Home
last modified time | relevance | path

Searched full:encrypt (Results 1 – 25 of 918) sorted by relevance

12345678910>>...37

/OK3568_Linux_fs/external/security/librkcrypto/perf_reports/
H A DRK3588_perf.txt19 dma_fd: otpkey [AES-256] ECB ENCRYPT 560MB/s.
21 dma_fd: otpkey [AES-256] CBC ENCRYPT 288MB/s.
23 dma_fd: otpkey [AES-256] CTR ENCRYPT 560MB/s.
25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 483MB/s.
27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 146MB/s.
29 dma_fd: otpkey [SM4-128] CTR ENCRYPT 483MB/s.
33 virt: otpkey [AES-256] ECB ENCRYPT 410MB/s.
35 virt: otpkey [AES-256] CBC ENCRYPT 242MB/s.
37 virt: otpkey [AES-256] CTR ENCRYPT 411MB/s.
39 virt: otpkey [SM4-128] ECB ENCRYPT 368MB/s.
[all …]
H A DRK3528_perf.txt19 dma_fd: otpkey [AES-256] ECB ENCRYPT 764MB/s.
21 dma_fd: otpkey [AES-256] CBC ENCRYPT 252MB/s.
23 dma_fd: otpkey [AES-256] CTR ENCRYPT 762MB/s.
25 dma_fd: otpkey [SM4-128] ECB ENCRYPT 441MB/s.
27 dma_fd: otpkey [SM4-128] CBC ENCRYPT 125MB/s.
29 dma_fd: otpkey [SM4-128] CTR ENCRYPT 439MB/s.
33 virt: otpkey [AES-256] ECB ENCRYPT 276MB/s.
35 virt: otpkey [AES-256] CBC ENCRYPT 159MB/s.
37 virt: otpkey [AES-256] CTR ENCRYPT 275MB/s.
39 virt: otpkey [SM4-128] ECB ENCRYPT 217MB/s.
[all …]
H A DRK3566_perf.txt20 dma_fd: otpkey [AES-256] ECB ENCRYPT 360MB/s.
22 dma_fd: otpkey [AES-256] CBC ENCRYPT 164MB/s.
24 dma_fd: otpkey [AES-256] CTR ENCRYPT 360MB/s.
26 dma_fd: otpkey [SM4-128] ECB ENCRYPT 297MB/s.
28 dma_fd: otpkey [SM4-128] CBC ENCRYPT 84MB/s.
30 dma_fd: otpkey [SM4-128] CTR ENCRYPT 297MB/s.
34 virt: otpkey [AES-256] ECB ENCRYPT 203MB/s.
36 virt: otpkey [AES-256] CBC ENCRYPT 122MB/s.
38 virt: otpkey [AES-256] CTR ENCRYPT 191MB/s.
40 virt: otpkey [SM4-128] ECB ENCRYPT 173MB/s.
[all …]
H A DRK3562_perf.txt20 dma_fd: otpkey [AES-256] ECB ENCRYPT 605MB/s.
22 dma_fd: otpkey [AES-256] CBC ENCRYPT 177MB/s.
24 dma_fd: otpkey [AES-256] CTR ENCRYPT 606MB/s.
26 dma_fd: otpkey [SM4-128] ECB ENCRYPT N/A.
28 dma_fd: otpkey [SM4-128] CBC ENCRYPT N/A.
30 dma_fd: otpkey [SM4-128] CTR ENCRYPT N/A.
34 virt: otpkey [AES-256] ECB ENCRYPT 278MB/s.
36 virt: otpkey [AES-256] CBC ENCRYPT 131MB/s.
38 virt: otpkey [AES-256] CTR ENCRYPT 278MB/s.
40 virt: otpkey [SM4-128] ECB ENCRYPT N/A.
[all …]
H A DRV1106_perf.txt23 dma_fd: [DES-64] ECB ENCRYPT 277MB/s.
25 dma_fd: [DES-64] CBC ENCRYPT 77MB/s.
27 dma_fd: [TDES-192] ECB ENCRYPT 105MB/s.
29 dma_fd: [TDES-192] CBC ENCRYPT 28MB/s.
31 dma_fd: [AES-256] ECB ENCRYPT 559MB/s.
33 dma_fd: [AES-256] CBC ENCRYPT 173MB/s.
37 dma_fd: [AES-256] CTR ENCRYPT 443MB/s.
49 virt: [DES-64] ECB ENCRYPT 269MB/s.
51 virt: [DES-64] CBC ENCRYPT 76MB/s.
53 virt: [TDES-192] ECB ENCRYPT 104MB/s.
