Home
last modified time | relevance | path

Searched +full:sha +full:- +full:256 (Results 1 – 25 of 74) sorted by relevance

123

/linux/tools/perf/pmu-events/arch/s390/cf_z17/
H A Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux/lib/crypto/tests/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-or-later
9 # exist; the BLAKE2s code is always built-in for the /dev/random driver.
20 KUnit tests for the Curve25519 Diffie-Hellman function.
42 tristate "KUnit tests for SHA-1" if !KUNIT_ALL_TESTS
48 KUnit tests for the SHA-1 cryptographic hash function and its
51 # Option is named *_SHA256_KUNIT_TEST, though both SHA-224 and SHA-256 tests are
54 tristate "KUnit tests for SHA-224 and SHA-256" if !KUNIT_ALL_TESTS
60 KUnit tests for the SHA-224 and SHA-256 cryptographic hash functions
63 # Option is named *_SHA512_KUNIT_TEST, though both SHA-384 and SHA-512 tests are
66 tristate "KUnit tests for SHA-384 and SHA-512" if !KUNIT_ALL_TESTS
[all …]
/linux/include/crypto/
H A Dsha2.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * Common values for SHA-2 algorithms
76 sctx->state[0] = SHA224_H0; in sha224_block_init()
77 sctx->state[1] = SHA224_H1; in sha224_block_init()
78 sctx->state[2] = SHA224_H2; in sha224_block_init()
79 sctx->state[3] = SHA224_H3; in sha224_block_init()
80 sctx->state[4] = SHA224_H4; in sha224_block_init()
81 sctx->state[5] = SHA224_H5; in sha224_block_init()
82 sctx->state[6] = SHA224_H6; in sha224_block_init()
83 sctx->state[7] = SHA224_H7; in sha224_block_init()
[all …]
/linux/tools/perf/pmu-events/arch/s390/cf_z16/
H A Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux/drivers/crypto/aspeed/
H A DKconfig32 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and so on.
45 Supports AES/DES symmetric-key encryption and decryption
56 Supports 256 bits to 4096 bits RSA encryption/decryption
/linux/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
156 cbc(aes), and the support for the crypto self-tests.
178 bool "Enable cryptographic self-tests"
181 Enable the cryptographic self-tests.
183 The cryptographic self-tests run at boot time, or at algorithm
188 - Development and pre-release testing. In this case, also enable
192 - Production kernels, to help prevent buggy drivers from being used
193 and/or meet FIPS 140-3 pre-operational testing requirements. In
197 bool "Enable the full set of cryptographic self-tests"
200 Enable the full set of cryptographic self-tests for each algorithm.
[all …]
H A Dsha256.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Crypto API support for SHA-224, SHA-256, HMAC-SHA224, and HMAC-SHA256
5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
19 * library SHA context, except the value in bytecount must be block-aligned and
36 ctx.bytecount -= partial; in __crypto_sha256_export()
49 ctx->bytecount += *p; in __crypto_sha256_import()
66 /* SHA-224 */
106 return __crypto_sha256_export(&SHA224_CTX(desc)->ctx, out); in crypto_sha224_export()
111 return __crypto_sha256_import(&SHA224_CTX(desc)->ctx, in); in crypto_sha224_import()
116 return __crypto_sha256_export_core(&SHA224_CTX(desc)->ctx, out); in crypto_sha224_export_core()
[all …]
/linux/Documentation/devicetree/bindings/crypto/
H A Dsamsung-slimsss.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Krzysztof Kozlowski <krzk@kernel.org>
14 -- Feeder (FeedCtrl)
15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC
21 - const: samsung,exynos5433-slim-sss
29 clock-names:
[all …]
H A Dsamsung-sss.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Krzysztof Kozlowski <krzk@kernel.org>
14 -- Feeder (FeedCtrl)
15 -- Advanced Encryption Standard (AES)
16 -- Data Encryption Standard (DES)/3DES
17 -- Public Key Accelerator (PKA)
18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG
[all …]
/linux/Documentation/ABI/testing/
H A Ddebugfs-pfo-nx-crypto1 What: /sys/kernel/debug/nx-crypto/*
7 These debugfs interfaces are built by the nx-crypto driver, built in
18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not
19 recorded here (the hcall will retry until -EBUSY goes away).
