| /OK3568_Linux_fs/external/security/librkcrypto/perf_reports/ |
| H A D | RK3588_perf.txt | 18 console:/data # librkcrypto_test -t 19 dma_fd: otpkey [AES-256] ECB ENCRYPT 560MB/s. 20 dma_fd: otpkey [AES-256] ECB DECRYPT 560MB/s. 21 dma_fd: otpkey [AES-256] CBC ENCRYPT 288MB/s. 22 dma_fd: otpkey [AES-256] CBC DECRYPT 560MB/s. 23 dma_fd: otpkey [AES-256] CTR ENCRYPT 560MB/s. 24 dma_fd: otpkey [AES-256] CTR DECRYPT 560MB/s. 25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 483MB/s. 26 dma_fd: otpkey [SM4-128] ECB DECRYPT 483MB/s. 27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 146MB/s. [all …]
|
| H A D | RK3528_perf.txt | 18 console:/data # ./librkcrypto_test -t 19 dma_fd: otpkey [AES-256] ECB ENCRYPT 764MB/s. 20 dma_fd: otpkey [AES-256] ECB DECRYPT 773MB/s. 21 dma_fd: otpkey [AES-256] CBC ENCRYPT 252MB/s. 22 dma_fd: otpkey [AES-256] CBC DECRYPT 771MB/s. 23 dma_fd: otpkey [AES-256] CTR ENCRYPT 762MB/s. 24 dma_fd: otpkey [AES-256] CTR DECRYPT 772MB/s. 25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 441MB/s. 26 dma_fd: otpkey [SM4-128] ECB DECRYPT 443MB/s. 27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 125MB/s. [all …]
|
| H A D | RK3566_perf.txt | 19 console:/data # librkcrypto_test -t 20 dma_fd: otpkey [AES-256] ECB ENCRYPT 360MB/s. 21 dma_fd: otpkey [AES-256] ECB DECRYPT 360MB/s. 22 dma_fd: otpkey [AES-256] CBC ENCRYPT 164MB/s. 23 dma_fd: otpkey [AES-256] CBC DECRYPT 360MB/s. 24 dma_fd: otpkey [AES-256] CTR ENCRYPT 360MB/s. 25 dma_fd: otpkey [AES-256] CTR DECRYPT 360MB/s. 26 dma_fd: otpkey [SM4-128] ECB ENCRYPT 297MB/s. 27 dma_fd: otpkey [SM4-128] ECB DECRYPT 297MB/s. 28 dma_fd: otpkey [SM4-128] CBC ENCRYPT 84MB/s. [all …]
|
| H A D | RV1106_perf.txt | 15 # ./librkcrypto_test -t 23 dma_fd: [DES-64] ECB ENCRYPT 277MB/s. 24 dma_fd: [DES-64] ECB DECRYPT 277MB/s. 25 dma_fd: [DES-64] CBC ENCRYPT 77MB/s. 26 dma_fd: [DES-64] CBC DECRYPT 277MB/s. 27 dma_fd: [TDES-192] ECB ENCRYPT 105MB/s. 28 dma_fd: [TDES-192] ECB DECRYPT 105MB/s. 29 dma_fd: [TDES-192] CBC ENCRYPT 28MB/s. 30 dma_fd: [TDES-192] CBC DECRYPT 105MB/s. 31 dma_fd: [AES-256] ECB ENCRYPT 559MB/s. [all …]
|
| H A D | RK3562_perf.txt | 19 console:/data # ./librkcrypto_test -t 20 dma_fd: otpkey [AES-256] ECB ENCRYPT 605MB/s. 21 dma_fd: otpkey [AES-256] ECB DECRYPT 605MB/s. 22 dma_fd: otpkey [AES-256] CBC ENCRYPT 177MB/s. 23 dma_fd: otpkey [AES-256] CBC DECRYPT 606MB/s. 24 dma_fd: otpkey [AES-256] CTR ENCRYPT 606MB/s. 25 dma_fd: otpkey [AES-256] CTR DECRYPT 606MB/s. 26 dma_fd: otpkey [SM4-128] ECB ENCRYPT N/A. 27 dma_fd: otpkey [SM4-128] ECB DECRYPT N/A. 28 dma_fd: otpkey [SM4-128] CBC ENCRYPT N/A. [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | architecture.rst | 5 ---------------------- 10 - Symmetric ciphers 12 - AEAD ciphers 14 - Message digest, including keyed message digest 16 - Random number generation 18 - User space interface 21 --------------------- 30 a caller or invoked together with a template to form multi-block ciphers 38 - aes 40 - ecb(aes) [all …]
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | fips140-selftests.c | 1 // SPDX-License-Identifier: GPL-2.0-only 8 * Self-tests of fips140.ko cryptographic functionality. These are run at 11 * The actual requirements for these self-tests are somewhat vague, but 12 * section 9 ("Self-Tests") of the FIPS 140-2 Implementation Guidance document 13 …ttps://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/fips140… 17 * - There are provisions for skipping tests that are already sufficiently 18 * covered by other tests. E.g., HMAC-SHA256 may cover SHA-256. 20 * - Only one test vector is required per algorithm, and it can be generated 21 * by any known-good implementation or taken from any official document. 23 * - For ciphers, both encryption and decryption must be tested. [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/openvpn/openvpn/ |
| H A D | openvpn@.service | 9 …--daemon --writepid /var/run/openvpn/%i.pid --cd /etc/openvpn/ --cipher AES-256-GCM --data-ciphers… 12 WantedBy=multi-user.target
