Home
last modified time | relevance | path

Searched full:ecb (Results 1 – 25 of 250) sorted by relevance

12345678910

/kernel/linux/linux-6.6/arch/x86/crypto/
DKconfig17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTR, XTS, GCM (AES-NI)"
27 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTR, XTS
33 tristate "Ciphers: Blowfish, modes: ECB, CBC"
40 Length-preserving ciphers: Blowfish with ECB and CBC modes
45 tristate "Ciphers: Camellia with modes: ECB, CBC"
51 Length-preserving ciphers: Camellia with ECB and CBC modes
56 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX)"
63 Length-preserving ciphers: Camellia with ECB and CBC modes
70 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX2)"
74 Length-preserving ciphers: Camellia with ECB and CBC modes
[all …]
Dblowfish_glue.c7 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
112 .base.cra_name = "ecb(blowfish)",
113 .base.cra_driver_name = "ecb-blowfish-asm",
/kernel/linux/linux-5.10/drivers/scsi/
Daha1740.c77 struct ecb ecb[AHA1740_ECBS]; member
88 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu()
96 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu()
104 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma()
213 struct ecb *ecbptr; in aha1740_intr_handle()
279 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle()
347 /* locate an available ecb */ in aha1740_queuecommand_lck()
353 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
360 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
361 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck()
[all …]
/kernel/linux/linux-6.6/drivers/scsi/
Daha1740.c81 struct ecb ecb[AHA1740_ECBS]; member
92 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu()
100 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu()
108 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma()
218 struct ecb *ecbptr; in aha1740_intr_handle()
287 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle()
355 /* locate an available ecb */ in aha1740_queuecommand_lck()
361 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
368 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
369 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck()
[all …]
/kernel/linux/linux-6.6/arch/sparc/crypto/
DKconfig6 tristate "Ciphers: DES and Triple DES EDE, modes: ECB/CBC"
14 Length-preserving ciphers: DES with ECB and CBC modes
15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes
70 tristate "Ciphers: AES, modes: ECB, CBC, CTR"
75 Length-preseving ciphers: AES with ECB, CBC, and CTR modes
80 tristate "Ciphers: Camellia, modes: ECB, CBC"
86 Length-preserving ciphers: Camellia with ECB and CBC modes
/kernel/linux/linux-6.6/arch/s390/crypto/
DKconfig84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM"
91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes
95 As of z9 the ECB and CBC modes are hardware accelerated
98 As of z10 the ECB and CBC modes are hardware accelerated
106 tristate "Ciphers: DES and Triple DES EDE, modes: ECB, CBC, CTR"
114 Length-preserving ciphers: DES with ECB, CBC, and CTR modes
115 Length-preserving ciphers: Triple DES EDED with ECB, CBC, and CTR modes
119 As of z990 the ECB and CBC mode are hardware accelerated.
/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/
DKconfig17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)).
20 bool "Support for Intel Keem Bay OCS AES/SM4 ECB HW acceleration"
24 AES/SM4 ECB mode hardware acceleration for use with Crypto API.
26 Provides OCS version of ecb(aes) and ecb(sm4)
28 Intel does not recommend use of ECB mode with AES/SM4.
/kernel/linux/linux-6.6/arch/arm64/crypto/
DKconfig132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS"
136 Length-preserving ciphers: AES with ECB, CBC, CTR, CTS,
155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
162 - ECB (Electronic Codebook) mode (NIST SP800-38A)
172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)"
179 - ECB (Electronic Codebook) mode (NIST SP800-38A)
202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)"
210 - ECB (Electronic Codebook) mode (NIST SP800-38A)
234 tristate "Ciphers: SM4, modes: ECB/CBC/CFB/CTR/XTS (ARMv8 Crypto Extensions)"
241 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
/kernel/linux/linux-6.6/crypto/
Dtcrypt.c1479 ret = min(ret, tcrypt_test("ecb(des)")); in do_test()
1485 ret = min(ret, tcrypt_test("ecb(des3_ede)")); in do_test()
1499 ret = min(ret, tcrypt_test("ecb(blowfish)")); in do_test()
1505 ret = min(ret, tcrypt_test("ecb(twofish)")); in do_test()
1513 ret = min(ret, tcrypt_test("ecb(serpent)")); in do_test()
1521 ret = min(ret, tcrypt_test("ecb(aes)")); in do_test()
1545 ret = min(ret, tcrypt_test("ecb(cast5)")); in do_test()
1551 ret = min(ret, tcrypt_test("ecb(cast6)")); in do_test()
1559 ret = min(ret, tcrypt_test("ecb(arc4)")); in do_test()
1571 ret = min(ret, tcrypt_test("ecb(tea)")); in do_test()
[all …]
Darc4.c46 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init()
54 * For legacy reasons, this is named "ecb(arc4)", not "arc4".
