| /OK3568_Linux_fs/external/security/librkcrypto/perf_reports/ |
| H A D | RK3588_perf.txt | 19 dma_fd: otpkey [AES-256] ECB ENCRYPT 560MB/s. 21 dma_fd: otpkey [AES-256] CBC ENCRYPT 288MB/s. 23 dma_fd: otpkey [AES-256] CTR ENCRYPT 560MB/s. 25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 483MB/s. 27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 146MB/s. 29 dma_fd: otpkey [SM4-128] CTR ENCRYPT 483MB/s. 33 virt: otpkey [AES-256] ECB ENCRYPT 410MB/s. 35 virt: otpkey [AES-256] CBC ENCRYPT 242MB/s. 37 virt: otpkey [AES-256] CTR ENCRYPT 411MB/s. 39 virt: otpkey [SM4-128] ECB ENCRYPT 368MB/s. [all …]
|
| H A D | RK3528_perf.txt | 19 dma_fd: otpkey [AES-256] ECB ENCRYPT 764MB/s. 21 dma_fd: otpkey [AES-256] CBC ENCRYPT 252MB/s. 23 dma_fd: otpkey [AES-256] CTR ENCRYPT 762MB/s. 25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 441MB/s. 27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 125MB/s. 29 dma_fd: otpkey [SM4-128] CTR ENCRYPT 439MB/s. 33 virt: otpkey [AES-256] ECB ENCRYPT 276MB/s. 35 virt: otpkey [AES-256] CBC ENCRYPT 159MB/s. 37 virt: otpkey [AES-256] CTR ENCRYPT 275MB/s. 39 virt: otpkey [SM4-128] ECB ENCRYPT 217MB/s. [all …]
|
| H A D | RK3566_perf.txt | 20 dma_fd: otpkey [AES-256] ECB ENCRYPT 360MB/s. 22 dma_fd: otpkey [AES-256] CBC ENCRYPT 164MB/s. 24 dma_fd: otpkey [AES-256] CTR ENCRYPT 360MB/s. 26 dma_fd: otpkey [SM4-128] ECB ENCRYPT 297MB/s. 28 dma_fd: otpkey [SM4-128] CBC ENCRYPT 84MB/s. 30 dma_fd: otpkey [SM4-128] CTR ENCRYPT 297MB/s. 34 virt: otpkey [AES-256] ECB ENCRYPT 203MB/s. 36 virt: otpkey [AES-256] CBC ENCRYPT 122MB/s. 38 virt: otpkey [AES-256] CTR ENCRYPT 191MB/s. 40 virt: otpkey [SM4-128] ECB ENCRYPT 173MB/s. [all …]
|
| H A D | RK3562_perf.txt | 20 dma_fd: otpkey [AES-256] ECB ENCRYPT 605MB/s. 22 dma_fd: otpkey [AES-256] CBC ENCRYPT 177MB/s. 24 dma_fd: otpkey [AES-256] CTR ENCRYPT 606MB/s. 26 dma_fd: otpkey [SM4-128] ECB ENCRYPT N/A. 28 dma_fd: otpkey [SM4-128] CBC ENCRYPT N/A. 30 dma_fd: otpkey [SM4-128] CTR ENCRYPT N/A. 34 virt: otpkey [AES-256] ECB ENCRYPT 278MB/s. 36 virt: otpkey [AES-256] CBC ENCRYPT 131MB/s. 38 virt: otpkey [AES-256] CTR ENCRYPT 278MB/s. 40 virt: otpkey [SM4-128] ECB ENCRYPT N/A. [all …]
|
| H A D | RV1106_perf.txt | 23 dma_fd: [DES-64] ECB ENCRYPT 277MB/s. 25 dma_fd: [DES-64] CBC ENCRYPT 77MB/s. 27 dma_fd: [TDES-192] ECB ENCRYPT 105MB/s. 29 dma_fd: [TDES-192] CBC ENCRYPT 28MB/s. 31 dma_fd: [AES-256] ECB ENCRYPT 559MB/s. 33 dma_fd: [AES-256] CBC ENCRYPT 173MB/s. 37 dma_fd: [AES-256] CTR ENCRYPT 443MB/s. 49 virt: [DES-64] ECB ENCRYPT 269MB/s. 51 virt: [DES-64] CBC ENCRYPT 76MB/s. 53 virt: [TDES-192] ECB ENCRYPT 104MB/s. [all …]
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | tcrypt.c | 46 #define ENCRYPT 1 macro 164 if (enc == ENCRYPT) in do_mult_aead_op() 276 if (enc == ENCRYPT) in test_mb_aead_speed() 550 if (enc == ENCRYPT) in test_aead_speed() 1162 if (enc == ENCRYPT) in do_mult_acipher_op() 1262 if (enc == ENCRYPT) in test_mb_skcipher_speed() 1503 if (enc == ENCRYPT) in test_skcipher_speed() 2054 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2058 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2062 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ |
| H A D | padlock-aes.c | 66 struct cword encrypt; member 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 144 ctx->cword.encrypt.keygen = 1; in aes_set_key() 155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key() 310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt() 311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt() 312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt() [all …]
|
| H A D | ixp4xx_crypto.c | 153 bool encrypt; member 162 int encrypt; member 178 struct ix_sa_dir encrypt; member 352 if (req_ctx->encrypt) { in finish_scattered_hmac() 392 if (req_ctx->encrypt) { in one_packet() 581 ret = init_sa_dir(&ctx->encrypt); in init_tfm() 586 free_sa_dir(&ctx->encrypt); in init_tfm() 606 free_sa_dir(&ctx->encrypt); in exit_tfm() 676 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, in setup_auth() argument 687 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; in setup_auth() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/caam/ |
