/Linux-v5.10/drivers/scsi/ |
D | aha1740.c | 77 struct ecb ecb[AHA1740_ECBS]; member 88 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu() 96 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu() 104 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma() 213 struct ecb *ecbptr; in aha1740_intr_handle() 279 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle() 347 /* locate an available ecb */ in aha1740_queuecommand_lck() 353 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck() 360 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck() 361 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck() [all …]
|
/Linux-v5.10/crypto/ |
D | tcrypt.c | 1688 ret += tcrypt_test("ecb(des)"); in do_test() 1694 ret += tcrypt_test("ecb(des3_ede)"); in do_test() 1708 ret += tcrypt_test("ecb(blowfish)"); in do_test() 1714 ret += tcrypt_test("ecb(twofish)"); in do_test() 1722 ret += tcrypt_test("ecb(serpent)"); in do_test() 1730 ret += tcrypt_test("ecb(aes)"); in do_test() 1753 ret += tcrypt_test("ecb(cast5)"); in do_test() 1759 ret += tcrypt_test("ecb(cast6)"); in do_test() 1767 ret += tcrypt_test("ecb(arc4)"); in do_test() 1779 ret += tcrypt_test("ecb(tea)"); in do_test() [all …]
|
D | arc4.c | 46 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init() 54 * For legacy reasons, this is named "ecb(arc4)", not "arc4". 57 .base.cra_name = "ecb(arc4)", 58 .base.cra_driver_name = "ecb(arc4)-generic", 87 MODULE_ALIAS_CRYPTO("ecb(arc4)");
|
D | ecb.c | 3 * ECB: Electronic CodeBook mode 70 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */ in crypto_ecb_create() 83 .name = "ecb", 102 MODULE_DESCRIPTION("ECB block cipher mode of operation"); 103 MODULE_ALIAS_CRYPTO("ecb");
|
D | lrw.c | 7 * Based on ecb.c 135 * We compute the tweak masks twice (both before and after the ECB encryption or 137 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than 232 /* pass req->iv as IV (will be used by xor_tweak, ECB will ignore it) */ in lrw_init_crypt() 327 if (snprintf(ecb_name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in lrw_create() 359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create()
|
D | crypto_null.c | 110 .base.cra_name = "ecb(cipher_null)", 111 .base.cra_driver_name = "ecb-cipher_null", 161 tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0); in crypto_get_default_null_skcipher()
|
D | xts.c | 7 * Based on ecb.c 76 * We compute the tweak masks twice (both before and after the ECB encryption or 78 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than 365 if (snprintf(ctx->name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in xts_create() 397 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create()
|
/Linux-v5.10/arch/x86/crypto/ |
D | camellia_aesni_avx2_glue.c | 40 .fn_u = { .ecb = camellia_ecb_enc_32way } 43 .fn_u = { .ecb = camellia_ecb_enc_16way } 46 .fn_u = { .ecb = camellia_enc_blk_2way } 49 .fn_u = { .ecb = camellia_enc_blk } 94 .fn_u = { .ecb = camellia_ecb_dec_32way } 97 .fn_u = { .ecb = camellia_ecb_dec_16way } 100 .fn_u = { .ecb = camellia_dec_blk_2way } 103 .fn_u = { .ecb = camellia_dec_blk }
|
D | serpent_sse2_glue.c | 11 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by: 88 .fn_u = { .ecb = serpent_enc_blk_xway } 91 .fn_u = { .ecb = __serpent_encrypt } 114 .fn_u = { .ecb = serpent_dec_blk_xway } 117 .fn_u = { .ecb = __serpent_decrypt }
|
D | serpent_avx2_glue.c | 45 .fn_u = { .ecb = serpent_ecb_enc_16way } 48 .fn_u = { .ecb = serpent_ecb_enc_8way_avx } 51 .fn_u = { .ecb = __serpent_encrypt } 93 .fn_u = { .ecb = serpent_ecb_dec_16way } 96 .fn_u = { .ecb = serpent_ecb_dec_8way_avx } 99 .fn_u = { .ecb = __serpent_decrypt }
|
D | twofish_glue_3way.c | 101 .fn_u = { .ecb = twofish_enc_blk_3way } 104 .fn_u = { .ecb = twofish_enc_blk } 127 .fn_u = { .ecb = twofish_dec_blk_3way } 130 .fn_u = { .ecb = twofish_dec_blk } 174 .base.cra_name = "ecb(twofish)", 175 .base.cra_driver_name = "ecb-twofish-3way",
|
