| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /linux/lib/crypto/tests/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-or-later 9 # exist; the BLAKE2s code is always built-in for the /dev/random driver. 20 KUnit tests for the Curve25519 Diffie-Hellman function. 42 tristate "KUnit tests for SHA-1" if !KUNIT_ALL_TESTS 48 KUnit tests for the SHA-1 cryptographic hash function and its 51 # Option is named *_SHA256_KUNIT_TEST, though both SHA-224 and SHA-256 tests are 54 tristate "KUnit tests for SHA-224 and SHA-256" if !KUNIT_ALL_TESTS 60 KUnit tests for the SHA-224 and SHA-256 cryptographic hash functions 63 # Option is named *_SHA512_KUNIT_TEST, though both SHA-384 and SHA-512 tests are 66 tristate "KUnit tests for SHA-384 and SHA-512" if !KUNIT_ALL_TESTS [all …]
|
| /linux/include/crypto/ |
| H A D | sha2.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Common values for SHA-2 algorithms 76 sctx->state[0] = SHA224_H0; in sha224_block_init() 77 sctx->state[1] = SHA224_H1; in sha224_block_init() 78 sctx->state[2] = SHA224_H2; in sha224_block_init() 79 sctx->state[3] = SHA224_H3; in sha224_block_init() 80 sctx->state[4] = SHA224_H4; in sha224_block_init() 81 sctx->state[5] = SHA224_H5; in sha224_block_init() 82 sctx->state[6] = SHA224_H6; in sha224_block_init() 83 sctx->state[7] = SHA224_H7; in sha224_block_init() [all …]
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /linux/drivers/crypto/aspeed/ |
| H A D | Kconfig | 32 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and so on. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
| /linux/crypto/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 156 cbc(aes), and the support for the crypto self-tests. 178 bool "Enable cryptographic self-tests" 181 Enable the cryptographic self-tests. 183 The cryptographic self-tests run at boot time, or at algorithm 188 - Development and pre-release testing. In this case, also enable 192 - Production kernels, to help prevent buggy drivers from being used 193 and/or meet FIPS 140-3 pre-operational testing requirements. In 197 bool "Enable the full set of cryptographic self-tests" 200 Enable the full set of cryptographic self-tests for each algorithm. [all …]
|
| H A D | sha256.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * Crypto API support for SHA-224, SHA-256, HMAC-SHA224, and HMAC-SHA256 5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 19 * library SHA context, except the value in bytecount must be block-aligned and 36 ctx.bytecount -= partial; in __crypto_sha256_export() 49 ctx->bytecount += *p; in __crypto_sha256_import() 66 /* SHA-224 */ 106 return __crypto_sha256_export(&SHA224_CTX(desc)->ctx, out); in crypto_sha224_export() 111 return __crypto_sha256_import(&SHA224_CTX(desc)->ctx, in); in crypto_sha224_import() 116 return __crypto_sha256_export_core(&SHA224_CTX(desc)->ctx, out); in crypto_sha224_export_core() [all …]
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | samsung-slimsss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS 16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC 21 - const: samsung,exynos5433-slim-sss 29 clock-names: [all …]
|
| H A D | samsung-sss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) 16 -- Data Encryption Standard (DES)/3DES 17 -- Public Key Accelerator (PKA) 18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG [all …]
|
| /linux/Documentation/ABI/testing/ |
| H A D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
| H A D | sysfs-driver-chromeos-acpi | 56 Returns firmware version for the read-only portion of the 79 256 to 511 Debug header GPIO 0 to GPIO 255. 121 Returns the SHA-1 or SHA-256 hash that is read out of the 132 Returns offset in CMOS bank 0 of the verified boot non-volatile 142 Return the size in bytes of the verified boot non-volatile
|
| /linux/fs/crypto/ |
| H A D | hkdf.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Implementation of HKDF ("HMAC-based Extract-and-Expand Key Derivation 9 * the case that the fscrypt master keys are hardware-wrapped keys). 18 * SHA-512 because it is well-established, secure, and reasonably efficient. 20 * HKDF-SHA256 was also considered, as its 256-bit security strength would be 21 * sufficient here. A 512-bit security strength is "nice to have", though. 22 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the 23 * common case of deriving an AES-256-XTS key (512 bits), that can result in 24 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of 25 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two. [all …]
|
| /linux/lib/crypto/sparc/ |
| H A D | sha256.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * SHA-256 accelerated using the sparc64 sha256 opcodes 5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 42 pr_info("Using sparc64 sha256 opcode optimized SHA-256/SHA-224 implementation\n"); in sha256_mod_init_arch()
|
| /linux/lib/crypto/arm64/ |
| H A D | sha256-ce.S | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * sha2-ce-core.S - core SHA-224/SHA-256 transform using v8 Crypto Extensions 12 .arch armv8-a+crypto 51 * The SHA-256 round constants 75 ld1 { v0.4s- v3.4s}, [\tmp], #64 76 ld1 { v4.4s- v7.4s}, [\tmp], #64 77 ld1 { v8.4s-v11.4s}, [\tmp], #64 78 ld1 {v12.4s-v15.4s}, [\tmp] 94 0: ld1 {v16.4s-v19.4s}, [x1], #64 167 // x8-x9 are used as temporaries. [all …]
|
| /linux/lib/crypto/x86/ |
