/linux/arch/x86/crypto/ |
H A D | Kconfig | 17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XCTR, XTS, GCM (AES-NI/VAES)" 28 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XCTR, XTS 38 tristate "Ciphers: Blowfish, modes: ECB, CBC" 45 Length-preserving ciphers: Blowfish with ECB and CBC modes 50 tristate "Ciphers: Camellia with modes: ECB, CBC" 56 Length-preserving ciphers: Camellia with ECB and CBC modes 61 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX)" 68 Length-preserving ciphers: Camellia with ECB and CBC modes 75 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX2)" 79 Length-preserving ciphers: Camellia with ECB and CBC modes [all …]
|
H A D | blowfish_glue.c | 7 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by: 112 .base.cra_name = "ecb(blowfish)", 113 .base.cra_driver_name = "ecb-blowfish-asm",
|
/linux/drivers/scsi/ |
H A D | aha1740.c | 81 struct ecb ecb[AHA1740_ECBS]; member 92 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu() 100 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu() 108 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma() 218 struct ecb *ecbptr; in aha1740_intr_handle() 287 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle() 355 /* locate an available ecb */ in aha1740_queuecommand_lck() 361 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck() 368 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck() 369 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck() [all …]
|
/linux/arch/sparc/crypto/ |
H A D | Kconfig | 6 tristate "Ciphers: DES and Triple DES EDE, modes: ECB/CBC" 14 Length-preserving ciphers: DES with ECB and CBC modes 15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes 70 tristate "Ciphers: AES, modes: ECB, CBC, CTR" 75 Length-preseving ciphers: AES with ECB, CBC, and CTR modes 80 tristate "Ciphers: Camellia, modes: ECB, CBC" 86 Length-preserving ciphers: Camellia with ECB and CBC modes
|
/linux/arch/s390/crypto/ |
H A D | Kconfig | 84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM" 91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes 95 As of z9 the ECB and CBC modes are hardware accelerated 98 As of z10 the ECB and CBC modes are hardware accelerated 106 tristate "Ciphers: DES and Triple DES EDE, modes: ECB, CBC, CTR" 114 Length-preserving ciphers: DES with ECB, CBC, and CTR modes 115 Length-preserving ciphers: Triple DES EDED with ECB, CBC, and CTR modes 119 As of z990 the ECB and CBC mode are hardware accelerated.
|
H A D | des_s390.c | 147 .base.cra_name = "ecb(des)", 148 .base.cra_driver_name = "ecb-des-s390", 149 .base.cra_priority = 400, /* combo: des + ecb */ 265 .base.cra_name = "ecb(des3_ede)", 266 .base.cra_driver_name = "ecb-des3_ede-s390", 267 .base.cra_priority = 400, /* combo: des3 + ecb */
|
/linux/crypto/ |
H A D | tcrypt.c | 1479 ret = min(ret, tcrypt_test("ecb(des)")); in do_test() 1485 ret = min(ret, tcrypt_test("ecb(des3_ede)")); in do_test() 1499 ret = min(ret, tcrypt_test("ecb(blowfish)")); in do_test() 1505 ret = min(ret, tcrypt_test("ecb(twofish)")); in do_test() 1513 ret = min(ret, tcrypt_test("ecb(serpent)")); in do_test() 1521 ret = min(ret, tcrypt_test("ecb(aes)")); in do_test() 1543 ret = min(ret, tcrypt_test("ecb(cast5)")); in do_test() 1549 ret = min(ret, tcrypt_test("ecb(cast6)")); in do_test() 1557 ret = min(ret, tcrypt_test("ecb(arc4)")); in do_test() 1569 ret = min(ret, tcrypt_test("ecb(tea)")); in do_test() [all …]
|
H A D | ecb.c | 3 * ECB: Electronic CodeBook mode 158 /* ECB mode doesn't take an IV */ in crypto_ecb_create2() 187 /* ECB mode doesn't take an IV */ in crypto_ecb_create() 207 .name = "ecb", 226 MODULE_DESCRIPTION("ECB block cipher mode of operation"); 227 MODULE_ALIAS_CRYPTO("ecb");
|
H A D | lrw.c | 7 * Based on ecb.c 135 * We compute the tweak masks twice (both before and after the ECB encryption or 137 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than 232 /* pass req->iv as IV (will be used by xor_tweak, ECB will ignore it) */ in lrw_init_crypt() 327 if (snprintf(ecb_name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in lrw_create() 359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create() 429 MODULE_SOFTDEP("pre: ecb");
|
H A D | xts.c | 7 * Based on ecb.c 77 * We compute the tweak masks twice (both before and after the ECB encryption or 79 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than 368 if (snprintf(name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in xts_create() 400 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create() 476 MODULE_SOFTDEP("pre: ecb");
|
H A D | crypto_null.c | 110 .base.cra_name = "ecb(cipher_null)", 111 .base.cra_driver_name = "ecb-cipher_null", 161 tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0); in crypto_get_default_null_skcipher()
|
H A D | arc4.c | 43 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init() 82 MODULE_ALIAS_CRYPTO("ecb(arc4)");
|
/linux/arch/arm64/crypto/ |
H A D | Kconfig | 132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS" 136 Length-preserving ciphers: AES with ECB, CBC, CTR, CTS, 155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 162 - ECB (Electronic Codebook) mode (NIST SP800-38A) 172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)" 179 - ECB (Electronic Codebook) mode (NIST SP800-38A) 202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)" 210 - ECB (Electronic Codebook) mode (NIST SP800-38A) 234 tristate "Ciphers: SM4, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 241 - ECB (Electronic Codebook) mode (NIST SP800-38A) [all …]
|
H A D | sm4-neon-glue.c | 191 .cra_name = "ecb(sm4)", 192 .cra_driver_name = "ecb-sm4-neon", 250 MODULE_DESCRIPTION("SM4 ECB/CBC/CTR using ARMv8 NEON"); 253 MODULE_ALIAS_CRYPTO("ecb(sm4)");
|
/linux/drivers/crypto/intel/keembay/ |
H A D | Kconfig | 17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)). 20 bool "Support for Intel Keem Bay OCS AES/SM4 ECB HW acceleration" 24 AES/SM4 ECB mode hardware acceleration for use with Crypto API. 26 Provides OCS version of ecb(aes) and ecb(sm4) 28 Intel does not recommend use of ECB mode with AES/SM4.
