/openbmc/qemu/tests/qemu-iotests/ |
H A D | 082.out | 58 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm 59 encrypt.cipher-mode=<str> - Name of encryption cipher mode 60 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 61 encrypt.hash-alg=<str> - Name of encryption hash algorithm 62 encrypt.iter-time=<num> - Time to spend in PBKDF in milliseconds 63 encrypt.ivgen-alg=<str> - Name of IV generator algorithm 64 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm 65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 66 …encryption=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.… 84 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm [all …]
|
H A D | 189 | 54 _make_test_img --object $SECRET0 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=… 57 IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0" 58 ….driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.key-secret=sec0,encrypt.key-s… 70 _make_test_img --object $SECRET1 -o "encrypt.format=luks,encrypt.key-secret=sec1,encrypt.iter-time=…
|
H A D | 198 | 54 _make_test_img --object $SECRET0 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=… 57 IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0" 58 IMGSPECLAYER="driver=$IMGFMT,file.filename=$TEST_IMG,encrypt.key-secret=sec1" 59 IMGSPEC="$IMGSPECLAYER,backing.driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.… 67 _make_test_img --object $SECRET1 -o "encrypt.format=luks,encrypt.key-secret=sec1,encrypt.iter-time=…
|
H A D | 263 | 77 _make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=1… 78 _run_test "$TEST_IMG,encrypt.key-secret=sec0" 86 _make_test_img --object $SECRET -o "encrypt.format=aes,encrypt.key-secret=sec0,cluster_size=64K" $s… 87 _run_test "$TEST_IMG,encrypt.key-secret=sec0"
|
H A D | 188 | 51 _make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=1… 53 IMGSPEC="driver=$IMGFMT,encrypt.key-secret=sec0,file.filename=$TEST_IMG" 86 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=10,preallocation=metadata" \
|
H A D | 158 | 51 _make_test_img --object $SECRET -o "encryption=on,encrypt.key-secret=sec0" $size 54 IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0" 55 ….driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.key-secret=sec0,encrypt.key-s… 67 _make_test_img -u --object $SECRET -o "encryption=on,encrypt.key-secret=sec0" -b "$TEST_IMG_BASE" -…
|
H A D | 087 | 139 _make_test_img --object secret,id=sec0,data=123456 -o encryption=on,encrypt.key-secret=sec0 $size 157 "encrypt": { 170 _make_test_img --object secret,id=sec0,data=123456 -o encrypt.format=luks,encrypt.key-secret=sec0 $… 188 "encrypt": { 201 _make_test_img --object secret,id=sec0,data=123456 -o encryption=on,encrypt.key-secret=sec0 $size
|
H A D | 284 | 57 TEST_IMG="$TEST_IMG,encrypt.key-secret=sec0" 90 …_make_test_img --object $SECRET -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=…
|
/openbmc/linux/crypto/ |
H A D | tcrypt.c | 49 #define ENCRYPT 1 macro 156 if (enc == ENCRYPT) in do_mult_aead_op() 268 if (enc == ENCRYPT) in test_mb_aead_speed() 549 if (enc == ENCRYPT) in test_aead_speed() 973 if (enc == ENCRYPT) in do_mult_acipher_op() 1073 if (enc == ENCRYPT) in test_mb_skcipher_speed() 1306 if (enc == ENCRYPT) in test_skcipher_speed() 1859 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1863 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1867 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test() [all …]
|
/openbmc/linux/drivers/crypto/ |
H A D | padlock-aes.c | 66 struct cword encrypt; member 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 144 ctx->cword.encrypt.keygen = 1; in aes_set_key() 155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key() 310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt() 311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt() 312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt() [all …]
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | caamalg.c | 345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc() 410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc() 478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc() 1073 bool all_contig, bool encrypt) in init_aead_job() argument 1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job() 1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job() 1122 if (encrypt) in init_aead_job() 1134 bool all_contig, bool encrypt) in init_gcm_job() argument 1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job() 1148 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job() [all …]
|
H A D | caamalg_qi.c | 263 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey() 264 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey() 387 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey() 388 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey() 495 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey() 496 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey() 601 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey() 602 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey() 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 648 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey() [all …]
|
/openbmc/linux/arch/sparc/crypto/ |
H A D | des_glue.c | 95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument 107 if (encrypt) in __ecb_crypt() 136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument 148 if (encrypt) in __cbc_crypt() 153 if (encrypt) in __cbc_crypt() 244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument 257 if (encrypt) in __ecb3_crypt() 290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument 303 if (encrypt) in __cbc3_crypt() 309 if (encrypt) in __cbc3_crypt() [all …]
|
/openbmc/qemu/crypto/ |
H A D | cipher-nettle.c.inc | 80 #define DEFINE_ECB(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 88 ENCRYPT(&ctx->key, len, out, in); \ 109 #define DEFINE_CBC(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 117 cbc_encrypt(&ctx->key, ENCRYPT, BLEN, ctx->iv, len, out, in); \ 138 #define DEFINE_CTR(NAME, TYPE, BLEN, ENCRYPT) \ 146 ctr_crypt(&ctx->key, ENCRYPT, BLEN, ctx->iv, len, out, in); \ 158 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 162 ENCRYPT((const void *)ctx, length, dst, src); \ 194 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 202 xts_encrypt_message(&ctx->key, &ctx->key_xts, ENCRYPT, \ [all …]