| H A D | sha256-ni-asm.S | 2 * Intel SHA Extensions optimized implementation of a SHA-256 update function 83 movdqa (\i-32)*4(SHA256CONSTANTS), MSG 100 * Intel SHA Extensions optimized implementation of a SHA-256 block function 102 * This function takes a pointer to the current SHA-256 state, a pointer to the 103 * input data, and the number of 64-byte blocks to process. Once all blocks 120 * DCBA, HGFE -> ABEF, CDGH 223 // Do 4 rounds of SHA-256 for each of two messages (interleaved). m0_a and m0_b 228 // computes 4 more message schedule words for each message. m1_a-m3_a contain 230 // likewise m1_b-m3_b for the second. After consuming the current value of 236 movdqa (\i-32)*4(SHA256CONSTANTS), TMP_A [all …]
|
| /linux/include/linux/ |
| H A D | ccp.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 27 * ccp_present - check if a CCP device is present 29 * Returns zero if a CCP device is present, -ENODEV otherwise. 34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1)) 39 * ccp_version - get the version of the CCP 46 * ccp_enqueue_cmd - queue an operation for processing by the CCP 55 * result in a return code of -EBUSY. 61 * will be -EINPROGRESS. Any other "err" value during callback is 65 * the return code is -EINPROGRESS or 66 * the return code is -EBUSY and CCP_CMD_MAY_BACKLOG flag is set [all …]
|
| /linux/lib/crypto/riscv/ |
| H A D | sha256.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * SHA-256 (RISC-V accelerated) 36 /* Both zvknha and zvknhb provide the SHA-256 instructions. */ in sha256_mod_init_arch()
|
| H A D | sha256-riscv64-zvknha_or_zvknhb-zvkb.S | 1 /* SPDX-License-Identifier: Apache-2.0 OR BSD-2-Clause */ 3 // This file is dual-licensed, meaning that you can use it under your 40 // The generated code of this file depends on the following RISC-V extensions: 41 // - RV64I 42 // - RISC-V Vector ('V') with VLEN >= 128 43 // - RISC-V Vector SHA-2 Secure Hash extension ('Zvknha' or 'Zvknhb') 44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb') 85 // Do 4 rounds of SHA-256. w0 contains the current 4 message schedule words. 88 // computes 4 more message schedule words. w1-w3 contain the next 3 groups of 4 113 // Load the round constants into K0-K15. [all …]
|
| /linux/fs/verity/ |
| H A D | fsverity_private.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * fs-verity: read-only file-based authenticity protection 11 #define pr_fmt(fmt) "fs-verity: " fmt 17 * it's enough for over U64_MAX bytes of data using SHA-256 and 4K blocks. 21 /* A hash algorithm supported by fs-verity */ 24 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */ 25 unsigned int block_size; /* block size in bytes, e.g. 64 for SHA-256 */ 43 unsigned int digest_size; /* same as hash_alg->digest_size */ 57 * to root level ('num_levels - 1') 63 * fsverity_info - cached verity metadata for an inode [all …]
|
| /linux/lib/crypto/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 31 # BLAKE2s support is always built-in, so there's no CRYPTO_LIB_BLAKE2S option. 82 The MD5 and HMAC-MD5 library functions. Select this if your module 136 The SHA-1 and HMAC-SHA1 library functions. Select this if your module 153 The SHA-22 [all...] |
| /linux/Documentation/admin-guide/ |
| H A D | module-signing.rst | 2 ------------------------------ 6 .. - Overview. 7 .. - Configuring module signing. 8 .. - Generating signing keys. 9 .. - Public keys in the kernel. 10 .. - Manually signing modules. 11 .. - Signed modules and stripping. 12 .. - Loading signed modules. 13 .. - Non-valid signatures and unsigned modules. 14 .. - Administering/protecting the private key. [all …]
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_mech.c | 1 // SPDX-License-Identifier: BSD-3-Clause 5 * Copyright (c) 2001-2008 The Regents of the University of Michigan. 36 * AES-128 with SHA-1 (RFC 3962) 41 .name = "aes128-cts", 54 .signalg = -1, 55 .sealalg = -1, 65 * AES-256 with SHA-1 (RFC 3962) 70 .name = "aes256-cts", 83 .signalg = -1, 84 .sealalg = -1, [all …]
|
| /linux/kernel/module/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 64 bool "Debug duplicate modules with auto-loading" 66 Module autoloading allows in-kernel code to request modules through 75 requests are non-fatal virtual memory is a limited resource and each 80 module requests to help identify if module auto-loading may be the 93 non-wait request_module() call is synchronous and waits until modprobe 94 completes. Subsequent auto-loading requests for the same module do 102 abuse was due to module auto-loading. These issues are currently only 105 module auto-loading is not the culprit. There may very well still be 106 many duplicate module auto-loading requests which could be optimized [all …]
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-dev.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 19 #include <linux/dma-direction.h> 27 #include "sp-dev.h" 63 /* ------------------------ CCP Version 5 Specifics ------------------------ */ 103 #define QUEUE_SIZE_VAL ((ffs(COMMANDS_PER_QUEUE) - 2) & \ 105 #define Q_PTR_MASK (2 << (QUEUE_SIZE_VAL + 5) - 1) 125 /* ------------------------ CCP Version 3 Specifics ------------------------ */ 147 /* XTS-AES Related Values */ 150 /* SHA Related Values */ 156 /* Pass-Through Related Values */ [all …]
|
| /linux/lib/crypto/s390/ |
| H A D | sha256.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * SHA-256 optimized using the CP Assist for Cryptographic Functions (CPACF)
|