Home
last modified time | relevance | path

Searched full:ecb (Results 1 – 25 of 136) sorted by relevance

123456

/linux/arch/x86/crypto/
H A DKconfig17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XCTR, XTS, GCM (AES-NI/VAES)"
28 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XCTR, XTS
38 tristate "Ciphers: Blowfish, modes: ECB, CBC"
45 Length-preserving ciphers: Blowfish with ECB and CBC modes
50 tristate "Ciphers: Camellia with modes: ECB, CBC"
56 Length-preserving ciphers: Camellia with ECB and CBC modes
61 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX)"
68 Length-preserving ciphers: Camellia with ECB and CBC modes
75 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX2)"
79 Length-preserving ciphers: Camellia with ECB and CBC modes
[all …]
H A Dblowfish_glue.c7 * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
112 .base.cra_name = "ecb(blowfish)",
113 .base.cra_driver_name = "ecb-blowfish-asm",
/linux/drivers/scsi/
H A Daha1740.c81 struct ecb ecb[AHA1740_ECBS]; member
92 static inline struct ecb *ecb_dma_to_cpu (struct Scsi_Host *host, in ecb_dma_to_cpu()
100 return (struct ecb *)(((char *) hdata->ecb) + (unsigned int) offset); in ecb_dma_to_cpu()
108 offset = (char *) cpu - (char *) hdata->ecb; in ecb_cpu_to_dma()
218 struct ecb *ecbptr; in aha1740_intr_handle()
287 memset(ecbptr,0,sizeof(struct ecb)); in aha1740_intr_handle()
355 /* locate an available ecb */ in aha1740_queuecommand_lck()
361 if (!host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
368 if (host->ecb[ecbno].cmdw) in aha1740_queuecommand_lck()
369 panic("Unable to find empty ecb for aha1740.\n"); in aha1740_queuecommand_lck()
[all …]
/linux/arch/sparc/crypto/
H A DKconfig6 tristate "Ciphers: DES and Triple DES EDE, modes: ECB/CBC"
14 Length-preserving ciphers: DES with ECB and CBC modes
15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes
70 tristate "Ciphers: AES, modes: ECB, CBC, CTR"
75 Length-preseving ciphers: AES with ECB, CBC, and CTR modes
80 tristate "Ciphers: Camellia, modes: ECB, CBC"
86 Length-preserving ciphers: Camellia with ECB and CBC modes
/linux/arch/s390/crypto/
H A DKconfig84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM"
91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes
95 As of z9 the ECB and CBC modes are hardware accelerated
98 As of z10 the ECB and CBC modes are hardware accelerated
106 tristate "Ciphers: DES and Triple DES EDE, modes: ECB, CBC, CTR"
