| /linux/lib/crypto/tests/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-or-later 18 # exist; the BLAKE2s code is always built-in for the /dev/random driver. 29 KUnit tests for the Curve25519 Diffie-Hellman function. 60 tristate "KUnit tests for SHA-1" if !KUNIT_ALL_TESTS 66 KUnit tests for the SHA-1 cryptographic hash function and its 69 # Option is named *_SHA256_KUNIT_TEST, though both SHA-224 and SHA-256 tests are 72 tristate "KUnit tests for SHA-224 and SHA-256" if !KUNIT_ALL_TESTS 78 KUnit tests for the SHA-224 and SHA-256 cryptographic hash functions 81 # Option is named *_SHA512_KUNIT_TEST, though both SHA-384 and SHA-512 tests are 84 tristate "KUnit tests for SHA-384 and SHA-512" if !KUNIT_ALL_TESTS [all …]
|
| /linux/include/crypto/ |
| H A D | sha2.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Common values for SHA-2 algorithms 76 sctx->state[0] = SHA224_H0; in sha224_block_init() 77 sctx->state[1] = SHA224_H1; in sha224_block_init() 78 sctx->state[2] = SHA224_H2; in sha224_block_init() 79 sctx->state[3] = SHA224_H3; in sha224_block_init() 80 sctx->state[4] = SHA224_H4; in sha224_block_init() 81 sctx->state[5] = SHA224_H5; in sha224_block_init() 82 sctx->state[6] = SHA224_H6; in sha224_block_init() 83 sctx->state[7] = SHA224_H7; in sha224_block_init() [all …]
|
| H A D | sha3.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Common values for SHA-3 algorithms 14 #define SHA3_224_BLOCK_SIZE (200 - 2 * SHA3_224_DIGEST_SIZE) 18 #define SHA3_256_BLOCK_SIZE (200 - 2 * SHA3_256_DIGEST_SIZE) 22 #define SHA3_384_BLOCK_SIZE (200 - 2 * SHA3_384_DIGEST_SIZE) 25 #define SHA3_512_DIGEST_SIZE (512 / 8) 26 #define SHA3_512_BLOCK_SIZE (200 - 2 * SHA3_512_DIGEST_SIZE) 34 #define SHAKE128_BLOCK_SIZE (200 - 2 * SHAKE128_DEFAULT_SIZE) 36 #define SHAKE256_BLOCK_SIZE (200 - 2 * SHAKE256_DEFAULT_SIZE) 41 * State for the Keccak-f[1600] permutation: 25 64-bit words. [all …]
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /linux/fs/crypto/ |
| H A D | hkdf.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Implementation of HKDF ("HMAC-based Extract-and-Expand Key Derivation 9 * the case that the fscrypt master keys are hardware-wrapped keys). 18 * SHA-512 because it is well-established, secure, and reasonably efficient. 20 * HKDF-SHA256 was also considered, as its 256-bit security strength would be 21 * sufficient here. A 512-bit security strength is "nice to have", though. 22 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the 23 * common case of deriving an AES-256-XTS key (512 bits), that can result in 24 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of 25 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two. [all …]
|
| /linux/Documentation/ABI/testing/ |
| H A D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
| /linux/lib/crypto/sparc/ |
| H A D | sha512.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * SHA-512 accelerated using the sparc64 sha512 opcodes 5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 41 pr_info("Using sparc64 sha512 opcode optimized SHA-512/SHA-384 implementation\n"); in sha512_mod_init_arch()
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /linux/crypto/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 156 cbc(aes), and the support for the crypto self-tests. 178 bool "Enable cryptographic self-tests" 181 Enable the cryptographic self-tests. 183 The cryptographic self-tests run at boot time, or at algorithm 188 - Development and pre-release testing. In this case, also enable 192 - Production kernels, to help prevent buggy drivers from being used 193 and/or meet FIPS 140-3 pre-operational testing requirements. In 197 bool "Enable the full set of cryptographic self-tests" 200 Enable the full set of cryptographic self-tests for each algorithm. [all …]
