/linux-6.14.4/arch/powerpc/crypto/ |
D | aes.c | 23 struct crypto_cipher *fallback; member 31 struct crypto_cipher *fallback; in p8_aes_init() local 34 fallback = crypto_alloc_cipher(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in p8_aes_init() 35 if (IS_ERR(fallback)) { in p8_aes_init() 38 alg, PTR_ERR(fallback)); in p8_aes_init() 39 return PTR_ERR(fallback); in p8_aes_init() 42 crypto_cipher_set_flags(fallback, in p8_aes_init() 46 ctx->fallback = fallback; in p8_aes_init() 55 if (ctx->fallback) { in p8_aes_exit() 56 crypto_free_cipher(ctx->fallback); in p8_aes_exit() [all …]
|
D | aes_cbc.c | 19 struct crypto_skcipher *fallback; member 27 struct crypto_skcipher *fallback; in p8_aes_cbc_init() local 29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init() 32 if (IS_ERR(fallback)) { in p8_aes_cbc_init() 33 pr_err("Failed to allocate cbc(aes) fallback: %ld\n", in p8_aes_cbc_init() 34 PTR_ERR(fallback)); in p8_aes_cbc_init() 35 return PTR_ERR(fallback); in p8_aes_cbc_init() 39 crypto_skcipher_reqsize(fallback)); in p8_aes_cbc_init() 40 ctx->fallback = fallback; in p8_aes_cbc_init() 48 crypto_free_skcipher(ctx->fallback); in p8_aes_cbc_exit() [all …]
|
D | aes_ctr.c | 19 struct crypto_skcipher *fallback; member 26 struct crypto_skcipher *fallback; in p8_aes_ctr_init() local 28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init() 31 if (IS_ERR(fallback)) { in p8_aes_ctr_init() 32 pr_err("Failed to allocate ctr(aes) fallback: %ld\n", in p8_aes_ctr_init() 33 PTR_ERR(fallback)); in p8_aes_ctr_init() 34 return PTR_ERR(fallback); in p8_aes_ctr_init() 38 crypto_skcipher_reqsize(fallback)); in p8_aes_ctr_init() 39 ctx->fallback = fallback; in p8_aes_ctr_init() 47 crypto_free_skcipher(ctx->fallback); in p8_aes_ctr_exit() [all …]
|
D | aes_xts.c | 20 struct crypto_skcipher *fallback; member 29 struct crypto_skcipher *fallback; in p8_aes_xts_init() local 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 34 if (IS_ERR(fallback)) { in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 36 PTR_ERR(fallback)); in p8_aes_xts_init() 37 return PTR_ERR(fallback); in p8_aes_xts_init() 41 crypto_skcipher_reqsize(fallback)); in p8_aes_xts_init() 42 ctx->fallback = fallback; in p8_aes_xts_init() 50 crypto_free_skcipher(ctx->fallback); in p8_aes_xts_exit() [all …]
|
/linux-6.14.4/Documentation/driver-api/firmware/ |
D | fallback-mechanisms.rst | 2 Fallback mechanisms 5 A fallback mechanism is supported to allow to overcome failures to do a direct 8 configuration options related to supporting the firmware fallback mechanism are: 10 * CONFIG_FW_LOADER_USER_HELPER: enables building the firmware fallback 12 CONFIG_FW_LOADER_USER_HELPER_FALLBACK is disabled, only the custom fallback 15 enable the kobject uevent fallback mechanism on all firmware API calls 18 fallback mechanism: if this kconfig option is enabled and your second 20 informing the kernel that you have a custom fallback mechanism and it will 28 the kobject uevent fallback mechanism will never take effect even 31 Justifying the firmware fallback mechanism [all …]
|
/linux-6.14.4/drivers/firmware/broadcom/ |
D | bcm47xx_sprom.c | 50 const char *name, char *buf, int len, bool fallback) in get_nvram_var() argument 58 if (fallback && err == -ENOENT && prefix) { in get_nvram_var() 68 type *val, type allset, bool fallback) \ 75 fallback); \ 97 u16 *val_lo, u16 *val_hi, bool fallback) in NVRAM_READ_VAL() 103 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in NVRAM_READ_VAL() 118 bool fallback) in nvram_read_leddc() argument 124 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_leddc() 142 u8 val[6], bool fallback) in nvram_read_macaddr() argument 147 err = get_nvram_var(prefix, NULL, name, buf, sizeof(buf), fallback); in nvram_read_macaddr() [all …]
|
/linux-6.14.4/drivers/base/firmware_loader/ |