57 .base.cra_name = "ecb(arc4)",
58 .base.cra_driver_name = "ecb(arc4)-generic",
87 MODULE_ALIAS_CRYPTO("ecb(arc4)");
Decb.c3 * ECB: Electronic CodeBook mode
71 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */ in crypto_ecb_create()
84 .name = "ecb",
103 MODULE_DESCRIPTION("ECB block cipher mode of operation");
104 MODULE_ALIAS_CRYPTO("ecb");
Dlrw.c7 * Based on ecb.c
135 * We compute the tweak masks twice (both before and after the ECB encryption or
137 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
232 /* pass req->iv as IV (will be used by xor_tweak, ECB will ignore it) */ in lrw_init_crypt()
327 if (snprintf(ecb_name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in lrw_create()
359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create()
431 MODULE_SOFTDEP("pre: ecb");
/kernel/linux/linux-5.10/crypto/
Dtcrypt.c1679 ret += tcrypt_test("ecb(des)"); in do_test()
1685 ret += tcrypt_test("ecb(des3_ede)"); in do_test()
1699 ret += tcrypt_test("ecb(blowfish)"); in do_test()
1705 ret += tcrypt_test("ecb(twofish)"); in do_test()
1713 ret += tcrypt_test("ecb(serpent)"); in do_test()
1721 ret += tcrypt_test("ecb(aes)"); in do_test()
1744 ret += tcrypt_test("ecb(cast5)"); in do_test()
1750 ret += tcrypt_test("ecb(cast6)"); in do_test()
1758 ret += tcrypt_test("ecb(arc4)"); in do_test()
1770 ret += tcrypt_test("ecb(tea)"); in do_test()
[all …]
Darc4.c46 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init()
54 * For legacy reasons, this is named "ecb(arc4)", not "arc4".
57 .base.cra_name = "ecb(arc4)",
58 .base.cra_driver_name = "ecb(arc4)-generic",
87 MODULE_ALIAS_CRYPTO("ecb(arc4)");
Decb.c3 * ECB: Electronic CodeBook mode
70 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */ in crypto_ecb_create()
83 .name = "ecb",
102 MODULE_DESCRIPTION("ECB block cipher mode of operation");
103 MODULE_ALIAS_CRYPTO("ecb");
/kernel/linux/linux-5.10/arch/x86/crypto/
Dcamellia_aesni_avx2_glue.c40 .fn_u = { .ecb = camellia_ecb_enc_32way }
43 .fn_u = { .ecb = camellia_ecb_enc_16way }
46 .fn_u = { .ecb = camellia_enc_blk_2way }
49 .fn_u = { .ecb = camellia_enc_blk }
94 .fn_u = { .ecb = camellia_ecb_dec_32way }
97 .fn_u = { .ecb = camellia_ecb_dec_16way }
100 .fn_u = { .ecb = camellia_dec_blk_2way }
103 .fn_u = { .ecb = camellia_dec_blk }
Dserpent_sse2_glue.c11 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
88 .fn_u = { .ecb = serpent_enc_blk_xway }
91 .fn_u = { .ecb = __serpent_encrypt }
114 .fn_u = { .ecb = serpent_dec_blk_xway }
117 .fn_u = { .ecb = __serpent_decrypt }
Dserpent_avx2_glue.c45 .fn_u = { .ecb = serpent_ecb_enc_16way }
48 .fn_u = { .ecb = serpent_ecb_enc_8way_avx }
51 .fn_u = { .ecb = __serpent_encrypt }
93 .fn_u = { .ecb = serpent_ecb_dec_16way }
96 .fn_u = { .ecb = serpent_ecb_dec_8way_avx }