114 Length-preserving ciphers: DES with ECB, CBC, and CTR modes
115 Length-preserving ciphers: Triple DES EDED with ECB, CBC, and CTR modes
119 As of z990 the ECB and CBC mode are hardware accelerated.
H A Ddes_s390.c147 .base.cra_name = "ecb(des)",
148 .base.cra_driver_name = "ecb-des-s390",
149 .base.cra_priority = 400, /* combo: des + ecb */
265 .base.cra_name = "ecb(des3_ede)",
266 .base.cra_driver_name = "ecb-des3_ede-s390",
267 .base.cra_priority = 400, /* combo: des3 + ecb */
/linux/crypto/
H A Dtcrypt.c1479 ret = min(ret, tcrypt_test("ecb(des)")); in do_test()
1485 ret = min(ret, tcrypt_test("ecb(des3_ede)")); in do_test()
1499 ret = min(ret, tcrypt_test("ecb(blowfish)")); in do_test()
1505 ret = min(ret, tcrypt_test("ecb(twofish)")); in do_test()
1513 ret = min(ret, tcrypt_test("ecb(serpent)")); in do_test()
1521 ret = min(ret, tcrypt_test("ecb(aes)")); in do_test()
1543 ret = min(ret, tcrypt_test("ecb(cast5)")); in do_test()
1549 ret = min(ret, tcrypt_test("ecb(cast6)")); in do_test()
1557 ret = min(ret, tcrypt_test("ecb(arc4)")); in do_test()
1569 ret = min(ret, tcrypt_test("ecb(tea)")); in do_test()
[all …]
H A Decb.c3 * ECB: Electronic CodeBook mode
158 /* ECB mode doesn't take an IV */ in crypto_ecb_create2()
187 /* ECB mode doesn't take an IV */ in crypto_ecb_create()
207 .name = "ecb",
226 MODULE_DESCRIPTION("ECB block cipher mode of operation");
227 MODULE_ALIAS_CRYPTO("ecb");
H A Dlrw.c7 * Based on ecb.c
135 * We compute the tweak masks twice (both before and after the ECB encryption or
137 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
232 /* pass req->iv as IV (will be used by xor_tweak, ECB will ignore it) */ in lrw_init_crypt()
327 if (snprintf(ecb_name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in lrw_create()
359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create()
429 MODULE_SOFTDEP("pre: ecb");
H A Dxts.c7 * Based on ecb.c
77 * We compute the tweak masks twice (both before and after the ECB encryption or
79 * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
368 if (snprintf(name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", in xts_create()
400 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create()
476 MODULE_SOFTDEP("pre: ecb");
H A Dcrypto_null.c110 .base.cra_name = "ecb(cipher_null)",
111 .base.cra_driver_name = "ecb-cipher_null",
161 tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0); in crypto_get_default_null_skcipher()
H A Darc4.c43 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init()
82 MODULE_ALIAS_CRYPTO("ecb(arc4)");
/linux/arch/arm64/crypto/
H A DKconfig132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS"
136 Length-preserving ciphers: AES with ECB, CBC, CTR, CTS,
155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
162 - ECB (Electronic Codebook) mode (NIST SP800-38A)
172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)"
179 - ECB (Electronic Codebook) mode (NIST SP800-38A)
202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)"
210 - ECB (Electronic Codebook) mode (NIST SP800-38A)
234 tristate "Ciphers: SM4, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
241 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
H A Dsm4-neon-glue.c191 .cra_name = "ecb(sm4)",
192 .cra_driver_name = "ecb-sm4-neon",
250 MODULE_DESCRIPTION("SM4 ECB/CBC/CTR using ARMv8 NEON");
253 MODULE_ALIAS_CRYPTO("ecb(sm4)");
/linux/drivers/crypto/intel/keembay/
H A DKconfig17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)).
20 bool "Support for Intel Keem Bay OCS AES/SM4 ECB HW acceleration"
24 AES/SM4 ECB mode hardware acceleration for use with Crypto API.
26 Provides OCS version of ecb(aes) and ecb(sm4)
28 Intel does not recommend use of ECB mode with AES/SM4.
/linux/drivers/crypto/gemini/
H A Dsl3516-ce-cipher.c8 * ECB mode.
137 struct pkt_control_ecb *ecb; in sl3516_ce_cipher() local
227 ecb = (struct pkt_control_ecb *)ce->pctrl; in sl3516_ce_cipher()
231 ecb->control.op_mode = rctx->op_dir; in sl3516_ce_cipher()
232 ecb->control.cipher_algorithm = ECB_AES; in sl3516_ce_cipher()
233 ecb->cipher.header_len = 0; in sl3516_ce_cipher()
234 ecb->cipher.algorithm_len = areq->cryptlen; in sl3516_ce_cipher()
235 cpu_to_be32_array((__be32 *)ecb->key, (u32 *)op->key, op->keylen / 4); in sl3516_ce_cipher()
236 rctx->h = &ecb->cipher; in sl3516_ce_cipher()
241 ecb->control.aesnk = op->keylen / 4; in sl3516_ce_cipher()
/linux/drivers/crypto/
H A DKconfig343 the ECB and CBC modes of operation are supported by the driver. Also
518 The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB
591 - AES (CBC, CTR, ECB, XTS)
592 - 3DES (CBC, ECB)
593 - DES (CBC, ECB)
602 - AES (CBC, CTR, ECB, XTS)
603 - 3DES (ECB, CBC)
604 - DES (ECB, CBC)
