Home
last modified time | relevance | path

Searched full:encrypt (Results 1 – 25 of 517) sorted by relevance

12345678910>>...21

/openbmc/qemu/tests/qemu-iotests/
H A D082.out58 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
59 encrypt.cipher-mode=<str> - Name of encryption cipher mode
60 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks'
61 encrypt.hash-alg=<str> - Name of encryption hash algorithm
62 encrypt.iter-time=<num> - Time to spend in PBKDF in milliseconds
63 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
64 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
66 …encryption=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.…
84 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
[all …]
H A D18954 _make_test_img --object $SECRET0 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=…
57 IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0"
58 ….driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.key-secret=sec0,encrypt.key-s…
70 _make_test_img --object $SECRET1 -o "encrypt.format=luks,encrypt.key-secret=sec1,encrypt.iter-time=…
H A D19854 _make_test_img --object $SECRET0 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=…
57 IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0"
58 IMGSPECLAYER="driver=$IMGFMT,file.filename=$TEST_IMG,encrypt.key-secret=sec1"
59 IMGSPEC="$IMGSPECLAYER,backing.driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.…
67 _make_test_img --object $SECRET1 -o "encrypt.format=luks,encrypt.key-secret=sec1,encrypt.iter-time=…
H A D26377 _make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=1…
78 _run_test "$TEST_IMG,encrypt.key-secret=sec0"
86 _make_test_img --object $SECRET -o "encrypt.format=aes,encrypt.key-secret=sec0,cluster_size=64K" $s…
87 _run_test "$TEST_IMG,encrypt.key-secret=sec0"
H A D18851 _make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=1…
53 IMGSPEC="driver=$IMGFMT,encrypt.key-secret=sec0,file.filename=$TEST_IMG"
86 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=10,preallocation=metadata" \
H A D15851 _make_test_img --object $SECRET -o "encryption=on,encrypt.key-secret=sec0" $size
54 IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0"
55 ….driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.key-secret=sec0,encrypt.key-s…
67 _make_test_img -u --object $SECRET -o "encryption=on,encrypt.key-secret=sec0" -b "$TEST_IMG_BASE" -…
H A D087139 _make_test_img --object secret,id=sec0,data=123456 -o encryption=on,encrypt.key-secret=sec0 $size
157 "encrypt": {
170 _make_test_img --object secret,id=sec0,data=123456 -o encrypt.format=luks,encrypt.key-secret=sec0 $…
188 "encrypt": {
201 _make_test_img --object secret,id=sec0,data=123456 -o encryption=on,encrypt.key-secret=sec0 $size
H A D28457 TEST_IMG="$TEST_IMG,encrypt.key-secret=sec0"
90 …_make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=…
/openbmc/linux/crypto/
H A Dtcrypt.c49 #define ENCRYPT 1 macro
156 if (enc == ENCRYPT) in do_mult_aead_op()
268 if (enc == ENCRYPT) in test_mb_aead_speed()
549 if (enc == ENCRYPT) in test_aead_speed()
973 if (enc == ENCRYPT) in do_mult_acipher_op()
1073 if (enc == ENCRYPT) in test_mb_skcipher_speed()
1306 if (enc == ENCRYPT) in test_skcipher_speed()
1859 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1863 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1867 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test()
[all …]
/openbmc/linux/drivers/crypto/
H A Dpadlock-aes.c66 struct cword encrypt; member
134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
144 ctx->cword.encrypt.keygen = 1; in aes_set_key()
155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key()
310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt()
311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt()
312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt()
[all …]
/openbmc/linux/drivers/crypto/caam/
H A Dcaamalg.c345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc()
410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc()
478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc()
1073 bool all_contig, bool encrypt) in init_aead_job() argument
1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job()
1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job()
1122 if (encrypt) in init_aead_job()
1134 bool all_contig, bool encrypt) in init_gcm_job() argument
1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job()
1148 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job()
[all …]
H A Dcaamalg_qi.c263 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey()
264 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey()
387 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey()
388 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey()
495 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey()
496 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey()
601 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey()
602 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey()
641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
648 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey()
[all …]
/openbmc/linux/arch/sparc/crypto/
H A Ddes_glue.c95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument
107 if (encrypt) in __ecb_crypt()
136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument
148 if (encrypt) in __cbc_crypt()
153 if (encrypt) in __cbc_crypt()
244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument
257 if (encrypt) in __ecb3_crypt()
290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument
303 if (encrypt) in __cbc3_crypt()
309 if (encrypt) in __cbc3_crypt()
[all …]
/openbmc/qemu/crypto/
H A Dcipher-nettle.c.inc80 #define DEFINE_ECB(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
88 ENCRYPT(&ctx->key, len, out, in); \
109 #define DEFINE_CBC(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
117 cbc_encrypt(&ctx->key, ENCRYPT, BLEN, ctx->iv, len, out, in); \
138 #define DEFINE_CTR(NAME, TYPE, BLEN, ENCRYPT) \
146 ctr_crypt(&ctx->key, ENCRYPT, BLEN, ctx->iv, len, out, in); \
