Home
last modified time | relevance | path

Searched full:ecb (Results 1 – 25 of 127) sorted by relevance

123456

/Linux-v6.1/arch/x86/crypto/
DKconfig17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTR, XTS, GCM (AES-NI)"
27 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTR, XTS
33 tristate "Ciphers: Blowfish, modes: ECB, CBC"
40 Length-preserving ciphers: Blowfish with ECB and CBC modes
45 tristate "Ciphers: Camellia with modes: ECB, CBC"
51 Length-preserving ciphers: Camellia with ECB and CBC modes
56 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX)"
63 Length-preserving ciphers: Camellia with ECB and CBC modes
70 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX2)"
74 Length-preserving ciphers: Camellia with ECB and CBC modes
[all …]
Dblowfish_glue.c7 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
258 .base.cra_name = "ecb(blowfish)",
259 .base.cra_driver_name = "ecb-blowfish-asm",
Ddes3_ede_glue.c7 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
309 .base.cra_name = "ecb(des3_ede)",
310 .base.cra_driver_name = "ecb-des3_ede-asm",
/Linux-v6.1/drivers/scsi/
Daha1740.c81 struct ecb ecb[AHA1740_ECBS]; member
92 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu()
100 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu()
108 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma()
218 struct ecb *ecbptr; in aha1740_intr_handle()
287 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle()
355 /* locate an available ecb */ in aha1740_queuecommand_lck()
361 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
368 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
369 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck()
[all …]
/Linux-v6.1/arch/sparc/crypto/
DKconfig6 tristate "Ciphers: DES and Triple DES EDE, modes: ECB/CBC"
14 Length-preserving ciphers: DES with ECB and CBC modes
15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes
70 tristate "Ciphers: AES, modes: ECB, CBC, CTR"
75 Length-preseving ciphers: AES with ECB, CBC, and CTR modes
80 tristate "Ciphers: Camellia, modes: ECB, CBC"
86 Length-preserving ciphers: Camellia with ECB and CBC modes
/Linux-v6.1/arch/s390/crypto/
DKconfig84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM"
91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes
95 As of z9 the ECB and CBC modes are hardware accelerated
98 As of z10 the ECB and CBC modes are hardware accelerated
106 tristate "Ciphers: DES and Triple DES EDE, modes: ECB, CBC, CTR"
114 Length-preserving ciphers: DES with ECB, CBC, and CTR modes
115 Length-preserving ciphers: Triple DES EDED with ECB, CBC, and CTR modes
119 As of z990 the ECB and CBC mode are hardware accelerated.
Ddes_s390.c147 .base.cra_name = "ecb(des)",
148 .base.cra_driver_name = "ecb-des-s390",
149 .base.cra_priority = 400, /* combo: des + ecb */
265 .base.cra_name = "ecb(des3_ede)",
266 .base.cra_driver_name = "ecb-des3_ede-s390",
267 .base.cra_priority = 400, /* combo: des3 + ecb */
/Linux-v6.1/arch/arm64/crypto/
DKconfig121 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS"
125 Length-preserving ciphers: AES with ECB, CBC, CTR, CTS,
144 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
151 - ECB (Electronic Codebook) mode (NIST SP800-38A)
161 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)"
168 - ECB (Electronic Codebook) mode (NIST SP800-38A)
191 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)"
199 - ECB (Electronic Codebook) mode (NIST SP800-38A)
223 tristate "Ciphers: SM4, modes: ECB/CBC/CFB/CTR (ARMv8 Crypto Extensions)"
230 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
Dsm4-ce-glue.c289 .cra_name = "ecb(sm4)",
290 .cra_driver_name = "ecb-sm4-ce",
364 MODULE_DESCRIPTION("SM4 ECB/CBC/CFB/CTR using ARMv8 Crypto Extensions");
367 MODULE_ALIAS_CRYPTO("ecb(sm4)");
/Linux-v6.1/crypto/
Dtcrypt.c1486 ret += tcrypt_test("ecb(des)"); in do_test()
1492 ret += tcrypt_test("ecb(des3_ede)"); in do_test()
1506 ret += tcrypt_test("ecb(blowfish)"); in do_test()
1512 ret += tcrypt_test("ecb(twofish)"); in do_test()
1520 ret += tcrypt_test("ecb(serpent)"); in do_test()
1528 ret += tcrypt_test("ecb(aes)"); in do_test()
1552 ret += tcrypt_test("ecb(cast5)"); in do_test()
1558 ret += tcrypt_test("ecb(cast6)"); in do_test()
1566 ret += tcrypt_test("ecb(arc4)"); in do_test()
1578 ret += tcrypt_test("ecb(tea)"); in do_test()
[all …]
Darc4.c46 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init()
54 * For legacy reasons, this is named "ecb(arc4)", not "arc4".
57 .base.cra_name = "ecb(arc4)",
58 .base.cra_driver_name = "ecb(arc4)-generic",
87 MODULE_ALIAS_CRYPTO("ecb(arc4)");
Decb.c3 * ECB: Electronic CodeBook mode
71 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */ in crypto_ecb_create()
