 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in NVRAM_READ_VAL()
118 bool fallback) in nvram_read_leddc() argument
124 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_leddc()
142 u8 val[6], bool fallback) in nvram_read_macaddr() argument
147 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_macaddr()
[all …]
/kernel/linux/linux-5.10/drivers/base/firmware_loader/
DKconfig72 bool "Enable the firmware sysfs fallback mechanism"
76 loading to the kernel through userspace as a fallback mechanism
81 built-in. For details on how to work with the sysfs fallback mechanism
82 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst.
87 the requested firmware a sysfs fallback loading facility is made
90 this is known as the driver using the custom fallback mechanism.
91 If the custom fallback mechanism is used userspace must always
92 acknowledge failure to find firmware as the timeout for the fallback
98 can no longer be relied upon as a fallback mechanism. Linux no longer
99 relies on or uses a fallback mechanism in userspace. If you need to
[all …]
/kernel/linux/linux-5.10/drivers/crypto/
Dgeode-aes.c126 * The requested key size is not supported by HW, do a fallback in geode_setkey_cip()
128 tctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip()
129 tctx->fallback.cip->base.crt_flags |= in geode_setkey_cip()
132 return crypto_cipher_setkey(tctx->fallback.cip, key, len); in geode_setkey_cip()
152 * The requested key size is not supported by HW, do a fallback in geode_setkey_skcipher()
154 crypto_skcipher_clear_flags(tctx->fallback.skcipher, in geode_setkey_skcipher()
156 crypto_skcipher_set_flags(tctx->fallback.skcipher, in geode_setkey_skcipher()
159 return crypto_skcipher_setkey(tctx->fallback.skcipher, key, len); in geode_setkey_skcipher()
168 crypto_cipher_encrypt_one(tctx->fallback.cip, out, in); in geode_encrypt()
183 crypto_cipher_decrypt_one(tctx->fallback.cip, out, in); in geode_decrypt()
[all …]
Datmel-ecc.c31 * @fallback : used for unsupported curves or when user wants to use its own
43 struct crypto_kpp *fallback; member
109 /* fallback to ecdh software implementation */ in atmel_ecdh_set_secret()
111 return crypto_kpp_set_secret(ctx->fallback, buf, len); in atmel_ecdh_set_secret()
158 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key()
187 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret()
263 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local
272 fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in atmel_ecdh_init_tfm()
273 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm()
275 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm()
[all …]
Dpadlock-sha.c24 struct shash_desc fallback; member
28 struct crypto_shash *fallback; member
36 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init()
37 return crypto_shash_init(&dctx->fallback); in padlock_sha_init()
45 return crypto_shash_update(&dctx->fallback, data, length); in padlock_sha_update()
52 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export()
60 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import()
61 return crypto_shash_import(&dctx->fallback, in); in padlock_sha_import()
86 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha1_finup()
91 return crypto_shash_finup(&dctx->fallback, in, count, out); in padlock_sha1_finup()
[all …]
/kernel/linux/linux-6.6/drivers/base/firmware_loader/
DKconfig90 bool "Enable the firmware sysfs fallback mechanism"
95 loading to the kernel through userspace as a fallback mechanism
100 built-in. For details on how to work with the sysfs fallback mechanism
101 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst.
106 the requested firmware a sysfs fallback loading facility is made
109 this is known as the driver using the custom fallback mechanism.
110 If the custom fallback mechanism is used userspace must always
111 acknowledge failure to find firmware as the timeout for the fallback
117 can no longer be relied upon as a fallback mechanism. Linux no longer
118 relies on or uses a fallback mechanism in userspace. If you need to
[all …]
Dfallback.c11 #include "fallback.h"
15 * firmware fallback mechanism
64 * fw_load_sysfs_fallback() - load a firmware via the sysfs fallback mechanism
68 * In charge of constructing a sysfs fallback interface for firmware loading.