D | twofish_avx_glue.c | 88 .fn_u = { .ecb = twofish_ecb_enc_8way } 91 .fn_u = { .ecb = twofish_enc_blk_3way } 94 .fn_u = { .ecb = twofish_enc_blk } 133 .fn_u = { .ecb = twofish_ecb_dec_8way } 136 .fn_u = { .ecb = twofish_dec_blk_3way } 139 .fn_u = { .ecb = twofish_dec_blk }
|
D | camellia_aesni_avx_glue.c | 60 .fn_u = { .ecb = camellia_ecb_enc_16way } 63 .fn_u = { .ecb = camellia_enc_blk_2way } 66 .fn_u = { .ecb = camellia_enc_blk } 105 .fn_u = { .ecb = camellia_ecb_dec_16way } 108 .fn_u = { .ecb = camellia_dec_blk_2way } 111 .fn_u = { .ecb = camellia_dec_blk }
|
D | cast6_avx_glue.c | 70 .fn_u = { .ecb = cast6_ecb_enc_8way } 73 .fn_u = { .ecb = __cast6_encrypt } 109 .fn_u = { .ecb = cast6_ecb_dec_8way } 112 .fn_u = { .ecb = __cast6_decrypt }
|
D | serpent_avx_glue.c | 105 .fn_u = { .ecb = serpent_ecb_enc_8way_avx } 108 .fn_u = { .ecb = __serpent_encrypt } 144 .fn_u = { .ecb = serpent_ecb_dec_8way_avx } 147 .fn_u = { .ecb = __serpent_decrypt }
|
/Linux-v5.10/drivers/crypto/ |
D | Kconfig | 196 As of z990 the ECB and CBC mode are hardware accelerated. 208 As of z9 the ECB and CBC modes are hardware accelerated 210 As of z10 the ECB and CBC modes are hardware accelerated 401 the ECB and CBC modes of operation are supported by the driver. Also 602 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB 668 - AES (CBC, CTR, ECB, XTS) 669 - 3DES (CBC, ECB) 670 - DES (CBC, ECB) 679 - AES (CBC, CTR, ECB, XTS) 680 - 3DES (ECB, CBC) [all …]
|
D | mxs-dcp.c | 107 unsigned int ecb:1; member 252 if (rctx->ecb) in mxs_dcp_run_aes() 308 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt() 378 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt() 448 static int mxs_dcp_aes_enqueue(struct skcipher_request *req, int enc, int ecb) in mxs_dcp_aes_enqueue() argument 460 rctx->ecb = ecb; in mxs_dcp_aes_enqueue() 845 /* AES 128 ECB and AES 128 CBC */ 848 .base.cra_name = "ecb(aes)", 849 .base.cra_driver_name = "ecb-aes-dcp",
|
/Linux-v5.10/arch/arm64/crypto/ |
D | Kconfig | 87 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions" 95 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions" 121 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
/Linux-v5.10/drivers/crypto/nx/ |
D | nx-aes-ecb.c | 3 * AES ECB routines supporting the Power 7+ Nest Accelerators driver 111 .base.cra_name = "ecb(aes)", 112 .base.cra_driver_name = "ecb-aes-nx",
|
/Linux-v5.10/drivers/crypto/allwinner/sun4i-ss/ |
D | sun4i-ss-core.c | 119 .cra_name = "ecb(aes)", 120 .cra_driver_name = "ecb-aes-sun4i-ss", 162 .cra_name = "ecb(des)", 163 .cra_driver_name = "ecb-des-sun4i-ss", 205 .cra_name = "ecb(des3_ede)", 206 .cra_driver_name = "ecb-des3-sun4i-ss",
|
/Linux-v5.10/drivers/crypto/qce/ |
D | skcipher.c | 307 .name = "ecb(aes)", 308 .drv_name = "ecb-aes-qce", 344 .name = "ecb(des)", 345 .drv_name = "ecb-des-qce", 362 .name = "ecb(des3_ede)", 363 .drv_name = "ecb-3des-qce",
|
/Linux-v5.10/arch/s390/crypto/ |
D | des_s390.c | 147 .base.cra_name = "ecb(des)", 148 .base.cra_driver_name = "ecb-des-s390", 149 .base.cra_priority = 400, /* combo: des + ecb */ 265 .base.cra_name = "ecb(des3_ede)", 266 .base.cra_driver_name = "ecb-des3_ede-s390", 267 .base.cra_priority = 400, /* combo: des3 + ecb */
|
/Linux-v5.10/drivers/crypto/rockchip/ |
D | rk3288_crypto_skcipher.c | 406 .base.cra_name = "ecb(aes)", 407 .base.cra_driver_name = "ecb-aes-rk", 451 .base.cra_name = "ecb(des)", 452 .base.cra_driver_name = "ecb-des-rk", 496 .base.cra_name = "ecb(des3_ede)", 497 .base.cra_driver_name = "ecb-des3-ede-rk",
|
/Linux-v5.10/drivers/crypto/allwinner/ |
D | Kconfig | 48 The Crypto Engine handle AES/3DES ciphers in ECB/CBC mode. 101 The Security System handle AES/3DES ciphers in ECB/CBC mode.
|
/Linux-v5.10/drivers/crypto/marvell/cesa/ |
D | cipher.c | 509 .cra_name = "ecb(des)", 510 .cra_driver_name = "mv-ecb-des", 619 .cra_name = "ecb(des3_ede)", 620 .cra_driver_name = "mv-ecb-des3-ede", 746 .cra_name = "ecb(aes)", 747 .cra_driver_name = "mv-ecb-aes",
|