[all …]
/OK3568_Linux_fs/kernel/crypto/
H A Dtcrypt.c46 #define ENCRYPT 1 macro
164 if (enc == ENCRYPT) in do_mult_aead_op()
276 if (enc == ENCRYPT) in test_mb_aead_speed()
550 if (enc == ENCRYPT) in test_aead_speed()
1162 if (enc == ENCRYPT) in do_mult_acipher_op()
1262 if (enc == ENCRYPT) in test_mb_skcipher_speed()
1503 if (enc == ENCRYPT) in test_skcipher_speed()
2054 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test()
2058 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test()
2062 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test()
[all …]
/OK3568_Linux_fs/kernel/drivers/crypto/
H A Dpadlock-aes.c66 struct cword encrypt; member
134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
144 ctx->cword.encrypt.keygen = 1; in aes_set_key()
155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key()
310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt()
311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt()
312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt()
[all …]
H A Dixp4xx_crypto.c153 bool encrypt; member
162 int encrypt; member
178 struct ix_sa_dir encrypt; member
352 if (req_ctx->encrypt) { in finish_scattered_hmac()
392 if (req_ctx->encrypt) { in one_packet()
581 ret = init_sa_dir(&ctx->encrypt); in init_tfm()
586 free_sa_dir(&ctx->encrypt); in init_tfm()
606 free_sa_dir(&ctx->encrypt); in exit_tfm()
676 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, in setup_auth() argument
687 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; in setup_auth()
[all …]
/OK3568_Linux_fs/kernel/drivers/crypto/caam/
H A Dcaamalg.c336 * AES GCM encrypt shared descriptor in gcm_set_sh_desc()
401 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc()
469 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc()
1057 bool all_contig, bool encrypt) in init_aead_job() argument
1069 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job()
1070 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job()
1106 if (encrypt) in init_aead_job()
1118 bool all_contig, bool encrypt) in init_gcm_job() argument
1127 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job()
1132 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job()
[all …]
H A Dcaamalg_qi.c258 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey()
259 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey()
382 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey()
383 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey()
490 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey()
491 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey()
596 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey()
597 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey()
636 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
643 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey()
[all …]
H A Dcaamalg_qi2.c232 flc = &ctx->flc[ENCRYPT]; in aead_set_sh_desc()
246 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in aead_set_sh_desc()
347 bool encrypt) in aead_edesc_alloc() argument
378 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc()
423 (encrypt ? authsize : 0); in aead_edesc_alloc()
442 if ((alg->caam.rfc3686 && encrypt) || !alg->caam.geniv) in aead_edesc_alloc()
503 * to skip it when we authenticate or encrypt... in aead_edesc_alloc()
544 (encrypt ? ctx->authsize : (-ctx->authsize)); in aead_edesc_alloc()
596 flc = &ctx->flc[ENCRYPT]; in chachapoly_set_sh_desc()
601 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in chachapoly_set_sh_desc()
[all …]
/OK3568_Linux_fs/kernel/arch/sparc/crypto/
H A Ddes_glue.c95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument
107 if (encrypt) in __ecb_crypt()
136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument
148 if (encrypt) in __cbc_crypt()
153 if (encrypt) in __cbc_crypt()
244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument
257 if (encrypt) in __ecb3_crypt()
290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument
303 if (encrypt) in __cbc3_crypt()
309 if (encrypt) in __cbc3_crypt()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dcipher_internal.h53 /** Encrypt using ECB */
58 /** Encrypt using CBC */
65 /** Encrypt using CFB (Full length) */
72 /** Encrypt using OFB (Full length) */
80 /** Encrypt using CTR */
87 /** Encrypt or decrypt using XTS. */
94 /** Encrypt using STREAM */
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dcipher_internal.h53 /** Encrypt using ECB */
58 /** Encrypt using CBC */
65 /** Encrypt using CFB (Full length) */
72 /** Encrypt using OFB (Full length) */
80 /** Encrypt using CTR */
87 /** Encrypt or decrypt using XTS. */
94 /** Encrypt using STREAM */
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dcipher_internal.h53 /** Encrypt using ECB */
58 /** Encrypt using CBC */
65 /** Encrypt using CFB (Full length) */
72 /** Encrypt using OFB (Full length) */
80 /** Encrypt using CTR */
87 /** Encrypt or decrypt using XTS. */
94 /** Encrypt using STREAM */
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dcipher_internal.h53 /** Encrypt using ECB */
58 /** Encrypt using CBC */
65 /** Encrypt using CFB (Full length) */
72 /** Encrypt using OFB (Full length) */
80 /** Encrypt using CTR */
87 /** Encrypt or decrypt using XTS. */
94 /** Encrypt using STREAM */
H A Dchachapoly.h9 * with Associated Data (AEAD) that can be used to encrypt and
70 mbedtls_chachapoly_mode_t mode; /**< Cipher mode (encrypt or decrypt). */
87 * In order to encrypt or decrypt full messages at once, for
92 * In order to encrypt messages piecewise, for each
155 * encrypt or decrypt) then \p mode can be set to any value.
235 * \param len The length (in bytes) of the data to encrypt or decrypt.
236 * \param input The buffer containing the data to encrypt or decrypt.
286 * \param length The length (in bytes) of the data to encrypt or decrypt.
291 * \param input The buffer containing the data to encrypt or decrypt.