D | Kconfig | 97 bool "Enable the firmware sysfs fallback mechanism" 102 loading to the kernel through userspace as a fallback mechanism 107 built-in. For details on how to work with the sysfs fallback mechanism 108 refer to Documentation/driver-api/firmware/fallback-mechanisms.rst. 113 the requested firmware a sysfs fallback loading facility is made 116 this is known as the driver using the custom fallback mechanism. 117 If the custom fallback mechanism is used userspace must always 118 acknowledge failure to find firmware as the timeout for the fallback 124 can no longer be relied upon as a fallback mechanism. Linux no longer 125 relies on or uses a fallback mechanism in userspace. If you need to [all …]
|
D | fallback.c | 11 #include "fallback.h" 15 * firmware fallback mechanism 68 * fw_load_sysfs_fallback() - load a firmware via the sysfs fallback mechanism 72 * In charge of constructing a sysfs fallback interface for firmware loading. 187 pr_info_once("Ignoring firmware sysfs fallback due to sysctl knob\n"); in fw_run_sysfs_fallback() 194 /* Also permit LSMs and IMA to fail firmware sysfs fallback */ in fw_run_sysfs_fallback() 203 * firmware_fallback_sysfs() - use the fallback mechanism to find firmware 209 * @ret: return value from direct lookup which triggered the fallback mechanism 212 * a fallback mechanism through userspace by exposing a sysfs loading 214 * loading interface. This sysfs fallback mechanism may be disabled completely [all …]
|
D | firmware.h | 15 * @FW_OPT_UEVENT: Enables the fallback mechanism to send a kobject uevent 19 * @FW_OPT_USERHELPER: Enable the fallback mechanism, in case the direct 28 * @FW_OPT_NOFALLBACK_SYSFS: Disable the sysfs fallback mechanism. Takes 30 * @FW_OPT_FALLBACK_PLATFORM: Enable fallback to device fw copy embedded in 31 * the platform's main firmware. If both this fallback and the sysfs 32 * fallback are enabled, then this fallback will be tried first.
|
D | sysfs.h | 16 * struct firmware_fallback_config - firmware fallback configuration settings 18 * Helps describe and fine tune the fallback mechanism. 20 * @force_sysfs_fallback: force the sysfs fallback mechanism to be used 24 * @ignore_sysfs_fallback: force to disable the sysfs fallback mechanism. 28 * @loading_timeout: the timeout to wait for the fallback mechanism before
|
/linux-6.14.4/drivers/crypto/ |
D | geode-aes.c | 127 * The requested key size is not supported by HW, do a fallback in geode_setkey_cip() 129 tctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in geode_setkey_cip() 130 tctx->fallback.cip->base.crt_flags |= in geode_setkey_cip() 133 return crypto_cipher_setkey(tctx->fallback.cip, key, len); in geode_setkey_cip() 153 * The requested key size is not supported by HW, do a fallback in geode_setkey_skcipher() 155 crypto_skcipher_clear_flags(tctx->fallback.skcipher, in geode_setkey_skcipher() 157 crypto_skcipher_set_flags(tctx->fallback.skcipher, in geode_setkey_skcipher() 160 return crypto_skcipher_setkey(tctx->fallback.skcipher, key, len); in geode_setkey_skcipher() 169 crypto_cipher_encrypt_one(tctx->fallback.cip, out, in); in geode_encrypt() 184 crypto_cipher_decrypt_one(tctx->fallback.cip, out, in); in geode_decrypt() [all …]
|
D | atmel-ecc.c | 31 * @fallback : used for unsupported curves or when user wants to use its own 42 struct crypto_kpp *fallback; member 97 /* fallback to ecdh software implementation */ in atmel_ecdh_set_secret() 99 return crypto_kpp_set_secret(ctx->fallback, buf, len); in atmel_ecdh_set_secret() 145 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_generate_public_key() 174 kpp_request_set_tfm(req, ctx->fallback); in atmel_ecdh_compute_shared_secret() 250 struct crypto_kpp *fallback; in atmel_ecdh_init_tfm() local 260 fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK); in atmel_ecdh_init_tfm() 261 if (IS_ERR(fallback)) { in atmel_ecdh_init_tfm() 263 alg, PTR_ERR(fallback)); in atmel_ecdh_init_tfm() [all …]
|
