| /linux/drivers/crypto/ccree/ |
| H A D | cc_aead.h | 20 /* defines for AES GCM configuration buffer */ 49 * Used for both: digest HW compare and CCM/GCM MAC value 54 //used in gcm 75 //used in gcm 76 /* buffer for internal gcm configurations */ 78 /* buffer for internal gcm configurations */ 81 dma_addr_t gcm_block_len_dma_addr; /* Phys. address of gcm block len */
|
| /linux/arch/powerpc/crypto/ |
| H A D | Makefile | 9 obj-$(CONFIG_CRYPTO_AES_GCM_P10) += aes-gcm-p10-crypto.o 13 aes-gcm-p10-crypto-y := aes-gcm-p10-glue.o aes-gcm-p10.o ghashp10-ppc.o aesp10-ppc.o
|
| H A D | Kconfig | 28 tristate "Stitched AES/GCM acceleration support on P10 or later CPU (PPC)" 37 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D) 43 later CPU. This module supports stitched acceleration for AES/GCM.
|
| /linux/lib/crypto/ |
| H A D | aesgcm.c | 3 * Minimal library implementation of GCM 9 #include <crypto/gcm.h> 21 * In AES-GCM, both the GHASH key derivation and the CTR mode in aesgcm_encrypt_block() 34 * aesgcm_expandkey - Expands the AES and GHASH keys for the AES-GCM key 37 * @ctx: The data structure that will hold the AES-GCM key schedule 40 * @authsize: The size in bytes of the GCM authentication tag 43 * that are not permitted by the GCM specification. 76 * aesgcm_mac - Generates the authentication tag using AES-GCM algorithm. 77 * @ctx: The data structure that will hold the AES-GCM key schedule 85 * It takes in the AES-GCM context, source data, associated data, counter value, [all …]
|
| /linux/arch/arm64/crypto/ |
| H A D | Makefile | 23 obj-$(CONFIG_CRYPTO_SM4_ARM64_CE_GCM) += sm4-ce-gcm.o 24 sm4-ce-gcm-y := sm4-ce-gcm-glue.o sm4-ce-gcm-core.o
|
| H A D | sm4-ce-gcm-glue.c | 3 * SM4-GCM AEAD Algorithm using ARMv8 Crypto Extensions 221 .cra_name = "gcm(sm4)", 222 .cra_driver_name = "gcm-sm4-ce", 259 MODULE_DESCRIPTION("Synchronous SM4 in GCM mode using ARMv8 Crypto Extensions"); 260 MODULE_ALIAS_CRYPTO("gcm(sm4)");
|
| H A D | ghash-ce-glue.c | 10 #include <crypto/gcm.h> 26 MODULE_DESCRIPTION("GHASH and AES-GCM using ARMv8 Crypto Extensions"); 494 .base.cra_name = "gcm(aes)", 495 .base.cra_driver_name = "gcm-aes-ce", 510 .base.cra_name = "rfc4106(gcm(aes))", 511 .base.cra_driver_name = "rfc4106-gcm-aes-ce",
|
| H A D | Kconfig | 13 GCM GHASH function (NIST SP800-38D) 207 tristate "AEAD cipher: SM4 in GCM mode (ARMv8 Crypto Extensions)" 215 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /linux/arch/s390/crypto/ |
| H A D | Kconfig | 9 GCM GHASH hash function (NIST SP800-38D) 16 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM" 21 AEAD cipher: AES with GCM
|
| /linux/tools/testing/selftests/net/ |
| H A D | l2tp.sh | 246 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 251 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 256 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 261 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 285 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 290 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 295 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 300 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 216 "BriefDescription": "KMA GCM AES 128", 217 "PublicDescription": "KMA-GCM-AES-128 function ending with CC=0" 223 "BriefDescription": "KMA GCM AES 192", 224 "PublicDescription": "KMA-GCM-AES-192 function ending with CC=0" 230 "BriefDescription": "KMA GCM AES 256", 231 "PublicDescription": "KMA-GCM-AES-256 function ending with CC=0" 237 "BriefDescription": "KMA GCM ENCRYPTED AES 128", 238 "PublicDescription": "KMA-GCM-Encrypted-AES-128 function ending with CC=0" 244 "BriefDescription": "KMA GCM ENCRYPTED AES 192", 245 "PublicDescription": "KMA-GCM-Encrypted-AES-192 function ending with CC=0" [all …]
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 9 #include <crypto/gcm.h> 33 * encrypt the trusted key payload using AES-128-GCM. 50 * @payload: The payload itself, encrypted using AES-128-GCM and @blob_key, 51 * GCM auth tag of size DCP_BLOB_AUTHLEN is attached at the end of it. 138 aead = crypto_alloc_aead("gcm(aes)", 0, CRYPTO_ALG_ASYNC); in do_aead_crypto()
