/linux/arch/arm64/crypto/ |
H A D | Kconfig | 13 GCM GHASH function (NIST SP800-38D) 162 - ECB (Electronic Codebook) mode (NIST SP800-38A) 163 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 164 - CTR (Counter) mode (NIST SP800-38A) 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 179 - ECB (Electronic Codebook) mode (NIST SP800-38A) 180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 181 - CTR (Counter) mode (NIST SP800-38A) 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 210 - ECB (Electronic Codebook) mode (NIST SP800-38A) [all …]
|
H A D | sm4-ce-ccm-glue.c | 73 /* format flags field per RFC 3610/NIST 800-38C */ in ccm_format_input()
|
/linux/arch/arm/crypto/ |
H A D | Kconfig | 25 GCM GHASH function (NIST SP800-38D) 176 - ECB (Electronic Codebook) mode (NIST SP800-38A) 177 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 178 - CTR (Counter) mode (NIST SP800-38A) 179 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 204 - ECB (Electronic Codebook) mode (NIST SP800-38A) 205 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 206 - CTR (Counter) mode (NIST SP800-38A) 207 - CTS (Cipher Text Stealing) mode (NIST SP800-38A) 208 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/linux/crypto/ |
H A D | ecdh.c | 148 .cra_name = "ecdh-nist-p192", 149 .cra_driver_name = "ecdh-nist-p192-generic", 173 .cra_name = "ecdh-nist-p256", 174 .cra_driver_name = "ecdh-nist-p256-generic", 198 .cra_name = "ecdh-nist-p384", 199 .cra_driver_name = "ecdh-nist-p384-generic", 212 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
|
H A D | ecc_curve_defs.h | 5 /* NIST P-192: a = p - 3 */ 32 /* NIST P-256: a = p - 3 */ 59 /* NIST P-384 */ 92 /* NIST P-521 */
|
H A D | ghash-generic.c | 18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X 34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
|
H A D | ansi_cprng.c | 4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using 34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
|
H A D | sha3_generic.c | 6 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
|
H A D | kdf_sp800108.c | 98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
|
H A D | ccm.c | 141 * NIST Special Publication 800-38C in format_input() 155 * RFC 3610 and NIST Special Publication 800-38C in format_adata() 264 /* Note: rfc 3610 and NIST 800-38C require counter of in crypto_ccm_init_crypt()
|
H A D | testmgr.c | 5164 .alg = "ecdh-nist-p192", 5170 .alg = "ecdh-nist-p256", 5177 .alg = "ecdh-nist-p384", 5184 .alg = "ecdsa-nist-p192", 5190 .alg = "ecdsa-nist-p256", 5197 .alg = "ecdsa-nist-p384", 5204 .alg = "ecdsa-nist-p521", 5500 .alg = "p1363(ecdsa-nist-p192)", 5503 .alg = "p1363(ecdsa-nist-p256)", 5510 .alg = "p1363(ecdsa-nist-p384)", [all …]
|
H A D | ecc.c | 738 * from http://www.nsa.gov/ia/_files/nist-routines.pdf 821 * from "Mathematical routines for the NIST prime elliptic curves" 963 /* All NIST curves have name prefix 'nist_' */ in vli_mmod_fast() 1347 if (curve->nbits == 521) /* NIST P521 */ in ecc_point_mult() 1542 * The maximum security strength identified by NIST SP800-57pt1r4 for in ecc_gen_privkey()
|
/linux/Documentation/devicetree/bindings/crypto/ |
H A D | intel,keembay-ocs-ecc.yaml | 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
|
/linux/arch/riscv/crypto/ |
H A D | Kconfig | 37 GCM GHASH function (NIST SP 800-38D)
|
/linux/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 513 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data() 516 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data() 519 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data() 522 ctx->cert->pub->pkey_algo = "ecdsa-nist-p521"; in x509_extract_key_data()
|
/linux/arch/s390/crypto/ |
H A D | Kconfig | 65 GCM GHASH hash function (NIST SP800-38D)
|
/linux/net/sunrpc/ |
H A D | Kconfig | 59 (NIST Special Publication 800-38B). These include
|
/linux/arch/powerpc/crypto/ |
H A D | Kconfig | 85 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
/linux/security/integrity/ |
H A D | digsig_asymmetric.c | 115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
|
/linux/Documentation/admin-guide/ |
H A D | module-signing.rst | 31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA 150 (``MODULE_SIG_KEY_TYPE_ECDSA``) to generate either RSA 4k or NIST
|
/linux/drivers/crypto/hisilicon/hpre/ |
H A D | hpre_crypto.c | 42 /* due to nist p521 */ 2052 .cra_name = "ecdh-nist-p192", 2053 .cra_driver_name = "hpre-ecdh-nist-p192", 2066 .cra_name = "ecdh-nist-p256", 2067 .cra_driver_name = "hpre-ecdh-nist-p256", 2080 .cra_name = "ecdh-nist-p384", 2081 .cra_driver_name = "hpre-ecdh-nist-p384",
|
/linux/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.c | 1050 * Note: B0 format is documented in NIST Special Publication 800-38C 1051 * https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf 1122 * Note: adata len encoding is documented in NIST Special Publication 800-38C 1123 * https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf 1333 * Note: rfc 3610 and NIST 800-38C require counter of zero to encrypt in ocs_aes_ccm_op()
|
/linux/certs/ |
H A D | Kconfig | 35 Use an elliptic curve key (NIST P384) for module signing. Use
|
/linux/include/linux/sunrpc/ |
H A D | gss_krb5.h | 140 #define ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */
|
/linux/lib/crypto/ |
H A D | sha256.c | 4 * http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf
|