|
/openbmc/linux/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 153 bool encrypt; member 163 int encrypt; member 179 struct ix_sa_dir encrypt; member 359 if (req_ctx->encrypt) { in finish_scattered_hmac() 399 if (req_ctx->encrypt) { in one_packet() 620 ret = init_sa_dir(&ctx->encrypt); in init_tfm() 625 free_sa_dir(&ctx->encrypt); in init_tfm() 662 free_sa_dir(&ctx->encrypt); in exit_tfm() 736 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, in setup_auth() argument 747 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; in setup_auth() [all …]
|
/openbmc/linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
H A D | pai_crypto.json | 1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY", 1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function" 1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY", 1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function" 1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY", 1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function" 1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY", 1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function" 1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY", 1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function" [all …]
|
/openbmc/qemu/docs/system/ |
H A D | qemu-block-drivers.rst.inc | 63 This option is deprecated and equivalent to ``encrypt.format=aes`` 65 .. option:: encrypt.format 69 use to unlock the LUKS key slot is given by the ``encrypt.key-secret`` 71 ``encrypt.*`` parameters. 74 The encryption key is given by the ``encrypt.key-secret`` parameter. 94 .. option:: encrypt.key-secret 97 (``encrypt.format=luks``) or encryption key (``encrypt.format=aes``). 99 .. option:: encrypt.cipher-alg 102 to ``aes-256``. Only used when ``encrypt.format=luks``. 104 .. option:: encrypt.cipher-mode [all …]
|
/openbmc/linux/net/ceph/ |
H A D | crypto.c | 151 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt 219 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument 227 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 231 if (encrypt) in ceph_aes_crypt() 248 if (encrypt) in ceph_aes_crypt() 255 encrypt ? "en" : "de", ret); in ceph_aes_crypt() 263 if (encrypt) { in ceph_aes_crypt() 283 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument 291 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
|
/openbmc/qemu/block/ |
H A D | rbd.c | 394 RbdEncryptionCreateOptions *encrypt, in qemu_rbd_encryption_format() argument 412 switch (encrypt->format) { in qemu_rbd_encryption_format() 419 qapi_RbdEncryptionCreateOptionsLUKS_base(&encrypt->u.luks), in qemu_rbd_encryption_format() 435 &encrypt->u.luks2), in qemu_rbd_encryption_format() 448 encrypt->format); in qemu_rbd_encryption_format() 475 RbdEncryptionOptions *encrypt, in qemu_rbd_encryption_load() argument 489 switch (encrypt->format) { in qemu_rbd_encryption_load() 496 qapi_RbdEncryptionOptionsLUKS_base(&encrypt->u.luks), in qemu_rbd_encryption_load() 510 qapi_RbdEncryptionOptionsLUKS2_base(&encrypt->u.luks2), in qemu_rbd_encryption_load() 525 qapi_RbdEncryptionOptionsLUKSAny_base(&encrypt->u.luks_any), in qemu_rbd_encryption_load() [all …]
|
/openbmc/u-boot/arch/arm/mach-tegra/tegra20/ |
H A D | crypto.c | 18 SECURITY_ENCRYPT = 1 << 1, /* Encrypt the data */ 46 * \param num_aes_blocks Number of AES blocks to encrypt 80 /* encrypt the AES block */ in sign_object() 92 * Encrypt and sign a block of data (depending on security mode). 126 /* encrypt the data, overwriting the result in signature. */ in encrypt_and_sign()
|
/openbmc/linux/drivers/crypto/virtio/ |
H A D | virtio_crypto_skcipher_algs.c | 35 bool encrypt; member 63 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback() 115 int encrypt) in virtio_crypto_alg_skcipher_init_session() argument 119 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session() 180 if (encrypt) in virtio_crypto_alg_skcipher_init_session() 194 int encrypt) in virtio_crypto_alg_skcipher_close_session() argument 219 if (encrypt) in virtio_crypto_alg_skcipher_close_session() 371 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req() 425 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req() 486 vc_sym_req->encrypt = true; in virtio_crypto_skcipher_encrypt() [all …]
|
/openbmc/linux/fs/crypto/ |
H A D | crypto.c | 100 /* Encrypt or decrypt a single filesystem block of file contents */ 148 * fscrypt_encrypt_pagecache_blocks() - Encrypt filesystem blocks from a 150 * @page: The locked pagecache page containing the block(s) to encrypt 151 * @len: Total size of the block(s) to encrypt. Must be a nonzero 153 * @offs: Byte offset within @page of the first block to encrypt. Must be 213 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place 215 * @page: The page containing the block to encrypt 216 * @len: Size of block to encrypt. This must be a multiple of 218 * @offs: Byte offset within @page at which the block to encrypt begins 223 * Encrypt a possibly-compressed filesystem block that is located in an
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-rsa_4.9.bb | 12 pyrsa-encrypt \ 20 ALTERNATIVE_LINK_NAME[pyrsa-encrypt] = "${bindir}/pyrsa-encrypt"
|
/openbmc/u-boot/include/ |
H A D | uboot_aes.h | 45 * aes_encrypt() - Encrypt single block of data with AES 128 74 * aes_cbc_encrypt_blocks() - Encrypt multiple blocks of data with AES CBC. 78 * @src Source data to encrypt 80 * @num_aes_blocks Number of AES blocks to encrypt
|
/openbmc/linux/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_skcipher.c | 92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback() 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 399 .encrypt = nitrox_aes_encrypt, 418 .encrypt = nitrox_aes_encrypt, 437 .encrypt = nitrox_aes_encrypt, 456 .encrypt = nitrox_aes_encrypt, 477 .encrypt = nitrox_aes_encrypt, 494 .encrypt = nitrox_aes_encrypt, 513 .encrypt = nitrox_3des_encrypt, 532 .encrypt = nitrox_3des_encrypt,
|