| /linux/drivers/crypto/ccree/ |
| H A D | cc_aead.h | 20 /* defines for AES GCM configuration buffer */ 49 * Used for both: digest HW compare and CCM/GCM MAC value 54 //used in gcm 75 //used in gcm 76 /* buffer for internal gcm configurations */ 78 /* buffer for internal gcm configurations */ 81 dma_addr_t gcm_block_len_dma_addr; /* Phys. address of gcm block len */
|
| /linux/lib/crypto/ |
| H A D | aesgcm.c | 3 * Minimal library implementation of GCM 9 #include <crypto/gcm.h> 21 * In AES-GCM, both the GHASH key derivation and the CTR mode in aesgcm_encrypt_block() 34 * aesgcm_expandkey - Expands the AES and GHASH keys for the AES-GCM key 37 * @ctx: The data structure that will hold the AES-GCM key schedule 40 * @authsize: The size in bytes of the GCM authentication tag 43 * that are not permitted by the GCM specification. 76 * aesgcm_mac - Generates the authentication tag using AES-GCM algorithm. 77 * @ctx: The data structure that will hold the AES-GCM key schedule 85 * It takes in the AES-GCM contex [all...] |
| /linux/tools/testing/selftests/net/ |
| H A D | l2tp.sh | 246 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 251 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 256 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 261 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 285 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 290 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 295 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 300 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-ce-gcm-glue.c | 3 * SM4-GCM AEAD Algorithm using ARMv8 Crypto Extensions 221 .cra_name = "gcm(sm4)", 222 .cra_driver_name = "gcm-sm4-ce", 259 MODULE_DESCRIPTION("Synchronous SM4 in GCM mode using ARMv8 Crypto Extensions"); 260 MODULE_ALIAS_CRYPTO("gcm(sm4)");
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 216 "BriefDescription": "KMA GCM AES 128", 217 "PublicDescription": "KMA-GCM-AES-128 function ending with CC=0" 223 "BriefDescription": "KMA GCM AES 192", 224 "PublicDescription": "KMA-GCM-AES-192 function ending with CC=0" 230 "BriefDescription": "KMA GCM AES 256", 231 "PublicDescription": "KMA-GCM-AES-256 function ending with CC=0" 237 "BriefDescription": "KMA GCM ENCRYPTED AES 128", 238 "PublicDescription": "KMA-GCM-Encrypted-AES-128 function ending with CC=0" 244 "BriefDescription": "KMA GCM ENCRYPTED AES 192", 245 "PublicDescription": "KMA-GCM-Encrypted-AES-192 function ending with CC=0" [all …]
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 9 #include <crypto/gcm.h> 33 * encrypt the trusted key payload using AES-128-GCM. 50 * @payload: The payload itself, encrypted using AES-128-GCM and @blob_key, 51 * GCM auth tag of size DCP_BLOB_AUTHLEN is attached at the end of it. 138 aead = crypto_alloc_aead("gcm(aes)", 0, CRYPTO_ALG_ASYNC); in do_aead_crypto()
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-galois.c | 3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 19 #include <crypto/gcm.h> 200 .name = "gcm(aes)", 201 .driver_name = "gcm-aes-ccp",
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 216 "BriefDescription": "KMA GCM AES 128", 217 "PublicDescription": "KMA-GCM-AES-128 function ending with CC=0" 223 "BriefDescription": "KMA GCM AES 192", 224 "PublicDescription": "KMA-GCM-AES-192 function ending with CC=0" 230 "BriefDescription": "KMA GCM AES 256", 231 "PublicDescription": "KMA-GCM-AES-256 function ending with CC=0" 237 "BriefDescription": "KMA GCM ENCRYPTED AES 128", 238 "PublicDescription": "KMA-GCM-Encrypted-AES-128 function ending with CC=0" 244 "BriefDescription": "KMA GCM ENCRYPTED AES 192", 245 "PublicDescription": "KMA-GCM-Encrypted-AES-192 function ending with CC=0" [all …]