36 The total number of bytes hashed by the hardware using SHA-256.
39 The total number of SHA-256 operations submitted to the hardware.
42 The total number of bytes hashed by the hardware using SHA-512.
45 The total number of SHA-512 operations submitted to the hardware.
H A Dsysfs-driver-chromeos-acpi56 Returns firmware version for the read-only portion of the
79 256 to 511 Debug header GPIO 0 to GPIO 255.
121 Returns the SHA-1 or SHA-256 hash that is read out of the
132 Returns offset in CMOS bank 0 of the verified boot non-volatile
142 Return the size in bytes of the verified boot non-volatile
/linux/fs/crypto/
H A Dhkdf.c1 // SPDX-License-Identifier: GPL-2.0
3 * Implementation of HKDF ("HMAC-based Extract-and-Expand Key Derivation
9 * the case that the fscrypt master keys are hardware-wrapped keys).
18 * SHA-512 because it is well-established, secure, and reasonably efficient.
20 * HKDF-SHA256 was also considered, as its 256-bit security strength would be
21 * sufficient here. A 512-bit security strength is "nice to have", though.
22 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the
23 * common case of deriving an AES-256-XTS key (512 bits), that can result in
24 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of
25 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two.
[all …]
/linux/lib/crypto/sparc/
H A Dsha256.h1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * SHA-256 accelerated using the sparc64 sha256 opcodes
5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
42 pr_info("Using sparc64 sha256 opcode optimized SHA-256/SHA-224 implementation\n"); in sha256_mod_init_arch()
/linux/lib/crypto/arm64/
H A Dsha256-ce.S1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * sha2-ce-core.S - core SHA-224/SHA-256 transform using v8 Crypto Extensions
12 .arch armv8-a+crypto
51 * The SHA-256 round constants
75 ld1 { v0.4s- v3.4s}, [\tmp], #64
76 ld1 { v4.4s- v7.4s}, [\tmp], #64
77 ld1 { v8.4s-v11.4s}, [\tmp], #64
78 ld1 {v12.4s-v15.4s}, [\tmp]
94 0: ld1 {v16.4s-v19.4s}, [x1], #64
167 // x8-x9 are used as temporaries.
[all …]
/linux/lib/crypto/x86/
H A Dsha256-ni-asm.S2 * Intel SHA Extensions optimized implementation of a SHA-256 update function
83 movdqa (\i-32)*4(SHA256CONSTANTS), MSG
100 * Intel SHA Extensions optimized implementation of a SHA-256 block function
102 * This function takes a pointer to the current SHA-256 state, a pointer to the
103 * input data, and the number of 64-byte blocks to process. Once all blocks
120 * DCBA, HGFE -> ABEF, CDGH
223 // Do 4 rounds of SHA-256 for each of two messages (interleaved). m0_a and m0_b
228 // computes 4 more message schedule words for each message. m1_a-m3_a contain
230 // likewise m1_b-m3_b for the second. After consuming the current value of
236 movdqa (\i-32)*4(SHA256CONSTANTS), TMP_A
[all …]
/linux/include/linux/
H A Dccp.h1 /* SPDX-License-Identifier: GPL-2.0-only */
27 * ccp_present - check if a CCP device is present
29 * Returns zero if a CCP device is present, -ENODEV otherwise.
34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1))
39 * ccp_version - get the version of the CCP
46 * ccp_enqueue_cmd - queue an operation for processing by the CCP
55 * result in a return code of -EBUSY.