D | padlock-sha.c | 25 struct shash_desc fallback; member 29 struct crypto_shash *fallback; member 37 dctx->fallback.tfm = ctx->fallback; in padlock_sha_init() 38 return crypto_shash_init(&dctx->fallback); in padlock_sha_init() 46 return crypto_shash_update(&dctx->fallback, data, length); in padlock_sha_update() 53 return crypto_shash_export(&dctx->fallback, out); in padlock_sha_export() 61 dctx->fallback.tfm = ctx->fallback; in padlock_sha_import() 62 return crypto_shash_import(&dctx->fallback, in); in padlock_sha_import() 87 err = crypto_shash_export(&dctx->fallback, &state); in padlock_sha1_finup() 92 return crypto_shash_finup(&dctx->fallback, in, count, out); in padlock_sha1_finup() [all …]
|
/linux-6.14.4/Documentation/block/ |
D | inline-encryption.rst | 132 blk-crypto-fallback 141 Therefore, we also introduce *blk-crypto-fallback*, which is an implementation 142 of inline encryption using the kernel crypto API. blk-crypto-fallback is built 146 handle en/decryption of the bio using blk-crypto-fallback. 149 on it being unmodified. Instead, blk-crypto-fallback allocates bounce pages, 152 blk-crypto-fallback completes the original bio. If the original bio is too 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 158 successfully, blk-crypto-fallback restores the bio's original completion 161 Afterwards, blk-crypto-fallback completes the bio. 163 In both cases, the bios that blk-crypto-fallback submits no longer have an [all …]
|
/linux-6.14.4/arch/s390/crypto/ |
D | aes_s390.c | 10 * Sebastian Siewior ([email protected]> SW-Fallback 50 } fallback; member 63 struct crypto_skcipher *fallback; member 82 sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; in setkey_fallback_cip() 83 sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & in setkey_fallback_cip() 86 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 115 crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); in crypto_aes_encrypt() 126 crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); in crypto_aes_decrypt() 138 sctx->fallback.cip = crypto_alloc_cipher(name, 0, in fallback_init_cip() 141 if (IS_ERR(sctx->fallback.cip)) { in fallback_init_cip() [all …]
|
/linux-6.14.4/tools/testing/selftests/firmware/ |
D | fw_fallback.sh | 3 # This validates that the kernel will fall back to using the fallback mechanism 76 echo "$0: custom fallback trigger not present, ignoring test" >&2 109 echo "$0: canceling custom fallback trigger not present, ignoring test" >&2 170 echo "$0: fallback mechanism immediately cancelled" 175 echo "to immediately cancel all fallback requests, this must be" 217 echo "$0: fallback mechanism works" 225 echo "$0: cancelling fallback mechanism works" 248 echo "$0: custom fallback loading mechanism works" 259 echo "$0: custom fallback loading mechanism works" 272 echo "$0: cancelling custom fallback mechanism works"
|
/linux-6.14.4/drivers/net/wireless/broadcom/b43/ |
D | xmit.h | 31 __le16 phy_ctl1_fb; /* PHY TX control word 1 for fallback rates */ 33 __le16 phy_ctl1_rts_fb; /* PHY TX control word 1 RTS for fallback rates */ 40 __le16 tx_fes_time_fb; /* TX FES Time Fallback */ 41 struct b43_plcp_hdr6 rts_plcp_fb; /* RTS fallback PLCP header */ 42 __le16 rts_dur_fb; /* RTS fallback duration */ 43 struct b43_plcp_hdr6 plcp_fb; /* Fallback PLCP header */ 44 __le16 dur_fb; /* Fallback duration */ 46 __le16 mimo_ratelen_fb; /* MIMO fallback rate length */ 101 #define B43_TXH_MAC_RTS_FB_SHORTPRMBL 0x80000000 /* RTS fallback preamble */ 103 #define B43_TXH_MAC_FB_SHORTPRMBL 0x20000000 /* Main fallback preamble */ [all …]
|
/linux-6.14.4/drivers/gpu/drm/ |
D | drm_edid_load.c | 58 char *edidname, *last, *colon, *fwstr, *edidstr, *fallback = NULL; in drm_edid_load_firmware() local 70 * the last one found one as a fallback. in drm_edid_load_firmware() 87 fallback = edidname; in drm_edid_load_firmware() 91 if (!fallback) { in drm_edid_load_firmware() 95 edidname = fallback; in drm_edid_load_firmware()
|
/linux-6.14.4/arch/arm/crypto/ |
