Home
last modified time | relevance | path

Searched +full:aes +full:- +full:gcm (Results 1 – 25 of 256) sorted by relevance

1234567891011

/OK3568_Linux_fs/external/security/librkcrypto/perf_reports/
H A DRK3588_perf.txt18 console:/data # librkcrypto_test -t
19 dma_fd: otpkey [AES-256] ECB ENCRYPT 560MB/s.
20 dma_fd: otpkey [AES-256] ECB DECRYPT 560MB/s.
21 dma_fd: otpkey [AES-256] CBC ENCRYPT 288MB/s.
22 dma_fd: otpkey [AES-256] CBC DECRYPT 560MB/s.
23 dma_fd: otpkey [AES-256] CTR ENCRYPT 560MB/s.
24 dma_fd: otpkey [AES-256] CTR DECRYPT 560MB/s.
25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 483MB/s.
26 dma_fd: otpkey [SM4-128] ECB DECRYPT 483MB/s.
27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 146MB/s.
[all …]
H A DRK3528_perf.txt18 console:/data # ./librkcrypto_test -t
19 dma_fd: otpkey [AES-256] ECB ENCRYPT 764MB/s.
20 dma_fd: otpkey [AES-256] ECB DECRYPT 773MB/s.
21 dma_fd: otpkey [AES-256] CBC ENCRYPT 252MB/s.
22 dma_fd: otpkey [AES-256] CBC DECRYPT 771MB/s.
23 dma_fd: otpkey [AES-256] CTR ENCRYPT 762MB/s.
24 dma_fd: otpkey [AES-256] CTR DECRYPT 772MB/s.
25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 441MB/s.
26 dma_fd: otpkey [SM4-128] ECB DECRYPT 443MB/s.
27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 125MB/s.
[all …]
H A DRK3566_perf.txt19 console:/data # librkcrypto_test -t
20 dma_fd: otpkey [AES-256] ECB ENCRYPT 360MB/s.
21 dma_fd: otpkey [AES-256] ECB DECRYPT 360MB/s.
22 dma_fd: otpkey [AES-256] CBC ENCRYPT 164MB/s.
23 dma_fd: otpkey [AES-256] CBC DECRYPT 360MB/s.
24 dma_fd: otpkey [AES-256] CTR ENCRYPT 360MB/s.
25 dma_fd: otpkey [AES-256] CTR DECRYPT 360MB/s.
26 dma_fd: otpkey [SM4-128] ECB ENCRYPT 297MB/s.
27 dma_fd: otpkey [SM4-128] ECB DECRYPT 297MB/s.
28 dma_fd: otpkey [SM4-128] CBC ENCRYPT 84MB/s.
[all …]
H A DRV1106_perf.txt15 # ./librkcrypto_test -t
23 dma_fd: [DES-64] ECB ENCRYPT 277MB/s.
24 dma_fd: [DES-64] ECB DECRYPT 277MB/s.
25 dma_fd: [DES-64] CBC ENCRYPT 77MB/s.
26 dma_fd: [DES-64] CBC DECRYPT 277MB/s.
27 dma_fd: [TDES-192] ECB ENCRYPT 105MB/s.
28 dma_fd: [TDES-192] ECB DECRYPT 105MB/s.
29 dma_fd: [TDES-192] CBC ENCRYPT 28MB/s.
30 dma_fd: [TDES-192] CBC DECRYPT 105MB/s.
31 dma_fd: [AES-256] ECB ENCRYPT 559MB/s.
[all …]
H A DRK3562_perf.txt19 console:/data # ./librkcrypto_test -t
20 dma_fd: otpkey [AES-256] ECB ENCRYPT 605MB/s.
21 dma_fd: otpkey [AES-256] ECB DECRYPT 605MB/s.
22 dma_fd: otpkey [AES-256] CBC ENCRYPT 177MB/s.
23 dma_fd: otpkey [AES-256] CBC DECRYPT 606MB/s.
24 dma_fd: otpkey [AES-256] CTR ENCRYPT 606MB/s.
25 dma_fd: otpkey [AES-256] CTR DECRYPT 606MB/s.
26 dma_fd: otpkey [SM4-128] ECB ENCRYPT N/A.
27 dma_fd: otpkey [SM4-128] ECB DECRYPT N/A.
28 dma_fd: otpkey [SM4-128] CBC ENCRYPT N/A.
[all …]
/OK3568_Linux_fs/kernel/Documentation/crypto/
H A Darchitecture.rst5 ----------------------
10 - Symmetric ciphers
12 - AEAD ciphers
14 - Message digest, including keyed message digest
16 - Random number generation
18 - User space interface
21 ---------------------
30 a caller or invoked together with a template to form multi-block ciphers
38 - aes
40 - ecb(aes)
[all …]
/OK3568_Linux_fs/kernel/crypto/
H A Dfips140-selftests.c1 // SPDX-License-Identifier: GPL-2.0-only
8 * Self-tests of fips140.ko cryptographic functionality. These are run at
11 * The actual requirements for these self-tests are somewhat vague, but
12 * section 9 ("Self-Tests") of the FIPS 140-2 Implementation Guidance document
13 …ttps://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/fips140
17 * - There are provisions for skipping tests that are already sufficiently
18 * covered by other tests. E.g., HMAC-SHA256 may cover SHA-256.
20 * - Only one test vector is required per algorithm, and it can be generated
21 * by any known-good implementation or taken from any official document.
23 * - For ciphers, both encryption and decryption must be tested.
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/openvpn/openvpn/
H A Dopenvpn@.service9--daemon --writepid /var/run/openvpn/%i.pid --cd /etc/openvpn/ --cipher AES-256-GCM --data-ciphers…
12 WantedBy=multi-user.target
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
174 // codes 110-114 are from RFC3546
208 // ExtensionType values from draft-ietf-tls-tls13-18
265 // draft-ietf-tls-56-bit-ciphersuites-01.txt
277 // AES ciphersuites from RFC3268
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
174 // codes 110-114 are from RFC3546
208 // ExtensionType values from draft-ietf-tls-tls13-18
265 // draft-ietf-tls-56-bit-ciphersuites-01.txt
277 // AES ciphersuites from RFC3268
[all …]
/OK3568_Linux_fs/kernel/drivers/crypto/ccp/
H A Dccp-crypto-aes-galois.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support
17 #include <crypto/aes.h>
19 #include <crypto/gcm.h>
22 #include "ccp-crypto.h"
36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey()
39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey()
42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey()
45 return -EINVAL; in ccp_aes_gcm_setkey()
48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10
206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use
208 // collides with TLS-LTS and, based on scans, something else too (though this
209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward
[all …]
H A Daead.h29 // message has a unique, per-message nonce and, optionally, additional data
53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html.
58 // important - nonce reuse may completely undermine the security of the AEAD.
65 // The "seal" and "open" operations are atomic - an entire message must be
84 // The "seal" and "open" operations may work in-place if the |out| and |in|
93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode.
95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it
96 // is specified to take a variable-length nonce, nonces with other lengths are
99 // parameters, only use 12-byte nonces.
102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10
206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use
208 // collides with TLS-LTS and, based on scans, something else too (though this
209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward
[all …]
H A Daead.h29 // message has a unique, per-message nonce and, optionally, additional data
53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html.
58 // important - nonce reuse may completely undermine the security of the AEAD.
65 // The "seal" and "open" operations are atomic - an entire message must be
84 // The "seal" and "open" operations may work in-place if the |out| and |in|
93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode.
95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it
96 // is specified to take a variable-length nonce, nonces with other lengths are
99 // parameters, only use 12-byte nonces.
102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10
206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use
208 // collides with TLS-LTS and, based on scans, something else too (though this
209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward
[all …]
H A Daead.h29 // message has a unique, per-message nonce and, optionally, additional data
53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html.
58 // important - nonce reuse may completely undermine the security of the AEAD.
65 // The "seal" and "open" operations are atomic - an entire message must be
84 // The "seal" and "open" operations may work in-place if the |out| and |in|
93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode.
95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it
96 // is specified to take a variable-length nonce, nonces with other lengths are
99 // parameters, only use 12-byte nonces.
102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10
206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use
208 // collides with TLS-LTS and, based on scans, something else too (though this
209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward
[all …]
H A Daead.h29 // message has a unique, per-message nonce and, optionally, additional data
53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html.
58 // important - nonce reuse may completely undermine the security of the AEAD.
65 // The "seal" and "open" operations are atomic - an entire message must be
84 // The "seal" and "open" operations may work in-place if the |out| and |in|
93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode.
95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it
96 // is specified to take a variable-length nonce, nonces with other lengths are
99 // parameters, only use 12-byte nonces.
102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dcipher.h1 /* SPDX-License-Identifier: Apache-2.0 */
9 * \author Adriaan de Jong <dejong@fox-it.com>
12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved
18 * http://www.apache.org/licenses/LICENSE-2.0
59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available…
60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */
61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */
62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a…
63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b…
64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes…
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dcipher.h1 /* SPDX-License-Identifier: Apache-2.0 */
9 * \author Adriaan de Jong <dejong@fox-it.com>
12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved
18 * http://www.apache.org/licenses/LICENSE-2.0
59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available…
60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */
61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */
62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a…
63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b…
64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes…
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dcipher.h1 /* SPDX-License-Identifier: Apache-2.0 */
9 * \author Adriaan de Jong <dejong@fox-it.com>
12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved
18 * http://www.apache.org/licenses/LICENSE-2.0
59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available…
60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */
61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */
62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a…
63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b…
64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes…
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dcipher.h1 /* SPDX-License-Identifier: Apache-2.0 */
9 * \author Adriaan de Jong <dejong@fox-it.com>
12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved
18 * http://www.apache.org/licenses/LICENSE-2.0
59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available…
60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */
61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */
62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a…
63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b…
64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes…
[all …]
/OK3568_Linux_fs/kernel/tools/crypto/
H A Dgen_fips140_testvecs.py2 # SPDX-License-Identifier: GPL-2.0-only
6 # Generate most of the test vectors for the FIPS 140 cryptographic self-tests.
9 # tools/crypto/gen_fips140_testvecs.py > crypto/fips140-generated-testvecs.h
12 # Debian: apt-get install python3-pycryptodome python3-cryptography
13 # Arch Linux: pacman -S python-pycryptodomex python-cryptography
19 import Cryptodome.Cipher.AES
28 message = bytes('This is a 32-byte test message.\0', 'ascii')
29 aes_key = bytes('128-bit AES key\0', 'ascii')
30 aes_xts_key = bytes('This is an AES-128-XTS key.\0\0\0\0\0', 'ascii')
33 hmac_key = bytes('128-bit HMAC key', 'ascii')
[all …]
/OK3568_Linux_fs/kernel/drivers/crypto/nx/
H A Dnx-aes-gcm.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver
11 #include <crypto/aes.h>
13 #include <crypto/gcm.h>
28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key()
29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key()
37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key()
42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key()
47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key()
50 return -EINVAL; in gcm_aes_nx_set_key()
[all …]

1234567891011