84 .name = "ecb",
103 MODULE_DESCRIPTION("ECB block cipher mode of operation");
104 MODULE_ALIAS_CRYPTO("ecb");
Dlrw.c7 * Based on ecb.c
135 * We compute the tweak masks twice (both before and after the ECB encryption or
137 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
232 /* pass req->iv as IV (will be used by xor_tweak, ECB will ignore it) */ in lrw_init_crypt()
327 if (snprintf(ecb_name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in lrw_create()
359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create()
431 MODULE_SOFTDEP("pre: ecb");
Dxts.c7 * Based on ecb.c
77 * We compute the tweak masks twice (both before and after the ECB encryption or
79 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
366 if (snprintf(ctx->name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in xts_create()
398 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create()
469 MODULE_SOFTDEP("pre: ecb");
Dcrypto_null.c110 .base.cra_name = "ecb(cipher_null)",
111 .base.cra_driver_name = "ecb-cipher_null",
161 tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0); in crypto_get_default_null_skcipher()
/Linux-v6.1/drivers/crypto/keembay/
DKconfig17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)).
20 bool "Support for Intel Keem Bay OCS AES/SM4 ECB HW acceleration"
24 AES/SM4 ECB mode hardware acceleration for use with Crypto API.
26 Provides OCS version of ecb(aes) and ecb(sm4)
28 Intel does not recommend use of ECB mode with AES/SM4.
/Linux-v6.1/drivers/crypto/gemini/
Dsl3516-ce-cipher.c8 * ECB mode.
133 struct pkt_control_ecb *ecb; in sl3516_ce_cipher() local
223 ecb = (struct pkt_control_ecb *)ce->pctrl; in sl3516_ce_cipher()
227 ecb->control.op_mode = rctx->op_dir; in sl3516_ce_cipher()
228 ecb->control.cipher_algorithm = ECB_AES; in sl3516_ce_cipher()
229 ecb->cipher.header_len = 0; in sl3516_ce_cipher()
230 ecb->cipher.algorithm_len = areq->cryptlen; in sl3516_ce_cipher()
231 cpu_to_be32_array((__be32 *)ecb->key, (u32 *)op->key, op->keylen / 4); in sl3516_ce_cipher()
232 rctx->h = &ecb->cipher; in sl3516_ce_cipher()
237 ecb->control.aesnk = op->keylen / 4; in sl3516_ce_cipher()
/Linux-v6.1/drivers/crypto/
DKconfig325 the ECB and CBC modes of operation are supported by the driver. Also
509 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB
582 - AES (CBC, CTR, ECB, XTS)
583 - 3DES (CBC, ECB)
584 - DES (CBC, ECB)
593 - AES (CBC, CTR, ECB, XTS)
594 - 3DES (ECB, CBC)
595 - DES (ECB, CBC)
682 Supporting cbc/ecb chainmode, and aes/des/des3_ede cipher mode.
746 AES block ciphers in ECB and CBC mode, as well as SHA1, SHA224, SHA256,
/Linux-v6.1/arch/arm/crypto/
DKconfig165 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)"
175 - ECB (Electronic Codebook) mode (NIST SP800-38A)
188 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)"
196 - ECB (Electronic Codebook) mode (NIST SP800-38A)
/Linux-v6.1/drivers/crypto/nx/
Dnx-aes-ecb.c3 * AES ECB routines supporting the Power 7+ Nest Accelerators driver
111 .base.cra_name = "ecb(aes)",
112 .base.cra_driver_name = "ecb-aes-nx",
/Linux-v6.1/drivers/crypto/qce/
Dskcipher.c275 * ECB and CBC algorithms require message lengths to be in qce_skcipher_crypt()
363 .name = "ecb(aes)",
364 .drv_name = "ecb-aes-qce",
400 .name = "ecb(des)",
401 .drv_name = "ecb-des-qce",
418 .name = "ecb(des3_ede)",
419 .drv_name = "ecb-3des-qce",
/Linux-v6.1/drivers/crypto/rockchip/
Drk3288_crypto_skcipher.c406 .base.cra_name = "ecb(aes)",
407 .base.cra_driver_name = "ecb-aes-rk",
451 .base.cra_name = "ecb(des)",
452 .base.cra_driver_name = "ecb-des-rk",
496 .base.cra_name = "ecb(des3_ede)",
497 .base.cra_driver_name = "ecb-des3-ede-rk",
/Linux-v6.1/arch/powerpc/crypto/
DKconfig76 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (SPE)"
81 Length-preserving ciphers: AES with ECB, CBC, CTR, and XTS modes
/Linux-v6.1/drivers/crypto/allwinner/sun4i-ss/
Dsun4i-ss-core.c120 .cra_name = "ecb(aes)",
121 .cra_driver_name = "ecb-aes-sun4i-ss",
163 .cra_name = "ecb(des)",
164 .cra_driver_name = "ecb-des-sun4i-ss",
206 .cra_name = "ecb(des3_ede)",
207 .cra_driver_name = "ecb-des3-sun4i-ss",
/Linux-v6.1/arch/s390/kvm/
Dvsie.c440 const bool wants_tx = READ_ONCE(scb_o->ecb) & ECB_TE; in shadow_scb()
441 bool had_tx = scb_s->ecb & ECB_TE; in shadow_scb()
448 scb_s->ecb = 0; in shadow_scb()
505 scb_s->ecb |= scb_o->ecb & ECB_HOSTPROTINT; in shadow_scb()
513 scb_s->ecb |= scb_o->ecb & ECB_PTF; in shadow_scb()
519 scb_s->ecb |= ECB_TE; in shadow_scb()
522 scb_s->ecb |= scb_o->ecb & ECB_SPECI; in shadow_scb()
539 scb_s->ecb |= scb_o->ecb & ECB_GS; in shadow_scb()
631 if (!rc && (scb_s->ecb & ECB_TE)) in map_prefix()
760 if (gpa && (scb_s->ecb & ECB_TE)) { in pin_blocks()
[all …]

123456