Home
last modified time | relevance | path

Searched full:ecb (Results 1 – 25 of 119) sorted by relevance

12345

/Linux-v5.10/drivers/scsi/
Daha1740.c77 struct ecb ecb[AHA1740_ECBS]; member
88 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu()
96 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu()
104 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma()
213 struct ecb *ecbptr; in aha1740_intr_handle()
279 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle()
347 /* locate an available ecb */ in aha1740_queuecommand_lck()
353 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
360 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
361 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck()
[all …]
/Linux-v5.10/crypto/
Dtcrypt.c1688 ret += tcrypt_test("ecb(des)"); in do_test()
1694 ret += tcrypt_test("ecb(des3_ede)"); in do_test()
1708 ret += tcrypt_test("ecb(blowfish)"); in do_test()
1714 ret += tcrypt_test("ecb(twofish)"); in do_test()
1722 ret += tcrypt_test("ecb(serpent)"); in do_test()
1730 ret += tcrypt_test("ecb(aes)"); in do_test()
1753 ret += tcrypt_test("ecb(cast5)"); in do_test()
1759 ret += tcrypt_test("ecb(cast6)"); in do_test()
1767 ret += tcrypt_test("ecb(arc4)"); in do_test()
1779 ret += tcrypt_test("ecb(tea)"); in do_test()
[all …]
Darc4.c46 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init()
54 * For legacy reasons, this is named "ecb(arc4)", not "arc4".
57 .base.cra_name = "ecb(arc4)",
58 .base.cra_driver_name = "ecb(arc4)-generic",
87 MODULE_ALIAS_CRYPTO("ecb(arc4)");
Decb.c3 * ECB: Electronic CodeBook mode
70 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */ in crypto_ecb_create()
83 .name = "ecb",
102 MODULE_DESCRIPTION("ECB block cipher mode of operation");
103 MODULE_ALIAS_CRYPTO("ecb");
Dlrw.c7 * Based on ecb.c
135 * We compute the tweak masks twice (both before and after the ECB encryption or
137 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
232 /* pass req->iv as IV (will be used by xor_tweak, ECB will ignore it) */ in lrw_init_crypt()
327 if (snprintf(ecb_name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in lrw_create()
359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create()
Dcrypto_null.c110 .base.cra_name = "ecb(cipher_null)",
111 .base.cra_driver_name = "ecb-cipher_null",
161 tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0); in crypto_get_default_null_skcipher()
Dxts.c7 * Based on ecb.c
76 * We compute the tweak masks twice (both before and after the ECB encryption or
78 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
365 if (snprintf(ctx->name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in xts_create()
397 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create()
/Linux-v5.10/arch/x86/crypto/
Dcamellia_aesni_avx2_glue.c40 .fn_u = { .ecb = camellia_ecb_enc_32way }
43 .fn_u = { .ecb = camellia_ecb_enc_16way }
46 .fn_u = { .ecb = camellia_enc_blk_2way }
49 .fn_u = { .ecb = camellia_enc_blk }
94 .fn_u = { .ecb = camellia_ecb_dec_32way }
97 .fn_u = { .ecb = camellia_ecb_dec_16way }
100 .fn_u = { .ecb = camellia_dec_blk_2way }
103 .fn_u = { .ecb = camellia_dec_blk }
Dserpent_sse2_glue.c11 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
88 .fn_u = { .ecb = serpent_enc_blk_xway }
91 .fn_u = { .ecb = __serpent_encrypt }
114 .fn_u = { .ecb = serpent_dec_blk_xway }
117 .fn_u = { .ecb = __serpent_decrypt }
Dserpent_avx2_glue.c45 .fn_u = { .ecb = serpent_ecb_enc_16way }
48 .fn_u = { .ecb = serpent_ecb_enc_8way_avx }
51 .fn_u = { .ecb = __serpent_encrypt }
93 .fn_u = { .ecb = serpent_ecb_dec_16way }
96 .fn_u = { .ecb = serpent_ecb_dec_8way_avx }
99 .fn_u = { .ecb = __serpent_decrypt }
Dtwofish_glue_3way.c101 .fn_u = { .ecb = twofish_enc_blk_3way }
104 .fn_u = { .ecb = twofish_enc_blk }
127 .fn_u = { .ecb = twofish_dec_blk_3way }
130 .fn_u = { .ecb = twofish_dec_blk }
174 .base.cra_name = "ecb(twofish)",
