| /linux/crypto/ |
| H A D | Kconfig | 655 CBC (Cipher Block Chaining) mode (NIST SP800-38A) 664 CTR (Counter) mode (NIST SP800-38A) 671 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST 682 ECB (Electronic Codebook) mode (NIST SP800-38A) 743 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 789 authenticated encryption mode (NIST SP800-38C) 799 (GCM Message Authentication Code) (NIST SP800-38D) 887 mode (NIST SP800-38B and IETF RFC4493) 894 GCM GHASH function (NIST SP800-38D) 1138 tristate "NIST SP800-90A DRBG (Deterministic Random Bit Generator)" [all …]
|
| H A D | ecc_curve_defs.h | 5 /* NIST P-192: a = p - 3 */ 32 /* NIST P-256: a = p - 3 */ 59 /* NIST P-384 */ 92 /* NIST P-521 */
|
| H A D | sha3.c | 4 * (https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf)
|
| H A D | testmgr.c | 4861 .alg = "ecdh-nist-p192", 4867 .alg = "ecdh-nist-p256", 4874 .alg = "ecdh-nist-p384", 4881 .alg = "ecdsa-nist-p192", 4887 .alg = "ecdsa-nist-p256", 4894 .alg = "ecdsa-nist-p384", 4901 .alg = "ecdsa-nist-p521", 5207 .alg = "p1363(ecdsa-nist-p192)", 5210 .alg = "p1363(ecdsa-nist-p256)", 5217 .alg = "p1363(ecdsa-nist-p384)", [all …]
|
| H A D | ecc.c | 729 * from http://www.nsa.gov/ia/_files/nist-routines.pdf 812 * from "Mathematical routines for the NIST prime elliptic curves" 954 /* All NIST curves have name prefix 'nist_' */ in vli_mmod_fast() 1338 if (curve->nbits == 521) /* NIST P521 */ in ecc_point_mult() 1533 * The maximum security strength identified by NIST SP800-57pt1r4 for in ecc_gen_privkey()
|
| H A D | drbg.c | 3 * Based on NIST Recommended DRBG from NIST SP800-90A with the following 1898 MODULE_DESCRIPTION("NIST SP800-90A Deterministic Random Bit Generator (DRBG) "
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | intel,keembay-ocs-ecc.yaml | 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
|
| /linux/Documentation/crypto/ |
| H A D | sha3.rst | 12 The SHA-3 family of algorithms, as specified in NIST FIPS-202 [1]_, contains six 124 .. [1] https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
|
| H A D | userspace-if.rst | 307 *Personalization String* in NIST SP 800-90A standard.
|
| /linux/Documentation/devicetree/bindings/riscv/ |
| H A D | extensions.yaml | 522 The standard Zkn NIST algorithm suite extensions as ratified in 528 The standard Zknd for NIST suite: AES decryption instructions as 534 The standard Zkne for NIST suite: AES encryption instructions as 540 The standard Zknh for NIST suite: hash function instructions as 743 The standard Zvkn extension for NIST algorithm suite instructions, as 749 The standard Zvknc extension for NIST algorithm suite with carryless 761 The standard Zvkng extension for NIST algorithm suite with GCM 767 The standard Zvknha extension for NIST suite: vector SHA-2 secure, 773 The standard Zvknhb extension for NIST suite: vector SHA-2 secure,
|
| /linux/lib/crypto/tests/ |
| H A D | sha3_kunit.c | 166 * Usable NIST tests. 168 * From: https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/example-values 228 "SHAKE128 gives wrong output for NIST.0"); in test_shake128_nist() 233 "SHAKE128 gives wrong output for NIST.1600"); in test_shake128_nist() 242 "SHAKE256 gives wrong output for NIST.0"); in test_shake256_nist() 247 "SHAKE256 gives wrong output for NIST.1600"); in test_shake256_nist()
|
| /linux/drivers/crypto/ |
| H A D | atmel-ecc.c | 107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret() 290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size() 306 .cra_name = "ecdh-nist-p256",
|
| H A D | atmel-i2c.c | 141 * The device only supports NIST P256 ECC keys. The public key size will in atmel_i2c_init_ecdh_cmd()
|
| /linux/include/crypto/internal/ |
| H A D | drbg.h | 4 * NIST SP800-90A DRBG derivation function
|
| /linux/crypto/asymmetric_keys/ |
| H A D | x509_cert_parser.c | 528 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data() 531 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data() 534 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data() 537 ctx->cert->pub->pkey_algo = "ecdsa-nist-p521"; in x509_extract_key_data()
|
| /linux/security/integrity/ |
| H A D | digsig_asymmetric.c | 115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 59 (NIST Special Publication 800-38B). These include
|
| /linux/lib/crypto/ |
| H A D | sha3.c | 4 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
|
| H A D | aescfb.c | 117 { /* From NIST SP800-38A */
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-ce-ccm-glue.c | 72 /* format flags field per RFC 3610/NIST 800-38C */ in ccm_format_input()
|
| /linux/include/crypto/ |
| H A D | drbg.h | 2 * DRBG based on NIST SP800-90A
|
| /linux/net/bluetooth/ |
| H A D | selftest.c | 208 tfm = crypto_alloc_kpp("ecdh-nist-p256", 0, 0); in test_ecdh()
|
| /linux/fs/crypto/ |
| H A D | crypto.c | 19 * The usage of AES-XTS should conform to recommendations in NIST
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-aes.c | 842 * 2 <= q <= 8 as per NIST 800-38C notation in tegra_ccm_check_iv() 993 * RFC 3610 and NIST Special Publication 800-38C in tegra_ccm_format_adata() 1180 /* Note: rfc 3610 and NIST 800-38C require counter (ctr_0) of in tegra_ccm_crypt_init()
|
| /linux/net/sched/ |
| H A D | sch_netem.c | 6 * NIST Net which is not copyrighted. 35 Sources: [1] Mark Carson, Darrin Santay, "NIST Net - A Linux-based
|