|
| /linux/crypto/ |
| H A D | tcrypt.c | 12 * Updated RFC4106 AES-GCM testing. 1618 ret = min(ret, tcrypt_test("gcm(aes)")); in do_test() 1686 ret = min(ret, tcrypt_test("gcm(sm4)")); in do_test() 1694 ret = min(ret, tcrypt_test("gcm(aria)")); in do_test() 1758 ret = min(ret, tcrypt_test("rfc4106(gcm(aes))")); in do_test() 1762 ret = min(ret, tcrypt_test("rfc4543(gcm(aes))")); in do_test() 2028 test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec, in do_test() 2030 test_aead_speed("gcm(aes)", ENCRYPT, sec, in do_test() 2032 test_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec, in do_test() 2034 test_aead_speed("gcm(aes)", DECRYPT, sec, in do_test() [all …]
|
| H A D | Kconfig | 792 tristate "GCM (Galois/Counter Mode) and GMAC (GCM MAC)" 798 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC 799 (GCM Message Authentication Code) (NIST SP800-38D) 894 GCM GHASH function (NIST SP800-38D)
|
| H A D | gcm.c | 3 * GCM: Galois/Counter Mode. 13 #include <crypto/gcm.h> 616 "gcm(%s", ctr->base.cra_name + 4) >= CRYPTO_MAX_ALG_NAME) in crypto_gcm_create_common() 1083 .name = "gcm", 1131 MODULE_ALIAS_CRYPTO("gcm");
|
| /linux/drivers/crypto/intel/keembay/ |
| H A D | Kconfig | 13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4) 14 and gcm(sm4).
|
| /linux/drivers/crypto/bcm/ |
| H A D | spu.h | 142 u8 aad_pad_len; /* For AES GCM/CCM, length of padding after AAD */ 143 u8 data_pad_len;/* For AES GCM/CCM, length of padding after data */ 160 /* GCM and CCM require 16-byte alignment */
|
| H A D | cipher.h | 18 #include <crypto/gcm.h> 41 /* size of salt value for AES-GCM-ESP and AES-CCM-ESP */ 166 /* SPU response pad for GCM data */ 169 /* SPU request msg padding for GCM AAD */
|
| /linux/net/xfrm/ |
| H A D | xfrm_algo.c | 29 .name = "rfc4106(gcm(aes))", 48 .name = "rfc4106(gcm(aes))", 67 .name = "rfc4106(gcm(aes))", 143 .name = "rfc4543(gcm(aes))",
|
| /linux/tools/crypto/tcrypt/ |
| H A D | tcrypt_speed_compare.py | 33 modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3 40 modprobe tcrypt alg="pcrypt(rfc4106(gcm(aes)))" type=3
|
| /linux/drivers/crypto/nx/ |
| H A D | Makefile | 6 nx-aes-gcm.o \
|
| /linux/net/mac80211/ |
| H A D | aes_gcm.h | 34 return aead_key_setup_encrypt("gcm(aes)", key, in ieee80211_aes_gcm_key_setup_encrypt()
|
| H A D | aes_gmac.c | 77 tfm = crypto_alloc_aead("gcm(aes)", 0, CRYPTO_ALG_ASYNC); in ieee80211_aes_gmac_key_setup()
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | nvidia,tegra234-se-aes.yaml | 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
|
| /linux/drivers/crypto/caam/ |
| H A D | pdb.h | 108 * ipsec_encap_gcm - PDB part for IPsec GCM encapsulation 143 struct ipsec_encap_gcm gcm; member 209 struct ipsec_decap_gcm gcm; member
|
| H A D | compat.h | 36 #include <crypto/gcm.h>
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_aead.c | 12 #include <crypto/gcm.h> 521 .cra_name = "gcm(aes)", 540 .cra_name = "rfc4106(gcm(aes))",
|
| /linux/net/tipc/ |
| H A D | Kconfig | 49 advanced algorithm: AEAD AES-GCM (like IPSec or TLS) before leaving/
|
| /linux/drivers/net/wan/framer/pef2256/ |
| H A D | pef2256.c | 173 const u8 *gcm; in pef2256_setup_gcm() local 204 gcm = pef2256_gcm_configs[item].gcm_12; in pef2256_setup_gcm() 207 gcm = pef2256_gcm_configs[item].gcm_2x; in pef2256_setup_gcm() 212 pef2256_write8(pef2256, PEF2256_GCM(i + 1), *(gcm + i)); in pef2256_setup_gcm()
|