697 Supporting cbc/ecb chainmode, and aes/des/des3_ede cipher mode.
779 AES block ciphers in ECB and CBC mode, as well as SHA1, SHA224, SHA256,
H A Dmxs-dcp.c110 unsigned int ecb:1; member
281 if (rctx->ecb) in mxs_dcp_run_aes()
341 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt()
394 if (!rctx->ecb) { in mxs_dcp_aes_block_crypt()
464 static int mxs_dcp_aes_enqueue(struct skcipher_request *req, int enc, int ecb) in mxs_dcp_aes_enqueue() argument
476 rctx->ecb = ecb; in mxs_dcp_aes_enqueue()
903 /* AES 128 ECB and AES 128 CBC */
906 .base.cra_name = "ecb(aes)",
907 .base.cra_driver_name = "ecb-aes-dcp",
943 .base.cra_name = "ecb(paes)",
[all …]
/linux/arch/arm/crypto/
H A DKconfig167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)"
176 - ECB (Electronic Codebook) mode (NIST SP800-38A)
196 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)"
204 - ECB (Electronic Codebook) mode (NIST SP800-38A)
/linux/drivers/crypto/nx/
H A Dnx-aes-ecb.c3 * AES ECB routines supporting the Power 7+ Nest Accelerators driver
111 .base.cra_name = "ecb(aes)",
112 .base.cra_driver_name = "ecb-aes-nx",
/linux/drivers/crypto/qce/
H A Dskcipher.c275 * ECB and CBC algorithms require message lengths to be in qce_skcipher_crypt()
363 .name = "ecb(aes)",
364 .drv_name = "ecb-aes-qce",
400 .name = "ecb(des)",
401 .drv_name = "ecb-des-qce",
418 .name = "ecb(des3_ede)",
419 .drv_name = "ecb-3des-qce",
/linux/tools/testing/selftests/bpf/progs/
H A Dcrypto_basic.c17 .algo = "ecb(aes)", in crypto_release()
44 .algo = "ecb(aes)", in crypto_acquire()
/linux/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss-core.c117 .cra_name = "ecb(aes)",
118 .cra_driver_name = "ecb-aes-sun4i-ss",
160 .cra_name = "ecb(des)",
161 .cra_driver_name = "ecb-des-sun4i-ss",
203 .cra_name = "ecb(des3_ede)",
204 .cra_driver_name = "ecb-des3-sun4i-ss",
/linux/arch/riscv/crypto/
H A DKconfig6 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTS"
13 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTS
/linux/arch/s390/kvm/
H A Dvsie.c451 const bool wants_tx = READ_ONCE(scb_o->ecb) & ECB_TE; in shadow_scb()
452 bool had_tx = scb_s->ecb & ECB_TE; in shadow_scb()
459 scb_s->ecb = 0; in shadow_scb()
516 scb_s->ecb |= scb_o->ecb & ECB_HOSTPROTINT; in shadow_scb()
524 scb_s->ecb |= scb_o->ecb & ECB_PTF; in shadow_scb()
530 scb_s->ecb |= ECB_TE; in shadow_scb()
533 scb_s->ecb |= scb_o->ecb & ECB_SPECI; in shadow_scb()
550 scb_s->ecb |= scb_o->ecb & ECB_GS; in shadow_scb()
638 if (!rc && (scb_s->ecb & ECB_TE)) in map_prefix()
767 if (gpa && (scb_s->ecb & ECB_TE)) { in pin_blocks()
[all …]

123456