Home
last modified time | relevance | path

Searched +full:aes +full:- +full:cmac (Results 1 – 25 of 35) sorted by relevance

12

/linux/tools/perf/pmu-events/arch/s390/cf_z16/
H A Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux/tools/perf/pmu-events/arch/s390/cf_z17/
H A Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux/include/linux/
H A Dccp.h1 /* SPDX-License-Identifier: GPL-2.0-only */
17 #include <crypto/aes.h>
27 * ccp_present - check if a CCP device is present
29 * Returns zero if a CCP device is present, -ENODEV otherwise.
34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1))
39 * ccp_version - get the version of the CCP
46 * ccp_enqueue_cmd - queue an operation for processing by the CCP
55 * result in a return code of -EBUSY.
61 * will be -EINPROGRESS. Any other "err" value during callback is
65 * the return code is -EINPROGRESS or
[all …]
/linux/net/sunrpc/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
28 GSS-API mechanism (RFC 1964).
30 Secure RPC calls with Kerberos require an auxiliary user-space
31 daemon which may be found in the Linux nfs-utils package
32 available from http://linux-nfs.org/. In addition, user-space
38 bool "Enable Kerberos enctypes based on AES and SHA-1"
46 that utilize Advanced Encryption Standard (AES) ciphers and
47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
48 aes256-cts-hmac-sha1-96.
51 bool "Enable Kerberos encryption types based on Camellia and CMAC"
[all …]
/linux/net/mac80211/
H A Daes_cmac.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AES-128-CMAC with TLen 16 for IEEE 802.11w BIP
13 #include <crypto/aes.h>
32 desc->tf in ieee80211_aes_cmac()
[all...]
H A Dfils_aead.c1 // SPDX-License-Identifier: GPL-2.0-only
7 #include <crypto/aes.h>
32 desc->tfm = tfm; in aes_s2v()
34 /* D = AES-CMAC(K, <zero>) */ in aes_s2v()
37 for (i = 0; i < num_elem - 1; i++) { in aes_s2v()
49 crypto_shash_update(desc, addr[i], len[i] - AES_BLOCK_SIZE); in aes_s2v()
50 crypto_xor(d, addr[i] + len[i] - AES_BLOCK_SIZE, in aes_s2v()
59 /* V = AES-CMAC(K, T) */ in aes_s2v()
87 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in aes_siv_encrypt()
99 * overwriting this during AES-CTR. in aes_siv_encrypt()
[all …]
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c1 // SPDX-License-Identifier: BSD-3-Clause
5 * Copyright (c) 2001-2008 The Regents of the University of Michigan.
36 * AES-128 with SHA-1 (RFC 3962)
41 .name = "aes128-cts",
42 .encrypt_name = "cts(cbc(aes))",
43 .aux_cipher = "cbc(aes)",
54 .signalg = -1,
55 .sealalg = -1,
65 * AES-256 with SHA-1 (RFC 3962)
70 .name = "aes256-cts",
[all …]
H A Dgss_krb5_keys.c73 * krb5_nfold - n-fold function
79 * This is the n-fold function as described in rfc3961, sec 5.1
104 for (i = ulcm-1; i >= 0; i--) { in krb5_nfold()
109 ((inbits << 3) - 1) in krb5_nfold()
115 + ((inbits - (i % inbits)) << 3) in krb5_nfold()
119 byte += (((in[((inbits - 1) - (msbit >> 3)) % inbits] << 8)| in krb5_nfold()
120 (in[((inbits) - (msbit >> 3)) % inbits])) in krb5_nfold()
134 for (i = outbits - 1; i >= 0; i--) { in krb5_nfold()
158 int ret = -EINVAL; in krb5_DK()
160 keybytes = gk5e->keybytes; in krb5_DK()
[all …]
/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes-cmac.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AMD Cryptographic Coprocessor (CCP) AES CMAC crypto API support
16 #include <crypto/aes.h>
21 #include "ccp-crypto.h"
34 if (rctx->hash_rem) { in ccp_aes_cmac_complete()
36 unsigned int offset = rctx->nbytes - rctx->hash_rem; in ccp_aes_cmac_complete()
38 scatterwalk_map_and_copy(rctx->buf, rctx->src, in ccp_aes_cmac_complete()
39 offset, rctx->hash_rem, 0); in ccp_aes_cmac_complete()
40 rctx->buf_count = rctx->hash_rem; in ccp_aes_cmac_complete()
42 rctx->buf_count = 0; in ccp_aes_cmac_complete()
[all …]
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_CCP_DD) += ccp.o
3 ccp-objs := sp-dev.o sp-platform.o
4 ccp-$(CONFIG_CRYPTO_DEV_SP_CCP) += ccp-dev.o \
5 ccp-ops.o \
6 ccp-dev-v3.o \
7 ccp-dev-v5.o \
8 ccp-dmaengine.o
9 ccp-$(CONFIG_CRYPTO_DEV_CCP_DEBUGFS) += ccp-debugfs.o
10 ccp-$(CONFIG_PCI) += sp-pci.o
[all …]
H A Dccp-crypto.h1 /* SPDX-License-Identifier: GPL-2.0-only */
17 #include <crypto/aes.h>
59 /* Child algorithm used for HMAC, CMAC, etc */
82 struct crypto_alg *alg = tfm->__crt_alg; in ccp_crypto_ahash_alg()
90 /***** AES related defines *****/
105 /* CMAC key structures */
182 /* SHA-related defines
266 struct ccp_aes_ctx aes; member
/linux/Documentation/devicetree/bindings/crypto/
H A Dnvidia,tegra234-se-aes.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-aes.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: NVIDIA Tegra Security Engine for AES algorithms