| H A D | caamalg.c | 336 * AES GCM encrypt shared descriptor in gcm_set_sh_desc() 401 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc() 469 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc() 1057 bool all_contig, bool encrypt) in init_aead_job() argument 1069 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job() 1070 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job() 1106 if (encrypt) in init_aead_job() 1118 bool all_contig, bool encrypt) in init_gcm_job() argument 1127 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job() 1132 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job() [all …]
|
| H A D | caamalg_qi.c | 258 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey() 259 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey() 382 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey() 383 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey() 490 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey() 491 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey() 596 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey() 597 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey() 636 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 643 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey() [all …]
|
| H A D | caamalg_qi2.c | 232 flc = &ctx->flc[ENCRYPT]; in aead_set_sh_desc() 246 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in aead_set_sh_desc() 347 bool encrypt) in aead_edesc_alloc() argument 378 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc() 423 (encrypt ? authsize : 0); in aead_edesc_alloc() 442 if ((alg->caam.rfc3686 && encrypt) || !alg->caam.geniv) in aead_edesc_alloc() 503 * to skip it when we authenticate or encrypt... in aead_edesc_alloc() 544 (encrypt ? ctx->authsize : (-ctx->authsize)); in aead_edesc_alloc() 596 flc = &ctx->flc[ENCRYPT]; in chachapoly_set_sh_desc() 601 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in chachapoly_set_sh_desc() [all …]
|
| /OK3568_Linux_fs/kernel/arch/sparc/crypto/ |
| H A D | des_glue.c | 95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument 107 if (encrypt) in __ecb_crypt() 136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument 148 if (encrypt) in __cbc_crypt() 153 if (encrypt) in __cbc_crypt() 244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument 257 if (encrypt) in __ecb3_crypt() 290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument 303 if (encrypt) in __cbc3_crypt() 309 if (encrypt) in __cbc3_crypt() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | cipher_internal.h | 53 /** Encrypt using ECB */ 58 /** Encrypt using CBC */ 65 /** Encrypt using CFB (Full length) */ 72 /** Encrypt using OFB (Full length) */ 80 /** Encrypt using CTR */ 87 /** Encrypt or decrypt using XTS. */ 94 /** Encrypt using STREAM */
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | cipher_internal.h | 53 /** Encrypt using ECB */ 58 /** Encrypt using CBC */ 65 /** Encrypt using CFB (Full length) */ 72 /** Encrypt using OFB (Full length) */ 80 /** Encrypt using CTR */ 87 /** Encrypt or decrypt using XTS. */ 94 /** Encrypt using STREAM */
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | cipher_internal.h | 53 /** Encrypt using ECB */ 58 /** Encrypt using CBC */ 65 /** Encrypt using CFB (Full length) */ 72 /** Encrypt using OFB (Full length) */ 80 /** Encrypt using CTR */ 87 /** Encrypt or decrypt using XTS. */ 94 /** Encrypt using STREAM */
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | cipher_internal.h | 53 /** Encrypt using ECB */ 58 /** Encrypt using CBC */ 65 /** Encrypt using CFB (Full length) */ 72 /** Encrypt using OFB (Full length) */ 80 /** Encrypt using CTR */ 87 /** Encrypt or decrypt using XTS. */ 94 /** Encrypt using STREAM */
|
| H A D | chachapoly.h | 9 * with Associated Data (AEAD) that can be used to encrypt and 70 mbedtls_chachapoly_mode_t mode; /**< Cipher mode (encrypt or decrypt). */ 87 * In order to encrypt or decrypt full messages at once, for 92 * In order to encrypt messages piecewise, for each 155 * encrypt or decrypt) then \p mode can be set to any value. 235 * \param len The length (in bytes) of the data to encrypt or decrypt. 236 * \param input The buffer containing the data to encrypt or decrypt. 286 * \param length The length (in bytes) of the data to encrypt or decrypt. 291 * \param input The buffer containing the data to encrypt or decrypt.