158 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
162 ENCRYPT((const void *)ctx, length, dst, src); \
194 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
202 xts_encrypt_message(&ctx->key, &ctx->key_xts, ENCRYPT, \
[all …]
/openbmc/linux/drivers/crypto/intel/ixp4xx/
H A Dixp4xx_crypto.c153 bool encrypt; member
163 int encrypt; member
179 struct ix_sa_dir encrypt; member
359 if (req_ctx->encrypt) { in finish_scattered_hmac()
399 if (req_ctx->encrypt) { in one_packet()
620 ret = init_sa_dir(&ctx->encrypt); in init_tfm()
625 free_sa_dir(&ctx->encrypt); in init_tfm()
662 free_sa_dir(&ctx->encrypt); in exit_tfm()
736 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, in setup_auth() argument
747 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; in setup_auth()
[all …]
/openbmc/linux/tools/perf/pmu-events/arch/s390/cf_z16/
H A Dpai_crypto.json1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY",
1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function"
1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY",
1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function"
1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY",
1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function"
1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY",
1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function"
1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY",
1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function"
[all …]
/openbmc/qemu/docs/system/
H A Dqemu-block-drivers.rst.inc63 This option is deprecated and equivalent to ``encrypt.format=aes``
65 .. option:: encrypt.format
69 use to unlock the LUKS key slot is given by the ``encrypt.key-secret``
71 ``encrypt.*`` parameters.
74 The encryption key is given by the ``encrypt.key-secret`` parameter.
94 .. option:: encrypt.key-secret
97 (``encrypt.format=luks``) or encryption key (``encrypt.format=aes``).
99 .. option:: encrypt.cipher-alg
102 to ``aes-256``. Only used when ``encrypt.format=luks``.
104 .. option:: encrypt.cipher-mode
[all …]
/openbmc/linux/net/ceph/
H A Dcrypto.c151 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
219 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument
227 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt()
231 if (encrypt) in ceph_aes_crypt()
248 if (encrypt) in ceph_aes_crypt()
255 encrypt ? "en" : "de", ret); in ceph_aes_crypt()
263 if (encrypt) { in ceph_aes_crypt()
283 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument
291 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
/openbmc/qemu/block/
H A Drbd.c394 RbdEncryptionCreateOptions *encrypt, in qemu_rbd_encryption_format() argument
412 switch (encrypt->format) { in qemu_rbd_encryption_format()
419 qapi_RbdEncryptionCreateOptionsLUKS_base(&encrypt->u.luks), in qemu_rbd_encryption_format()
435 &encrypt->u.luks2), in qemu_rbd_encryption_format()
448 encrypt->format); in qemu_rbd_encryption_format()
475 RbdEncryptionOptions *encrypt, in qemu_rbd_encryption_load() argument
489 switch (encrypt->format) { in qemu_rbd_encryption_load()
496 qapi_RbdEncryptionOptionsLUKS_base(&encrypt->u.luks), in qemu_rbd_encryption_load()
510 qapi_RbdEncryptionOptionsLUKS2_base(&encrypt->u.luks2), in qemu_rbd_encryption_load()
525 qapi_RbdEncryptionOptionsLUKSAny_base(&encrypt->u.luks_any), in qemu_rbd_encryption_load()
[all …]
/openbmc/u-boot/arch/arm/mach-tegra/tegra20/
H A Dcrypto.c18 SECURITY_ENCRYPT = 1 << 1, /* Encrypt the data */
46 * \param num_aes_blocks Number of AES blocks to encrypt
80 /* encrypt the AES block */ in sign_object()
92 * Encrypt and sign a block of data (depending on security mode).
126 /* encrypt the data, overwriting the result in signature. */ in encrypt_and_sign()
/openbmc/linux/drivers/crypto/virtio/
H A Dvirtio_crypto_skcipher_algs.c35 bool encrypt; member
63 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback()
115 int encrypt) in virtio_crypto_alg_skcipher_init_session() argument
119 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session()
180 if (encrypt) in virtio_crypto_alg_skcipher_init_session()
194 int encrypt) in virtio_crypto_alg_skcipher_close_session() argument
219 if (encrypt) in virtio_crypto_alg_skcipher_close_session()
371 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req()
425 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req()
486 vc_sym_req->encrypt = true; in virtio_crypto_skcipher_encrypt()
[all …]
/openbmc/linux/fs/crypto/
H A Dcrypto.c100 /* Encrypt or decrypt a single filesystem block of file contents */
148 * fscrypt_encrypt_pagecache_blocks() - Encrypt filesystem blocks from a
150 * @page: The locked pagecache page containing the block(s) to encrypt
151 * @len: Total size of the block(s) to encrypt. Must be a nonzero
153 * @offs: Byte offset within @page of the first block to encrypt. Must be
213 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place
215 * @page: The page containing the block to encrypt
216 * @len: Size of block to encrypt. This must be a multiple of
218 * @offs: Byte offset within @page at which the block to encrypt begins
223 * Encrypt a possibly-compressed filesystem block that is located in an
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-rsa_4.9.bb12 pyrsa-encrypt \
20 ALTERNATIVE_LINK_NAME[pyrsa-encrypt] = "${bindir}/pyrsa-encrypt"
/openbmc/u-boot/include/
H A Duboot_aes.h45 * aes_encrypt() - Encrypt single block of data with AES 128
74 * aes_cbc_encrypt_blocks() - Encrypt multiple blocks of data with AES CBC.
78 * @src Source data to encrypt
80 * @num_aes_blocks Number of AES blocks to encrypt
/openbmc/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback()
264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
399 .encrypt = nitrox_aes_encrypt,
418 .encrypt = nitrox_aes_encrypt,
437 .encrypt = nitrox_aes_encrypt,
456 .encrypt = nitrox_aes_encrypt,
477 .encrypt = nitrox_aes_encrypt,
494 .encrypt = nitrox_aes_encrypt,
513 .encrypt = nitrox_3des_encrypt,
532 .encrypt = nitrox_3des_encrypt,

12345678910>>...21