D | aes-neonbs-glue.c | 53 struct crypto_aes_ctx fallback; member 58 struct crypto_aes_ctx fallback; member 64 struct crypto_aes_ctx fallback; member 132 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_cbc_setkey() 139 aesbs_convert_key(ctx->key.rk, ctx->fallback.key_enc, ctx->key.rounds); in aesbs_cbc_setkey() 162 __aes_arm_encrypt(ctx->fallback.key_enc, in cbc_encrypt() 209 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 216 aesbs_convert_key(ctx->key.rk, ctx->fallback.key_enc, ctx->key.rounds); in aesbs_ctr_setkey_sync() 261 __aes_arm_encrypt(ctx->fallback.key_enc, ctx->key.rounds, src, dst); in ctr_encrypt_one() 283 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_xts_setkey() [all …]
|
/linux-6.14.4/block/ |
D | blk-crypto-fallback.c | 10 #define pr_fmt(fmt) "blk-crypto-fallback: " fmt 28 "Number of preallocated bounce pages for the blk-crypto crypto API fallback"); 33 "Number of keyslots for the blk-crypto crypto API fallback"); 38 …"Number of preallocated bio fallback crypto contexts for blk-crypto to use during crypto API fallb… 256 * The crypto API fallback's encryption routine. 293 * Get a blk-crypto-fallback keyslot that contains a crypto_skcipher for in blk_crypto_fallback_encrypt_bio() 374 * The crypto API fallback's main decryption routine. 396 * Get a blk-crypto-fallback keyslot that contains a crypto_skcipher for in blk_crypto_fallback_decrypt_bio() 445 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption 472 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption [all …]
|
/linux-6.14.4/scripts/dtc/ |
D | dtc.c | 116 static const char *guess_type_by_name(const char *fname, const char *fallback) in guess_type_by_name() argument 122 return fallback; in guess_type_by_name() 131 return fallback; in guess_type_by_name() 134 static const char *guess_input_format(const char *fname, const char *fallback) in guess_input_format() argument 141 return fallback; in guess_input_format() 147 return fallback; in guess_input_format() 151 return fallback; in guess_input_format() 154 return fallback; in guess_input_format() 161 return guess_type_by_name(fname, fallback); in guess_input_format()
|
/linux-6.14.4/drivers/crypto/qce/ |
D | skcipher.c | 184 * Revisit to request a fallback cipher in this case. in qce_skcipher_setkey() 205 ret = crypto_skcipher_setkey(ctx->fallback, key, keylen); in qce_skcipher_setkey() 242 * are the same. Revisit to see if a fallback cipher in qce_des3_setkey() 283 * Conditions for requesting a fallback cipher in qce_skcipher_crypt() 295 skcipher_request_set_tfm(&rctx->fallback_req, ctx->fallback); in qce_skcipher_crypt() 322 /* take the size without the fallback skcipher_request at the end */ in qce_skcipher_init() 332 ctx->fallback = crypto_alloc_skcipher(crypto_tfm_alg_name(&tfm->base), in qce_skcipher_init_fallback() 334 if (IS_ERR(ctx->fallback)) in qce_skcipher_init_fallback() 335 return PTR_ERR(ctx->fallback); in qce_skcipher_init_fallback() 338 crypto_skcipher_reqsize(ctx->fallback)); in qce_skcipher_init_fallback() [all …]
|
/linux-6.14.4/lib/crypto/ |
D | Kconfig | 40 fallback, e.g., for SIMD implementations. If no arch specific 57 fallback, e.g., for SIMD implementations. If no arch specific 82 fallback, e.g., for SIMD implementations. If no arch specific 118 fallback, e.g., for SIMD implementations. If no arch specific
|
/linux-6.14.4/sound/soc/sof/ |
D | Kconfig | 102 This adds support for a dummy/nocodec machine driver fallback 111 Say Y if you need this nocodec fallback option. 130 bool "SOF allow fallback to newer IPC version" 132 This option will allow the kernel to try to 'fallback' to a newer IPC 135 IPC version fallback to older versions is not affected by this option, 154 This adds support for a dummy/nocodec machine driver fallback 160 Say Y if you need this nocodec debug fallback option.
|
/linux-6.14.4/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 111 unsigned int fallback = 0; in ccp_aes_xts_crypt() local 140 fallback = 1; in ccp_aes_xts_crypt() 143 fallback = 1; in ccp_aes_xts_crypt() 146 fallback = 1; in ccp_aes_xts_crypt() 147 if (fallback) { in ccp_aes_xts_crypt() 148 /* Use the fallback to process the request for any in ccp_aes_xts_crypt() 208 pr_warn("could not load fallback driver xts(aes)\n"); in ccp_aes_xts_init_tfm()
|