/OK3568_Linux_fs/kernel/drivers/crypto/rockchip/
H A Drk_crypto_v2_skcipher.c229 static int rk_cipher_crypt(struct skcipher_request *req, bool encrypt) in rk_cipher_crypt() argument
236 encrypt ? "encrypt" : "decrypt", req->cryptlen); in rk_cipher_crypt()
259 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt()
263 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt()
267 if (!encrypt) in rk_cipher_crypt()
289 ctx->is_enc = encrypt; in rk_cipher_crypt()
538 static int rk_aead_crypt(struct aead_request *req, bool encrypt) in rk_aead_crypt() argument
550 encrypt ? "encrypt" : "decrypt", in rk_aead_crypt()
553 data_len = encrypt ? req->cryptlen : (req->cryptlen - crypto_aead_authsize(tfm)); in rk_aead_crypt()
559 return rk_aead_fallback(req, ctx, encrypt); in rk_aead_crypt()
[all …]
H A Drk_crypto_v3_skcipher.c228 static int rk_cipher_crypt(struct skcipher_request *req, bool encrypt) in rk_cipher_crypt() argument
235 encrypt ? "encrypt" : "decrypt", req->cryptlen); in rk_cipher_crypt()
258 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt()
262 return rk_cipher_fallback(req, ctx, encrypt); in rk_cipher_crypt()
266 if (!encrypt) in rk_cipher_crypt()
288 ctx->is_enc = encrypt; in rk_cipher_crypt()
537 static int rk_aead_crypt(struct aead_request *req, bool encrypt) in rk_aead_crypt() argument
549 encrypt ? "encrypt" : "decrypt", in rk_aead_crypt()
552 data_len = encrypt ? req->cryptlen : (req->cryptlen - crypto_aead_authsize(tfm)); in rk_aead_crypt()
558 return rk_aead_fallback(req, ctx, encrypt); in rk_aead_crypt()
[all …]
/OK3568_Linux_fs/kernel/net/ceph/
H A Dcrypto.c150 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
218 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument
226 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt()
230 if (encrypt) in ceph_aes_crypt()
247 if (encrypt) in ceph_aes_crypt()
254 encrypt ? "en" : "de", ret); in ceph_aes_crypt()
262 if (encrypt) { in ceph_aes_crypt()
282 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument
290 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
/OK3568_Linux_fs/kernel/drivers/crypto/virtio/
H A Dvirtio_crypto_algs.c38 bool encrypt; member
66 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback()
118 int encrypt) in virtio_crypto_alg_skcipher_init_session() argument
123 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session()
191 if (encrypt) in virtio_crypto_alg_skcipher_init_session()
206 int encrypt) in virtio_crypto_alg_skcipher_close_session() argument
225 if (encrypt) in virtio_crypto_alg_skcipher_close_session()
387 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req()
441 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req()
502 vc_sym_req->encrypt = true; in virtio_crypto_skcipher_encrypt()
[all …]
/OK3568_Linux_fs/kernel/fs/crypto/
H A Dcrypto.c100 /* Encrypt or decrypt a single filesystem block of file contents */
148 * fscrypt_encrypt_pagecache_blocks() - Encrypt filesystem blocks from a
150 * @page: The locked pagecache page containing the block(s) to encrypt
151 * @len: Total size of the block(s) to encrypt. Must be a nonzero
153 * @offs: Byte offset within @page of the first block to encrypt. Must be
213 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place
215 * @page: The page containing the block to encrypt
216 * @len: Size of block to encrypt. Doesn't need to be a multiple of the
218 * @offs: Byte offset within @page at which the block to encrypt begins
223 * Encrypt a possibly-compressed filesystem block that is located in an
/OK3568_Linux_fs/kernel/drivers/crypto/ccree/
H A Dcc_cipher.c895 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process()
1013 .encrypt = cc_cipher_encrypt,
1031 .encrypt = cc_cipher_encrypt,
1049 .encrypt = cc_cipher_encrypt,
1067 .encrypt = cc_cipher_encrypt,
1085 .encrypt = cc_cipher_encrypt,
1103 .encrypt = cc_cipher_encrypt,
1121 .encrypt = cc_cipher_encrypt,
1143 .encrypt = cc_cipher_encrypt,
1160 .encrypt = cc_cipher_encrypt,
[all …]
/OK3568_Linux_fs/kernel/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback()
264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
401 .encrypt = nitrox_aes_encrypt,
420 .encrypt = nitrox_aes_encrypt,
439 .encrypt = nitrox_aes_encrypt,
458 .encrypt = nitrox_aes_encrypt,
479 .encrypt = nitrox_aes_encrypt,
496 .encrypt = nitrox_aes_encrypt,
515 .encrypt = nitrox_3des_encrypt,
534 .encrypt = nitrox_3des_encrypt,
/OK3568_Linux_fs/u-boot/arch/arm/mach-tegra/tegra20/
H A Dcrypto.c19 SECURITY_ENCRYPT = 1 << 1, /* Encrypt the data */
47 * \param num_aes_blocks Number of AES blocks to encrypt
80 /* encrypt the AES block */ in sign_object()
92 * Encrypt and sign a block of data (depending on security mode).
124 /* encrypt the data, overwriting the result in signature. */ in encrypt_and_sign()

12345678910>>...37