Lines Matching defs:fallback
845 crypto_free_skcipher(ctx->fallback.skcipher);
871 dev_err(sa_k3_dev, "Error allocating fallback algo %s\n", name);
875 ctx->fallback.skcipher = child;
889 struct crypto_skcipher *child = ctx->fallback.skcipher;
1119 * avoided. This will be handled by the SW fallback mechanism by
1310 /* Use SW fallback if the data size is not supported */
1316 skcipher_request_set_tfm(subreq, ctx->fallback.skcipher);
1420 ahash_request_set_tfm(subreq, ctx->fallback.ahash);
1512 /* for fallback */
1513 ctx->fallback.ahash =
1516 if (IS_ERR(ctx->fallback.ahash)) {
1518 "Could not load fallback driver\n");
1519 return PTR_ERR(ctx->fallback.ahash);
1529 crypto_ahash_reqsize(ctx->fallback.ahash));
1548 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
1561 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
1576 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
1590 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
1607 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
1621 ahash_request_set_tfm(subreq, ctx->fallback.ahash);
1688 crypto_free_ahash(ctx->fallback.ahash);
1731 const char *fallback)
1746 ctx->fallback.aead = crypto_alloc_aead(fallback, 0,
1749 if (IS_ERR(ctx->fallback.aead)) {
1750 dev_err(sa_k3_dev, "fallback driver %s couldn't be loaded\n",
1751 fallback);
1752 return PTR_ERR(ctx->fallback.aead);
1756 crypto_aead_reqsize(ctx->fallback.aead));
1793 crypto_free_aead(ctx->fallback.aead);
1868 crypto_aead_clear_flags(ctx->fallback.aead, CRYPTO_TFM_REQ_MASK);
1869 crypto_aead_set_flags(ctx->fallback.aead,
1873 return crypto_aead_setkey(ctx->fallback.aead, key, keylen);
1880 return crypto_aead_setauthsize(ctx->fallback.aead, authsize);
1930 aead_request_set_tfm(subreq, ctx->fallback.aead);