|
| H A D | sha512.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * Crypto API support for SHA-384, SHA-512, HMAC-SHA384, and HMAC-SHA512 5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 18 * library SHA context, except the value in bytecount_lo must be block-aligned 36 ctx.bytecount_lo -= partial; in __crypto_sha512_export() 49 ctx->bytecount_lo += *p; in __crypto_sha512_import() 66 /* SHA-384 */ 108 return __crypto_sha512_export(&SHA384_CTX(desc)->ctx, out); in crypto_sha384_export() 113 return __crypto_sha512_import(&SHA384_CTX(desc)->ctx, in); in crypto_sha384_import() 118 return __crypto_sha512_export_core(&SHA384_CTX(desc)->ctx, out); in crypto_sha384_export_core() [all …]
|
| H A D | sha3.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * Crypto API support for SHA-3 99 .base.cra_name = "sha3-224", 100 .base.cra_driver_name = "sha3-224-lib", 112 .base.cra_name = "sha3-256", 113 .base.cra_driver_name = "sha3-256-lib", 125 .base.cra_name = "sha3-384", 126 .base.cra_driver_name = "sha3-384-lib", 138 .base.cra_name = "sha3-512", 139 .base.cra_driver_name = "sha3-512-lib", [all …]
|
| /linux/arch/s390/crypto/ |
| H A D | phmac_s390.c | 1 // SPDX-License-Identifier: GPL-2.0+ 44 hwh->walkbytes = crypto_hash_walk_first(req, &hwh->walk); in hwh_prepare() 45 if (hwh->walkbytes < 0) in hwh_prepare() 46 return hwh->walkbytes; in hwh_prepare() 47 hwh->walkaddr = hwh->walk.data; in hwh_prepare() 62 return crypto_hash_walk_done(&hwh->walk, n); in hwh_advance() 64 hwh->walkbytes -= n; in hwh_advance() 65 hwh->walkaddr += n; in hwh_advance() 66 if (hwh->walkbytes > 0) in hwh_advance() 69 hwh->walkbytes = crypto_hash_walk_done(&hwh->walk, 0); in hwh_advance() [all …]
|
| /linux/drivers/crypto/aspeed/ |
| H A D | Kconfig | 32 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and so on. 45 Supports AES/DES symmetric-key encryption and decryption
|
| /linux/lib/crypto/arm64/ |
| H A D | sha512-ce-core.S | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Core SHA-384/SHA-512 transform using v8 Crypto Extensions 17 * assemblers both consider the SHA-512 instructions to be part of the 20 * versions.) "sha3" doesn't make a lot of sense, since SHA-512 is part 21 * of the SHA-2 family of algorithms, and also the Arm Architecture 25 .arch armv8-a+sha3 28 * The SHA-512 round constants 102 ld1 {v8.2d-v11.2d}, [x0] 106 ld1 {v20.2d-v23.2d}, [x3], #64 109 0: ld1 {v12.2d-v15.2d}, [x1], #64 [all …]
|
| /linux/lib/crypto/ |
| H A D | sha1.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * SHA-1 and HMAC-SHA1 library functions 30 * suggested by Artur Skawina - that will also make gcc unable to 51 /* This "rolls" over the 512-bit array */ 56 * the input data, the next mix it from the 512-bit array. 74 * sha1_transform - single block SHA1 transform (deprecated) 77 * @data: 512 bits of data to hash 80 * This function executes SHA-1's internal compression function. It updates the 81 * 160-bit internal state (@digest) with a single 512-bit data block (@data). 83 * Don't use this function. SHA-1 is no longer considered secure. And even if [all …]
|
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 42 # BLAKE2s support is always built-in, so there's no CRYPTO_LIB_BLAKE2S option. 93 The MD5 and HMAC-MD5 library functions. Select this if your module 159 The SHA-1 and HMAC-SHA1 library functions. Select this if your module 176 The SHA-224, SHA-256, HMAC-SHA224, and HMAC-SHA256 library functions. 195 The SHA-384, SHA-512, HMAC-SHA384, and HMAC-SHA512 library functions.