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 174 // codes 110-114 are from RFC3546 208 // ExtensionType values from draft-ietf-tls-tls13-18 265 // draft-ietf-tls-56-bit-ciphersuites-01.txt 277 // AES ciphersuites from RFC3268 [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 174 // codes 110-114 are from RFC3546 208 // ExtensionType values from draft-ietf-tls-tls13-18 265 // draft-ietf-tls-56-bit-ciphersuites-01.txt 277 // AES ciphersuites from RFC3268 [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-galois.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 17 #include <crypto/aes.h> 19 #include <crypto/gcm.h> 22 #include "ccp-crypto.h" 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 45 return -EINVAL; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10 206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use 208 // collides with TLS-LTS and, based on scans, something else too (though this 209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward [all …]
|
| H A D | aead.h | 29 // message has a unique, per-message nonce and, optionally, additional data 53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html. 58 // important - nonce reuse may completely undermine the security of the AEAD. 65 // The "seal" and "open" operations are atomic - an entire message must be 84 // The "seal" and "open" operations may work in-place if the |out| and |in| 93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode. 95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it 96 // is specified to take a variable-length nonce, nonces with other lengths are 99 // parameters, only use 12-byte nonces. 102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10 206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use 208 // collides with TLS-LTS and, based on scans, something else too (though this 209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward [all …]
|
| H A D | aead.h | 29 // message has a unique, per-message nonce and, optionally, additional data 53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html. 58 // important - nonce reuse may completely undermine the security of the AEAD. 65 // The "seal" and "open" operations are atomic - an entire message must be 84 // The "seal" and "open" operations may work in-place if the |out| and |in| 93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode. 95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it 96 // is specified to take a variable-length nonce, nonces with other lengths are 99 // parameters, only use 12-byte nonces. 102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10 206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use 208 // collides with TLS-LTS and, based on scans, something else too (though this 209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward [all …]
|
| H A D | aead.h | 29 // message has a unique, per-message nonce and, optionally, additional data 53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html. 58 // important - nonce reuse may completely undermine the security of the AEAD. 65 // The "seal" and "open" operations are atomic - an entire message must be 84 // The "seal" and "open" operations may work in-place if the |out| and |in| 93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode. 95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it 96 // is specified to take a variable-length nonce, nonces with other lengths are 99 // parameters, only use 12-byte nonces. 102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 182 #define TLS1_AD_ECH_REQUIRED 121 // draft-ietf-tls-esni-10 206 // ExtensionType value from draft-ietf-quic-tls. Drafts 00 through 32 use 208 // collides with TLS-LTS and, based on scans, something else too (though this 209 // hasn't been a problem in practice since it's QUIC-only). Drafts 33 onward [all …]
|