99 .fn_u = { .ecb = __serpent_decrypt }
Dtwofish_glue_3way.c101 .fn_u = { .ecb = twofish_enc_blk_3way }
104 .fn_u = { .ecb = twofish_enc_blk }
127 .fn_u = { .ecb = twofish_dec_blk_3way }
130 .fn_u = { .ecb = twofish_dec_blk }
174 .base.cra_name = "ecb(twofish)",
175 .base.cra_driver_name = "ecb-twofish-3way",
Dtwofish_avx_glue.c88 .fn_u = { .ecb = twofish_ecb_enc_8way }
91 .fn_u = { .ecb = twofish_enc_blk_3way }
94 .fn_u = { .ecb = twofish_enc_blk }
133 .fn_u = { .ecb = twofish_ecb_dec_8way }
136 .fn_u = { .ecb = twofish_dec_blk_3way }
139 .fn_u = { .ecb = twofish_dec_blk }
Dcamellia_aesni_avx_glue.c60 .fn_u = { .ecb = camellia_ecb_enc_16way }
63 .fn_u = { .ecb = camellia_enc_blk_2way }
66 .fn_u = { .ecb = camellia_enc_blk }
105 .fn_u = { .ecb = camellia_ecb_dec_16way }
108 .fn_u = { .ecb = camellia_dec_blk_2way }
111 .fn_u = { .ecb = camellia_dec_blk }
/kernel/linux/linux-6.6/drivers/crypto/gemini/
Dsl3516-ce-cipher.c8 * ECB mode.
137 struct pkt_control_ecb *ecb; in sl3516_ce_cipher() local
227 ecb = (struct pkt_control_ecb *)ce->pctrl; in sl3516_ce_cipher()
231 ecb->control.op_mode = rctx->op_dir; in sl3516_ce_cipher()
232 ecb->control.cipher_algorithm = ECB_AES; in sl3516_ce_cipher()
233 ecb->cipher.header_len = 0; in sl3516_ce_cipher()
234 ecb->cipher.algorithm_len = areq->cryptlen; in sl3516_ce_cipher()
235 cpu_to_be32_array((__be32 *)ecb->key, (u32 *)op->key, op->keylen / 4); in sl3516_ce_cipher()
236 rctx->h = &ecb->cipher; in sl3516_ce_cipher()
241 ecb->control.aesnk = op->keylen / 4; in sl3516_ce_cipher()
/kernel/linux/linux-5.10/drivers/crypto/
DKconfig196 As of z990 the ECB and CBC mode are hardware accelerated.
208 As of z9 the ECB and CBC modes are hardware accelerated
210 As of z10 the ECB and CBC modes are hardware accelerated
402 the ECB and CBC modes of operation are supported by the driver. Also
604 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB
670 - AES (CBC, CTR, ECB, XTS)
671 - 3DES (CBC, ECB)
672 - DES (CBC, ECB)
681 - AES (CBC, CTR, ECB, XTS)
682 - 3DES (ECB, CBC)
[all …]
/kernel/linux/linux-5.10/arch/arm64/crypto/
DKconfig88 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions"
96 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions"
122 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/kernel/linux/linux-6.6/drivers/crypto/
DKconfig298 the ECB and CBC modes of operation are supported by the driver. Also
472 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB
545 - AES (CBC, CTR, ECB, XTS)
546 - 3DES (CBC, ECB)
547 - DES (CBC, ECB)
556 - AES (CBC, CTR, ECB, XTS)
557 - 3DES (ECB, CBC)
558 - DES (ECB, CBC)
650 Supporting cbc/ecb chainmode, and aes/des/des3_ede cipher mode.
724 AES block ciphers in ECB and CBC mode, as well as SHA1, SHA224, SHA256,

12345678910