|
/linux/drivers/crypto/gemini/ |
H A D | sl3516-ce-cipher.c | 8 * ECB mode. 137 struct pkt_control_ecb *ecb; in sl3516_ce_cipher() local 227 ecb = (struct pkt_control_ecb *)ce->pctrl; in sl3516_ce_cipher() 231 ecb->control.op_mode = rctx->op_dir; in sl3516_ce_cipher() 232 ecb->control.cipher_algorithm = ECB_AES; in sl3516_ce_cipher() 233 ecb->cipher.header_len = 0; in sl3516_ce_cipher() 234 ecb->cipher.algorithm_len = areq->cryptlen; in sl3516_ce_cipher() 235 cpu_to_be32_array((__be32 *)ecb->key, (u32 *)op->key, op->keylen / 4); in sl3516_ce_cipher() 236 rctx->h = &ecb->cipher; in sl3516_ce_cipher() 241 ecb->control.aesnk = op->keylen / 4; in sl3516_ce_cipher()
|
/linux/drivers/crypto/ |
H A D | Kconfig | 343 the ECB and CBC modes of operation are supported by the driver. Also 518 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB 591 - AES (CBC, CTR, ECB, XTS) 592 - 3DES (CBC, ECB) 593 - DES (CBC, ECB) 602 - AES (CBC, CTR, ECB, XTS) 603 - 3DES (ECB, CBC) 604 - DES (ECB, CBC) 697 Supporting cbc/ecb chainmode, and aes/des/des3_ede cipher mode. 779 AES block ciphers in ECB and CBC mode, as well as SHA1, SHA224, SHA256,
|
H A D | mxs-dcp.c | 110 unsigned int ecb:1; member 281 if (rctx->ecb) in mxs_dcp_run_aes() 341 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt() 394 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt() 464 static int mxs_dcp_aes_enqueue(struct skcipher_request *req, int enc, int ecb) in mxs_dcp_aes_enqueue() argument 476 rctx->ecb = ecb; in mxs_dcp_aes_enqueue() 903 /* AES 128 ECB and AES 128 CBC */ 906 .base.cra_name = "ecb(aes)", 907 .base.cra_driver_name = "ecb-aes-dcp", 943 .base.cra_name = "ecb(paes)", [all …]
|
/linux/arch/arm/crypto/ |
H A D | Kconfig | 167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)" 176 - ECB (Electronic Codebook) mode (NIST SP800-38A) 196 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)" 204 - ECB (Electronic Codebook) mode (NIST SP800-38A)
|
/linux/drivers/crypto/nx/ |
H A D | nx-aes-ecb.c | 3 * AES ECB routines supporting the Power 7+ Nest Accelerators driver 111 .base.cra_name = "ecb(aes)", 112 .base.cra_driver_name = "ecb-aes-nx",
|
/linux/drivers/crypto/qce/ |
H A D | skcipher.c | 275 * ECB and CBC algorithms require message lengths to be in qce_skcipher_crypt() 363 .name = "ecb(aes)", 364 .drv_name = "ecb-aes-qce", 400 .name = "ecb(des)", 401 .drv_name = "ecb-des-qce", 418 .name = "ecb(des3_ede)", 419 .drv_name = "ecb-3des-qce",
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | crypto_basic.c | 17 .algo = "ecb(aes)", in crypto_release() 44 .algo = "ecb(aes)", in crypto_acquire()
|
/linux/drivers/crypto/allwinner/sun4i-ss/ |
H A D | sun4i-ss-core.c | 117 .cra_name = "ecb(aes)", 118 .cra_driver_name = "ecb-aes-sun4i-ss", 160 .cra_name = "ecb(des)", 161 .cra_driver_name = "ecb-des-sun4i-ss", 203 .cra_name = "ecb(des3_ede)", 204 .cra_driver_name = "ecb-des3-sun4i-ss",
|
/linux/arch/riscv/crypto/ |
H A D | Kconfig | 6 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTS" 13 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTS
|
/linux/arch/s390/kvm/ |
H A D | vsie.c | 451 const bool wants_tx = READ_ONCE(scb_o->ecb) & ECB_TE; in shadow_scb() 452 bool had_tx = scb_s->ecb & ECB_TE; in shadow_scb() 459 scb_s->ecb = 0; in shadow_scb() 516 scb_s->ecb |= scb_o->ecb & ECB_HOSTPROTINT; in shadow_scb() 524 scb_s->ecb |= scb_o->ecb & ECB_PTF; in shadow_scb() 530 scb_s->ecb |= ECB_TE; in shadow_scb() 533 scb_s->ecb |= scb_o->ecb & ECB_SPECI; in shadow_scb() 550 scb_s->ecb |= scb_o->ecb & ECB_GS; in shadow_scb() 638 if (!rc && (scb_s->ecb & ECB_TE)) in map_prefix() 767 if (gpa && (scb_s->ecb & ECB_TE)) { in pin_blocks() [all …]
|