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/ |
| H A D | rk_crypto_v2_skcipher.c | 229 static int rk_cipher_crypt(struct skcipher_request *req, bool encrypt) in rk_cipher_crypt() argument 236 encrypt ? "encrypt" : "decrypt", req->cryptlen); in rk_cipher_crypt() 259 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt() 263 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt() 267 if (!encrypt) in rk_cipher_crypt() 289 ctx->is_enc = encrypt; in rk_cipher_crypt() 538 static int rk_aead_crypt(struct aead_request *req, bool encrypt) in rk_aead_crypt() argument 550 encrypt ? "encrypt" : "decrypt", in rk_aead_crypt() 553 data_len = encrypt ? req->cryptlen : (req->cryptlen - crypto_aead_authsize(tfm)); in rk_aead_crypt() 559 return rk_aead_fallback(req, ctx, encrypt); in rk_aead_crypt() [all …]
|
| H A D | rk_crypto_v3_skcipher.c | 228 static int rk_cipher_crypt(struct skcipher_request *req, bool encrypt) in rk_cipher_crypt() argument 235 encrypt ? "encrypt" : "decrypt", req->cryptlen); in rk_cipher_crypt() 258 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt() 262 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt() 266 if (!encrypt) in rk_cipher_crypt() 288 ctx->is_enc = encrypt; in rk_cipher_crypt() 537 static int rk_aead_crypt(struct aead_request *req, bool encrypt) in rk_aead_crypt() argument 549 encrypt ? "encrypt" : "decrypt", in rk_aead_crypt() 552 data_len = encrypt ? req->cryptlen : (req->cryptlen - crypto_aead_authsize(tfm)); in rk_aead_crypt() 558 return rk_aead_fallback(req, ctx, encrypt); in rk_aead_crypt() [all …]
|
| /OK3568_Linux_fs/kernel/net/ceph/ |
| H A D | crypto.c | 150 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt 218 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument 226 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 230 if (encrypt) in ceph_aes_crypt() 247 if (encrypt) in ceph_aes_crypt() 254 encrypt ? "en" : "de", ret); in ceph_aes_crypt() 262 if (encrypt) { in ceph_aes_crypt() 282 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument 290 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/virtio/ |
| H A D | virtio_crypto_algs.c | 38 bool encrypt; member 66 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback() 118 int encrypt) in virtio_crypto_alg_skcipher_init_session() argument 123 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session() 191 if (encrypt) in virtio_crypto_alg_skcipher_init_session() 206 int encrypt) in virtio_crypto_alg_skcipher_close_session() argument 225 if (encrypt) in virtio_crypto_alg_skcipher_close_session() 387 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req() 441 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req() 502 vc_sym_req->encrypt = true; in virtio_crypto_skcipher_encrypt() [all …]
|
| /OK3568_Linux_fs/kernel/fs/crypto/ |
| H A D | crypto.c | 100 /* Encrypt or decrypt a single filesystem block of file contents */ 148 * fscrypt_encrypt_pagecache_blocks() - Encrypt filesystem blocks from a 150 * @page: The locked pagecache page containing the block(s) to encrypt 151 * @len: Total size of the block(s) to encrypt. Must be a nonzero 153 * @offs: Byte offset within @page of the first block to encrypt. Must be 213 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place 215 * @page: The page containing the block to encrypt 216 * @len: Size of block to encrypt. Doesn't need to be a multiple of the 218 * @offs: Byte offset within @page at which the block to encrypt begins 223 * Encrypt a possibly-compressed filesystem block that is located in an
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ccree/ |
| H A D | cc_cipher.c | 895 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process() 1013 .encrypt = cc_cipher_encrypt, 1031 .encrypt = cc_cipher_encrypt, 1049 .encrypt = cc_cipher_encrypt, 1067 .encrypt = cc_cipher_encrypt, 1085 .encrypt = cc_cipher_encrypt, 1103 .encrypt = cc_cipher_encrypt, 1121 .encrypt = cc_cipher_encrypt, 1143 .encrypt = cc_cipher_encrypt, 1160 .encrypt = cc_cipher_encrypt, [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback() 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 401 .encrypt = nitrox_aes_encrypt, 420 .encrypt = nitrox_aes_encrypt, 439 .encrypt = nitrox_aes_encrypt, 458 .encrypt = nitrox_aes_encrypt, 479 .encrypt = nitrox_aes_encrypt, 496 .encrypt = nitrox_aes_encrypt, 515 .encrypt = nitrox_3des_encrypt, 534 .encrypt = nitrox_3des_encrypt,
|
| /OK3568_Linux_fs/u-boot/arch/arm/mach-tegra/tegra20/ |
| H A D | crypto.c | 19 SECURITY_ENCRYPT = 1 << 1, /* Encrypt the data */ 47 * \param num_aes_blocks Number of AES blocks to encrypt 80 /* encrypt the AES block */ in sign_object() 92 * Encrypt and sign a block of data (depending on security mode). 124 /* encrypt the data, overwriting the result in signature. */ in encrypt_and_sign()
|