61 * will be -EINPROGRESS. Any other "err" value during callback is
65 * the return code is -EINPROGRESS or
66 * the return code is -EBUSY and CCP_CMD_MAY_BACKLOG flag is set
[all …]
/linux/lib/crypto/riscv/
H A Dsha256.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
3 * SHA-256 (RISC-V accelerated)
36 /* Both zvknha and zvknhb provide the SHA-256 instructions. */ in sha256_mod_init_arch()
H A Dsha256-riscv64-zvknha_or_zvknhb-zvkb.S1 /* SPDX-License-Identifier: Apache-2.0 OR BSD-2-Clause */
3 // This file is dual-licensed, meaning that you can use it under your
40 // The generated code of this file depends on the following RISC-V extensions:
41 // - RV64I
42 // - RISC-V Vector ('V') with VLEN >= 128
43 // - RISC-V Vector SHA-2 Secure Hash extension ('Zvknha' or 'Zvknhb')
44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
85 // Do 4 rounds of SHA-256. w0 contains the current 4 message schedule words.
88 // computes 4 more message schedule words. w1-w3 contain the next 3 groups of 4
113 // Load the round constants into K0-K15.
[all …]
/linux/fs/verity/
H A Dfsverity_private.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * fs-verity: read-only file-based authenticity protection
11 #define pr_fmt(fmt) "fs-verity: " fmt
17 * it's enough for over U64_MAX bytes of data using SHA-256 and 4K blocks.
21 /* A hash algorithm supported by fs-verity */
24 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */
25 unsigned int block_size; /* block size in bytes, e.g. 64 for SHA-256 */
43 unsigned int digest_size; /* same as hash_alg->digest_size */
57 * to root level ('num_levels - 1')
63 * fsverity_info - cached verity metadata for an inode
[all …]
/linux/lib/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
31 # BLAKE2s support is always built-in, so there's no CRYPTO_LIB_BLAKE2S option.
82 The MD5 and HMAC-MD5 library functions. Select this if your module
136 The SHA-1 and HMAC-SHA1 library functions. Select this if your module
153 The SHA-22
[all...]
/linux/Documentation/admin-guide/
H A Dmodule-signing.rst2 ------------------------------
6 .. - Overview.
7 .. - Configuring module signing.
8 .. - Generating signing keys.
9 .. - Public keys in the kernel.
10 .. - Manually signing modules.
11 .. - Signed modules and stripping.
12 .. - Loading signed modules.
13 .. - Non-valid signatures and unsigned modules.
14 .. - Administering/protecting the private key.
[all …]
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c1 // SPDX-License-Identifier: BSD-3-Clause
5 * Copyright (c) 2001-2008 The Regents of the University of Michigan.
36 * AES-128 with SHA-1 (RFC 3962)
41 .name = "aes128-cts",
54 .signalg = -1,
55 .sealalg = -1,
65 * AES-256 with SHA-1 (RFC 3962)
70 .name = "aes256-cts",
83 .signalg = -1,
84 .sealalg = -1,
[all …]
/linux/kernel/module/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
64 bool "Debug duplicate modules with auto-loading"
66 Module autoloading allows in-kernel code to request modules through
75 requests are non-fatal virtual memory is a limited resource and each
80 module requests to help identify if module auto-loading may be the
93 non-wait request_module() call is synchronous and waits until modprobe
94 completes. Subsequent auto-loading requests for the same module do
102 abuse was due to module auto-loading. These issues are currently only
105 module auto-loading is not the culprit. There may very well still be
106 many duplicate module auto-loading requests which could be optimized
[all …]
/linux/drivers/crypto/ccp/
H A Dccp-dev.h1 /* SPDX-License-Identifier: GPL-2.0-only */
19 #include <linux/dma-direction.h>
27 #include "sp-dev.h"
63 /* ------------------------ CCP Version 5 Specifics ------------------------ */
103 #define QUEUE_SIZE_VAL ((ffs(COMMANDS_PER_QUEUE) - 2) & \
105 #define Q_PTR_MASK (2 << (QUEUE_SIZE_VAL + 5) - 1)
125 /* ------------------------ CCP Version 3 Specifics ------------------------ */
147 /* XTS-AES Related Values */
150 /* SHA Related Values */
156 /* Pass-Through Related Values */
[all …]
/linux/lib/crypto/s390/
H A Dsha256.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
3 * SHA-256 optimized using the CP Assist for Cryptographic Functions (CPACF)

123