|
| H A D | sha512.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * SHA-384, SHA-512, HMAC-SHA384, and HMAC-SHA512 library functions 5 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 76 u64 a = state->h[0]; in sha512_block_generic() 77 u64 b = state->h[1]; in sha512_block_generic() 78 u64 c = state->h[2]; in sha512_block_generic() 79 u64 d = state->h[3]; in sha512_block_generic() 80 u64 e = state->h[4]; in sha512_block_generic() 81 u64 f = state->h[5]; in sha512_block_generic() 82 u64 g = state->h[6]; in sha512_block_generic() [all …]
|
| /linux/Documentation/crypto/ |
| H A D | sha3.rst | 1 .. SPDX-License-Identifier: GPL-2.0-or-later 4 SHA-3 Algorithm Collection 12 The SHA-3 family of algorithms, as specified in NIST FIPS-202 [1]_, contains six 22 - SHA3-224 23 - SHA3-256 24 - SHA3-384 25 - SHA3-512 27 Additionally, two Extendable-Output Functions (XOFs) are provided: 29 - SHAKE128 30 - SHAKE256 [all …]
|
| /linux/lib/crypto/riscv/ |
| H A D | sha512.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * SHA-512 and SHA-384 using the RISC-V vector crypto extensions
|
| H A D | sha512-riscv64-zvknhb-zvkb.S | 1 /* SPDX-License-Identifier: Apache-2.0 OR BSD-2-Clause */ 3 // This file is dual-licensed, meaning that you can use it under your 40 // The generated code of this file depends on the following RISC-V extensions: 41 // - RV64I 42 // - RISC-V Vector ('V') with VLEN >= 128 43 // - RISC-V Vector SHA-2 Secure Hash extension ('Zvknhb') 44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb') 70 // Do 4 rounds of SHA-512. w0 contains the current 4 message schedule words. 73 // computes 4 more message schedule words. w1-w3 contain the next 3 groups of 4 101 // message scheduling. There are 4 words, so an 8-bit mask suffices. [all …]
|
| /linux/Documentation/admin-guide/ |
| H A D | module-signing.rst | 2 ------------------------------ 6 .. - Overview. 7 .. - Configuring module signing. 8 .. - Generating signing keys. 9 .. - Public keys in the kernel. 10 .. - Manually signing modules. 11 .. - Signed modules and stripping. 12 .. - Loading signed modules. 13 .. - Non-valid signatures and unsigned modules. 14 .. - Administering/protecting the private key. [all …]
|
| /linux/lib/crypto/s390/ |
| H A D | sha3.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * SHA-3 optimized using the CP Assist for Cryptographic Functions (CPACF) 18 * Note that KIMD assumes little-endian order of the state in sha3_absorb_blocks() 29 * This case handles both SHA3-256 and SHAKE256, since in sha3_absorb_blocks() 53 * Keccak-f permutation, which is what we want here. Use in sha3_keccakf() 54 * SHA3-512 since it has the smallest block size. in sha3_keccakf() 128 * Since all the SHA-3 functions are in Message-Security-Assist in sha3_mod_init_arch() 149 pr_warn("Unsupported combination of SHA-3 facilities\n"); in sha3_mod_init_arch()
|
| /linux/kernel/module/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 64 bool "Debug duplicate modules with auto-loading" 66 Module autoloading allows in-kernel code to request modules through 75 requests are non-fatal virtual memory is a limited resource and each 80 module requests to help identify if module auto-loading may be the 93 non-wait request_module() call is synchronous and waits until modprobe 94 completes. Subsequent auto-loading requests for the same module do 102 abuse was due to module auto-loading. These issues are currently only 105 module auto-loading is not the culprit. There may very well still be 106 many duplicate module auto-loading requests which could be optimized [all …]
|
| /linux/drivers/crypto/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 39 called padlock-aes. 53 called padlock-sha. 61 Say 'Y' here to use the AMD Geode LX processor on-board AES 65 will be called geode-aes. 87 - A pkey base and API kernel module (pkey.ko) which offers the 89 and the sysfs API and the in-kernel API to the crypto cipher 91 - A pkey pckmo kernel module (pkey-pckmo.ko) which is automatically 94 - A pkey CCA kernel module (pkey-cca.ko) which is automatically 96 - A pkey EP11 kernel module (pkey-ep11.ko) which is automatically [all …]
|
| /linux/lib/crypto/mips/ |
| H A D | sha512.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 5 * SHA-512 and SHA-384 Secure Hash Algorithm. 11 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 20 * We pass everything as 64-bit. OCTEON can handle misaligned data. 33 write_octeon_64bit_hash_sha512(state->h[0], 0); in sha512_blocks() 34 write_octeon_64bit_hash_sha512(state->h[1], 1); in sha512_blocks() 35 write_octeon_64bit_hash_sha512(state->h[2], 2); in sha512_blocks() 36 write_octeon_64bit_hash_sha512(state->h[3], 3); in sha512_blocks() 37 write_octeon_64bit_hash_sha512(state->h[4], 4); in sha512_blocks() 38 write_octeon_64bit_hash_sha512(state->h[5], 5); in sha512_blocks() [all …]
|