175 .base.cra_driver_name = "ecb-twofish-3way",
Dtwofish_avx_glue.c88 .fn_u = { .ecb = twofish_ecb_enc_8way }
91 .fn_u = { .ecb = twofish_enc_blk_3way }
94 .fn_u = { .ecb = twofish_enc_blk }
133 .fn_u = { .ecb = twofish_ecb_dec_8way }
136 .fn_u = { .ecb = twofish_dec_blk_3way }
139 .fn_u = { .ecb = twofish_dec_blk }
Dcamellia_aesni_avx_glue.c60 .fn_u = { .ecb = camellia_ecb_enc_16way }
63 .fn_u = { .ecb = camellia_enc_blk_2way }
66 .fn_u = { .ecb = camellia_enc_blk }
105 .fn_u = { .ecb = camellia_ecb_dec_16way }
108 .fn_u = { .ecb = camellia_dec_blk_2way }
111 .fn_u = { .ecb = camellia_dec_blk }
Dcast6_avx_glue.c70 .fn_u = { .ecb = cast6_ecb_enc_8way }
73 .fn_u = { .ecb = __cast6_encrypt }
109 .fn_u = { .ecb = cast6_ecb_dec_8way }
112 .fn_u = { .ecb = __cast6_decrypt }
Dserpent_avx_glue.c105 .fn_u = { .ecb = serpent_ecb_enc_8way_avx }
108 .fn_u = { .ecb = __serpent_encrypt }
144 .fn_u = { .ecb = serpent_ecb_dec_8way_avx }
147 .fn_u = { .ecb = __serpent_decrypt }
/Linux-v5.10/drivers/crypto/
DKconfig196 As of z990 the ECB and CBC mode are hardware accelerated.
208 As of z9 the ECB and CBC modes are hardware accelerated
210 As of z10 the ECB and CBC modes are hardware accelerated
401 the ECB and CBC modes of operation are supported by the driver. Also
602 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB
668 - AES (CBC, CTR, ECB, XTS)
669 - 3DES (CBC, ECB)
670 - DES (CBC, ECB)
679 - AES (CBC, CTR, ECB, XTS)
680 - 3DES (ECB, CBC)
[all …]
Dmxs-dcp.c107 unsigned int ecb:1; member
252 if (rctx->ecb) in mxs_dcp_run_aes()
308 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt()
378 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt()
448 static int mxs_dcp_aes_enqueue(struct skcipher_request *req, int enc, int ecb) in mxs_dcp_aes_enqueue() argument
460 rctx->ecb = ecb; in mxs_dcp_aes_enqueue()
845 /* AES 128 ECB and AES 128 CBC */
848 .base.cra_name = "ecb(aes)",
849 .base.cra_driver_name = "ecb-aes-dcp",
/Linux-v5.10/arch/arm64/crypto/
DKconfig87 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions"
95 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions"
121 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/Linux-v5.10/drivers/crypto/nx/
Dnx-aes-ecb.c3 * AES ECB routines supporting the Power 7+ Nest Accelerators driver
111 .base.cra_name = "ecb(aes)",
112 .base.cra_driver_name = "ecb-aes-nx",
/Linux-v5.10/drivers/crypto/allwinner/sun4i-ss/
Dsun4i-ss-core.c119 .cra_name = "ecb(aes)",
120 .cra_driver_name = "ecb-aes-sun4i-ss",
162 .cra_name = "ecb(des)",
163 .cra_driver_name = "ecb-des-sun4i-ss",
205 .cra_name = "ecb(des3_ede)",
206 .cra_driver_name = "ecb-des3-sun4i-ss",
/Linux-v5.10/drivers/crypto/qce/
Dskcipher.c307 .name = "ecb(aes)",
308 .drv_name = "ecb-aes-qce",
344 .name = "ecb(des)",
345 .drv_name = "ecb-des-qce",
362 .name = "ecb(des3_ede)",
363 .drv_name = "ecb-3des-qce",
/Linux-v5.10/arch/s390/crypto/
Ddes_s390.c147 .base.cra_name = "ecb(des)",
148 .base.cra_driver_name = "ecb-des-s390",
149 .base.cra_priority = 400, /* combo: des + ecb */
265 .base.cra_name = "ecb(des3_ede)",
266 .base.cra_driver_name = "ecb-des3_ede-s390",
267 .base.cra_priority = 400, /* combo: des3 + ecb */
/Linux-v5.10/drivers/crypto/rockchip/
Drk3288_crypto_skcipher.c406 .base.cra_name = "ecb(aes)",
407 .base.cra_driver_name = "ecb-aes-rk",
451 .base.cra_name = "ecb(des)",
452 .base.cra_driver_name = "ecb-des-rk",
496 .base.cra_name = "ecb(des3_ede)",
497 .base.cra_driver_name = "ecb-des3-ede-rk",
/Linux-v5.10/drivers/crypto/allwinner/
DKconfig48 The Crypto Engine handle AES/3DES ciphers in ECB/CBC mode.
101 The Security System handle AES/3DES ciphers in ECB/CBC mode.
/Linux-v5.10/drivers/crypto/marvell/cesa/
Dcipher.c509 .cra_name = "ecb(des)",
510 .cra_driver_name = "mv-ecb-des",
619 .cra_name = "ecb(des3_ede)",
620 .cra_driver_name = "mv-ecb-des3-ede",
746 .cra_name = "ecb(aes)",
747 .cra_driver_name = "mv-ecb-aes",

12345