183 pr_info_once("Ignoring firmware sysfs fallback due to sysctl knob\n"); in fw_run_sysfs_fallback()
190 /* Also permit LSMs and IMA to fail firmware sysfs fallback */ in fw_run_sysfs_fallback()
199 * firmware_fallback_sysfs() - use the fallback mechanism to find firmware
205 * @ret: return value from direct lookup which triggered the fallback mechanism
208 * a fallback mechanism through userspace by exposing a sysfs loading
210 * loading interface. This sysfs fallback mechanism may be disabled completely
[all …]
/kernel/linux/linux-6.6/drivers/crypto/
Dgeode-aes.c127 * The requested key size is not supported by HW, do a fallback in geode_setkey_cip()
129 tctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip()
130 tctx->fallback.cip->base.crt_flags |= in geode_setkey_cip()
133 return crypto_cipher_setkey(tctx->fallback.cip, key, len); in geode_setkey_cip()
153 * The requested key size is not supported by HW, do a fallback in geode_setkey_skcipher()
155 crypto_skcipher_clear_flags(tctx->fallback.skcipher, in geode_setkey_skcipher()
157 crypto_skcipher_set_flags(tctx->fallback.skcipher, in geode_setkey_skcipher()
160 return crypto_skcipher_setkey(tctx->fallback.skcipher, key, len); in geode_setkey_skcipher()
169 crypto_cipher_encrypt_one(tctx->fallback.cip, out, in); in geode_encrypt()
184 crypto_cipher_decrypt_one(tctx->fallback.cip, out, in); in geode_decrypt()
[all …]
Datmel-ecc.c31 * @fallback : used for unsupported curves or when user wants to use its own
42 struct crypto_kpp *fallback; member
97 /* fallback to ecdh software implementation */ in atmel_ecdh_set_secret()
99 return crypto_kpp_set_secret(ctx->fallback, buf, len); in atmel_ecdh_set_secret()
145 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key()
174 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret()
250 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local
260 fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in atmel_ecdh_init_tfm()
261 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm()
263 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm()
[all …]
Dpadlock-sha.c25 struct shash_desc fallback; member
29 struct crypto_shash *fallback; member
37 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init()
38 return crypto_shash_init(&dctx->fallback); in padlock_sha_init()
46 return crypto_shash_update(&dctx->fallback, data, length); in padlock_sha_update()
53 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export()
61 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import()
62 return crypto_shash_import(&dctx->fallback, in); in padlock_sha_import()
87 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha1_finup()
92 return crypto_shash_finup(&dctx->fallback, in, count, out); in padlock_sha1_finup()
[all …]
/kernel/linux/linux-6.6/Documentation/block/
Dinline-encryption.rst132 blk-crypto-fallback
141 Therefore, we also introduce *blk-crypto-fallback*, which is an implementation
142 of inline encryption using the kernel crypto API. blk-crypto-fallback is built
146 handle en/decryption of the bio using blk-crypto-fallback.
149 on it being unmodified. Instead, blk-crypto-fallback allocates bounce pages,
152 blk-crypto-fallback completes the original bio. If the original bio is too
155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback
158 successfully, blk-crypto-fallback restores the bio's original completion
161 Afterwards, blk-crypto-fallback completes the bio.
163 In both cases, the bios that blk-crypto-fallback submits no longer have an
[all …]
/kernel/linux/linux-5.10/Documentation/block/
Dinline-encryption.rst27 To allow for testing, we also want a crypto API fallback when actual
84 blk-mq changes, other block layer changes and blk-crypto-fallback
93 We introduce ``block/blk-crypto-fallback.c``, which allows upper layers to remain
97 en/decrypt the bio with the blk-crypto-fallback.
102 concerned). ``blk-crypto-fallback`` sets the bounce bio's ``bi_end_io`` to an
106 is saved and overwritten by ``blk-crypto-fallback`` to
114 blk-crypto-fallback is used, the ciphertext written to disk (and hence the
120 ``blk-crypto-fallback``. We will eventually reach a point in blk-mq when a
154 blk-crypto-fallback, if hardware support isn't available for the desired
160 (either by real inline encryption hardware, or by the blk-crypto-fallback).
[all …]
/kernel/linux/linux-6.6/arch/s390/crypto/
Daes_s390.c10 * Sebastian Siewior (sebastian@breakpoint.cc> SW-Fallback
50 } fallback; member
58 struct crypto_skcipher *fallback; member
77 sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in setkey_fallback_cip()
78 sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & in setkey_fallback_cip()
81 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip()
110 crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); in crypto_aes_encrypt()
121 crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); in crypto_aes_decrypt()
133 sctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip()
136 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip()
[all …]
/kernel/linux/linux-5.10/arch/s390/crypto/
Daes_s390.c10 * Sebastian Siewior (sebastian@breakpoint.cc> SW-Fallback
49 } fallback; member
57 struct crypto_skcipher *fallback; member
76 sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in setkey_fallback_cip()
77 sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & in setkey_fallback_cip()
80 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip()
109 crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); in crypto_aes_encrypt()
120 crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); in crypto_aes_decrypt()
132 sctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip()
135 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip()
[all …]

12345678910>>...87