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | xlnx,zynqmp-aes.yaml | 7 title: Xilinx ZynqMP AES-GCM Hardware Accelerator 14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-galois.c | 3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 19 #include <crypto/gcm.h> 200 .name = "gcm(aes)", 201 .driver_name = "gcm-aes-ccp",
|
| /linux/arch/x86/crypto/ |
| H A D | aesni-intel_glue.c | 9 * Added RFC4106 AES-GCM support for 128-bit keys under the AEAD 27 #include <crypto/gcm.h> 833 /* The common part of the x86_64 AES-GCM key struct */ 842 /* Key struct used by the AES-NI implementations of AES-GCM */ 876 /* Key struct used by the VAES + AVX2 implementation of AES-GCM */ 906 /* Key struct used by the VAES + AVX512 implementation of AES-GCM */ 933 * These flags are passed to the AES-GCM helper functions to specify the 934 * specific version of AES-GCM (RFC4106 or not), whether it's encryption or 1212 * This is the setkey function for the x86_64 implementations of AES-GCM. It 1427 * Since the AES-GCM assembly code requires that at least three assembly in gcm_crypt() [all …]
|
| H A D | Makefile | 48 aes-gcm-aesni-x86_64.o \ 49 aes-gcm-vaes-avx2.o \ 50 aes-gcm-vaes-avx512.o \
|
| H A D | Kconfig | 6 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XCTR, XTS, GCM (AES-NI/VAES)" 14 AEAD cipher: AES with GCM 374 GCM GHASH hash function (NIST SP800-38D)
|
| H A D | aes-gcm-aesni-x86_64.S | 3 // AES-NI optimized AES-GCM for x86_64 51 // This file implements AES-GCM (Galois/Counter Mode) for x86_64 CPUs that 64 // The design generally follows that of aes-gcm-vaes-avx512.S, and that file is 521 // from the GCM spec) or equivalently x^1 (using the alternative, 566 // This function processes the AAD (Additional Authenticated Data) in GCM. 664 // This macro generates a GCM encryption or decryption update function with the 681 // 32-bit word of the counter is incremented, following the GCM standard. 988 // which one). Both functions finish computing the GCM authentication tag by
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 216 "BriefDescription": "KMA GCM AES 128", 217 "PublicDescription": "KMA-GCM-AES-128 function ending with CC=0" 223 "BriefDescription": "KMA GCM AES 192", 224 "PublicDescription": "KMA-GCM-AES-192 function ending with CC=0" 230 "BriefDescription": "KMA GCM AES 256", 231 "PublicDescription": "KMA-GCM-AES-256 function ending with CC=0" 237 "BriefDescription": "KMA GCM ENCRYPTED AES 128", 238 "PublicDescription": "KMA-GCM-Encrypted-AES-128 function ending with CC=0" 244 "BriefDescription": "KMA GCM ENCRYPTED AES 192", 245 "PublicDescription": "KMA-GCM-Encrypted-AES-192 function ending with CC=0" [all …]
|
| /linux/drivers/crypto/intel/keembay/ |
| H A D | Kconfig | 13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4) 14 and gcm(sm4).
|
| /linux/crypto/ |
| H A D | tcrypt.c | 12 * Updated RFC4106 AES-GCM testing. 1618 ret = min(ret, tcrypt_test("gcm(aes)")); in do_test() 1686 ret = min(ret, tcrypt_test("gcm(sm4)")); in do_test() 1694 ret = min(ret, tcrypt_test("gcm(aria)")); in do_test() 1758 ret = min(ret, tcrypt_test("rfc4106(gcm(aes))")); in do_test() 1762 ret = min(ret, tcrypt_test("rfc4543(gcm(aes))")); in do_test() 2028 test_aead_speed("rfc4106(gcm(aes))", ENCRYPT, sec, in do_test() 2030 test_aead_speed("gcm(aes)", ENCRYPT, sec, in do_test() 2032 test_aead_speed("rfc4106(gcm(aes))", DECRYPT, sec, in do_test() 2034 test_aead_speed("gcm(aes)", DECRYPT, sec, in do_test() [all …]
|
| /linux/drivers/crypto/bcm/ |
| H A D | spu.h | 142 u8 aad_pad_len; /* For AES GCM/CCM, length of padding after AAD */ 143 u8 data_pad_len;/* For AES GCM/CCM, length of padding after data */ 160 /* GCM and CCM require 16-byte alignment */
|
| H A D | cipher.h | 18 #include <crypto/gcm.h> 41 /* size of salt value for AES-GCM-ESP and AES-CCM-ESP */ 166 /* SPU response pad for GCM data */ 169 /* SPU request msg padding for GCM AAD */
|
| /linux/arch/arm/crypto/ |
| H A D | Kconfig | 14 GCM GHASH function (NIST SP800-38D) 21 Use an implementation of GHASH (used by the GCM AEAD chaining mode)
|
| /linux/net/xfrm/ |
| H A D | xfrm_algo.c | 29 .name = "rfc4106(gcm(aes))", 48 .name = "rfc4106(gcm(aes))", 67 .name = "rfc4106(gcm(aes))", 143 .name = "rfc4543(gcm(aes))",
|