| H A D | aead.h | 29 // message has a unique, per-message nonce and, optionally, additional data 53 // http://www-cse.ucsd.edu/~mihir/papers/oem.html. 58 // important - nonce reuse may completely undermine the security of the AEAD. 65 // The "seal" and "open" operations are atomic - an entire message must be 84 // The "seal" and "open" operations may work in-place if the |out| and |in| 93 // EVP_aead_aes_128_gcm is AES-128 in Galois Counter Mode. 95 // Note: AES-GCM should only be used with 12-byte (96-bit) nonces. Although it 96 // is specified to take a variable-length nonce, nonces with other lengths are 99 // parameters, only use 12-byte nonces. 102 // EVP_aead_aes_192_gcm is AES-192 in Galois Counter Mode. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | cipher.h | 1 /* SPDX-License-Identifier: Apache-2.0 */ 9 * \author Adriaan de Jong <dejong@fox-it.com> 12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved 18 * http://www.apache.org/licenses/LICENSE-2.0 59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available… 60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */ 61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */ 62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a… 63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b… 64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes… [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | cipher.h | 1 /* SPDX-License-Identifier: Apache-2.0 */ 9 * \author Adriaan de Jong <dejong@fox-it.com> 12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved 18 * http://www.apache.org/licenses/LICENSE-2.0 59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available… 60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */ 61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */ 62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a… 63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b… 64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes… [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | cipher.h | 1 /* SPDX-License-Identifier: Apache-2.0 */ 9 * \author Adriaan de Jong <dejong@fox-it.com> 12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved 18 * http://www.apache.org/licenses/LICENSE-2.0 59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available… 60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */ 61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */ 62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a… 63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b… 64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes… [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | cipher.h | 1 /* SPDX-License-Identifier: Apache-2.0 */ 9 * \author Adriaan de Jong <dejong@fox-it.com> 12 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved 18 * http://www.apache.org/licenses/LICENSE-2.0 59 #define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE -0x6080 /**< The selected feature is not available… 60 #define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA -0x6100 /**< Bad input parameters. */ 61 #define MBEDTLS_ERR_CIPHER_ALLOC_FAILED -0x6180 /**< Failed to allocate memory. */ 62 #define MBEDTLS_ERR_CIPHER_INVALID_PADDING -0x6200 /**< Input data contains invalid padding a… 63 #define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full b… 64 #define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes… [all …]
|
| /OK3568_Linux_fs/kernel/tools/crypto/ |
| H A D | gen_fips140_testvecs.py | 2 # SPDX-License-Identifier: GPL-2.0-only 6 # Generate most of the test vectors for the FIPS 140 cryptographic self-tests. 9 # tools/crypto/gen_fips140_testvecs.py > crypto/fips140-generated-testvecs.h 12 # Debian: apt-get install python3-pycryptodome python3-cryptography 13 # Arch Linux: pacman -S python-pycryptodomex python-cryptography 19 import Cryptodome.Cipher.AES 28 message = bytes('This is a 32-byte test message.\0', 'ascii') 29 aes_key = bytes('128-bit AES key\0', 'ascii') 30 aes_xts_key = bytes('This is an AES-128-XTS key.\0\0\0\0\0', 'ascii') 33 hmac_key = bytes('128-bit HMAC key', 'ascii') [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/nx/ |
| H A D | nx-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver 11 #include <crypto/aes.h> 13 #include <crypto/gcm.h> 28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key() 29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key() 37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key() 42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key() 47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key() 50 return -EINVAL; in gcm_aes_nx_set_key() [all …]
|