Home
last modified time | relevance | path

Searched full:nist (Results 1 – 25 of 46) sorted by relevance

12

/linux/arch/arm64/crypto/
H A DKconfig13 GCM GHASH function (NIST SP800-38D)
162 - ECB (Electronic Codebook) mode (NIST SP800-38A)
163 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
164 - CTR (Counter) mode (NIST SP800-38A)
165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
179 - ECB (Electronic Codebook) mode (NIST SP800-38A)
180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
181 - CTR (Counter) mode (NIST SP800-38A)
182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
210 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
H A Dsm4-ce-ccm-glue.c73 /* format flags field per RFC 3610/NIST 800-38C */ in ccm_format_input()
/linux/arch/arm/crypto/
H A DKconfig25 GCM GHASH function (NIST SP800-38D)
176 - ECB (Electronic Codebook) mode (NIST SP800-38A)
177 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
178 - CTR (Counter) mode (NIST SP800-38A)
179 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
204 - ECB (Electronic Codebook) mode (NIST SP800-38A)
205 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
206 - CTR (Counter) mode (NIST SP800-38A)
207 - CTS (Cipher Text Stealing) mode (NIST SP800-38A)
208 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/linux/crypto/
H A Decdh.c148 .cra_name = "ecdh-nist-p192",
149 .cra_driver_name = "ecdh-nist-p192-generic",
173 .cra_name = "ecdh-nist-p256",
174 .cra_driver_name = "ecdh-nist-p256-generic",
198 .cra_name = "ecdh-nist-p384",
199 .cra_driver_name = "ecdh-nist-p384-generic",
212 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
H A Decc_curve_defs.h5 /* NIST P-192: a = p - 3 */
32 /* NIST P-256: a = p - 3 */
59 /* NIST P-384 */
92 /* NIST P-521 */
H A Dghash-generic.c18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
H A Dansi_cprng.c4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using
34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
H A Dsha3_generic.c6 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
H A Dkdf_sp800108.c98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
H A Dccm.c141 * NIST Special Publication 800-38C in format_input()
155 * RFC 3610 and NIST Special Publication 800-38C in format_adata()
264 /* Note: rfc 3610 and NIST 800-38C require counter of in crypto_ccm_init_crypt()
H A Dtestmgr.c5164 .alg = "ecdh-nist-p192",
5170 .alg = "ecdh-nist-p256",
5177 .alg = "ecdh-nist-p384",
5184 .alg = "ecdsa-nist-p192",
5190 .alg = "ecdsa-nist-p256",
5197 .alg = "ecdsa-nist-p384",
5204 .alg = "ecdsa-nist-p521",
5500 .alg = "p1363(ecdsa-nist-p192)",
5503 .alg = "p1363(ecdsa-nist-p256)",
5510 .alg = "p1363(ecdsa-nist-p384)",
[all …]
H A Decc.c738 * from http://www.nsa.gov/ia/_files/nist-routines.pdf
821 * from "Mathematical routines for the NIST prime elliptic curves"
963 /* All NIST curves have name prefix 'nist_' */ in vli_mmod_fast()
1347 if (curve->nbits == 521) /* NIST P521 */ in ecc_point_mult()
1542 * The maximum security strength identified by NIST SP800-57pt1r4 for in ecc_gen_privkey()
/linux/Documentation/devicetree/bindings/crypto/
H A Dintel,keembay-ocs-ecc.yaml16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
/linux/arch/riscv/crypto/
H A DKconfig37 GCM GHASH function (NIST SP 800-38D)
/linux/crypto/asymmetric_keys/
H A Dx509_cert_parser.c513 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data()
516 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data()
519 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data()
522 ctx->cert->pub->pkey_algo = "ecdsa-nist-p521"; in x509_extract_key_data()
/linux/arch/s390/crypto/
H A DKconfig65 GCM GHASH hash function (NIST SP800-38D)
/linux/net/sunrpc/
H A DKconfig59 (NIST Special Publication 800-38B). These include
/linux/arch/powerpc/crypto/
H A DKconfig85 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
/linux/security/integrity/
H A Ddigsig_asymmetric.c115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
/linux/Documentation/admin-guide/
H A Dmodule-signing.rst31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA
150 (``MODULE_SIG_KEY_TYPE_ECDSA``) to generate either RSA 4k or NIST
/linux/drivers/crypto/hisilicon/hpre/
H A Dhpre_crypto.c42 /* due to nist p521 */
2052 .cra_name = "ecdh-nist-p192",
2053 .cra_driver_name = "hpre-ecdh-nist-p192",
2066 .cra_name = "ecdh-nist-p256",
2067 .cra_driver_name = "hpre-ecdh-nist-p256",
2080 .cra_name = "ecdh-nist-p384",
2081 .cra_driver_name = "hpre-ecdh-nist-p384",
/linux/drivers/crypto/intel/keembay/
H A Docs-aes.c1050 * Note: B0 format is documented in NIST Special Publication 800-38C
1051 * https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf
1122 * Note: adata len encoding is documented in NIST Special Publication 800-38C
1123 * https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf
1333 * Note: rfc 3610 and NIST 800-38C require counter of zero to encrypt in ocs_aes_ccm_op()
/linux/certs/
H A DKconfig35 Use an elliptic curve key (NIST P384) for module signing. Use
/linux/include/linux/sunrpc/
H A Dgss_krb5.h140 #define ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */
/linux/lib/crypto/
H A Dsha256.c4 * http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf

12