10 The Tegra Security Engine accelerates the following AES encryption/decryption
11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
12 AES-CMAC
15 - Akhil R <akhilrajeev@nvidia.com>
19 const: nvidia,tegra234-se-aes
[all …]
/linux/fs/smb/client/
H A Dsmb2transport.c1 // SPDX-License-Identifier: LGPL-2.1
33 struct cifs_secmech *p = &server->secmech; in smb3_crypto_shash_allocate()
35 return cifs_alloc_hash("cmac(aes)", &p->aes_cmac); in smb3_crypto_shash_allocate()
51 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server; in smb3_get_sign_key()
53 list_for_each_entry(ses, &pserver->smb_ses_list, smb_ses_list) { in smb3_get_sign_key()
54 if (ses->Suid == ses_id) in smb3_get_sign_key()
60 rc = -ENOENT; in smb3_get_sign_key()
64 spin_lock(&ses->ses_lock); in smb3_get_sign_key()
65 spin_lock(&ses->chan_lock); in smb3_get_sign_key()
68 ses->ses_status == SES_GOOD); in smb3_get_sign_key()
[all …]
/linux/arch/arm64/crypto/
H A Daes-glue.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * linux/arch/arm64/crypto/aes-glue.c - wrapper code for ARMv8 AES
5 * Copyright (C) 2013 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org>
8 #include <crypto/aes.h>
24 #include "aes-ce-setkey.h"
43 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 Crypto Extensions");
60 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 NEON");
63 MODULE_ALIAS_CRYPTO("ecb(aes)");
64 MODULE_ALIAS_CRYPTO("cbc(aes)");
65 MODULE_ALIAS_CRYPTO("ctr(aes)");
[all …]
/linux/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
156 cbc(aes), and the support for the crypto self-tests.
175 cbc(aes).
178 bool "Enable cryptographic self-tests"
181 Enable the cryptographic self-tests.
183 The cryptographic self-tests run at boot time, or at algorithm
188 - Development and pre-release testing. In this case, also enable
192 - Production kernels, to help prevent buggy drivers from being used
193 and/or meet FIPS 140-3 pre-operational testing requirements. In
197 bool "Enable the full set of cryptographic self-tests"
[all …]
H A Dtcrypt.c1 // SPDX-License-Identifier: GPL-2.0-or-later
9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
12 * Updated RFC4106 AES-GCM testing.
91 while (i-- > 0) in testmgr_alloc_buf()
94 return -ENOMEM; in testmgr_alloc_buf()
109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead()
124 np--; in sg_init_aead()
134 struct crypto_wait *wait = req->base.data; in do_one_aead_op()
185 return -ENOMEM; in test_mb_aead_jiffies()
212 return -ENOMEM; in test_mb_aead_cycles()
[all …]
H A Dtestmgr.c1 // SPDX-License-Identifier: GPL-2.0-or-later
6 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
11 * Updated RFC4106 AES-GCM testing.
46 MODULE_PARM_DESC(notests, "disable all crypto self-tests");
51 MODULE_PARM_DESC(noslowtests, "disable slow crypto self-tests");
98 * behavior when the two IV copies differ is implementation-defined.
179 while (i-- > 0) in __testmgr_alloc_buf()
182 return -ENOMEM; in __testmgr_alloc_buf()
225 /* likewise, but also export and re-import the intermediate state */
237 * Whether the crypto operation will occur in-place, and if so whether the
[all …]
/linux/fs/smb/server/
H A Dcrypto_ctx.c1 // SPDX-License-Identifier: GPL-2.0-or-later
34 crypto_free_shash(shash->tfm); in free_shash()
45 tfm = crypto_alloc_aead("gcm(aes)", 0, 0); in alloc_aead()
48 tfm = crypto_alloc_aead("ccm(aes)", 0, 0); in alloc_aead()
70 tfm = crypto_alloc_shash("cmac(aes)", in alloc_shash_desc()
[all...]
/linux/drivers/crypto/ccree/
H A Dcc_hash.h1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */
27 /* this struct was taken from drivers/crypto/nx/nx-aes-xcbc.c and it is used
28 * for xcbc/cmac statesize
61 return &state->buf_cnt[state->buff_index]; in cc_hash_buf_cnt()
66 return state->buffers[state->buff_index]; in cc_hash_buf()
71 return &state->buf_cnt[state->buff_index ^ 1]; in cc_next_buf_cnt()
76 return state->buffers[state->buff_index ^ 1]; in cc_next_buf()
84 * cc_digest_len_addr() - Gets the initial digest length
95 * cc_larval_digest_addr() - Gets the address of the initial digest in SRAM
/linux/tools/testing/selftests/net/tcp_ao/lib/
H A Dsock.c1 // SPDX-License-Identifier: GPL-2.0
54 return -errno; in __test_wait_fd()
57 return -ETIMEDOUT; in __test_wait_fd()
61 return -errno; in __test_wait_fd()
63 return -ret; in __test_wait_fd()
101 if (ret != -ETIMEDOUT) in __test_skpair_poll()
109 *err = -ETIMEDOUT; in __test_skpair_poll()
110 return -ETIMEDOUT; in __test_skpair_poll()
132 err = -errno; in __test_connect_socket()
217 ao->set_current = !!set_current; in test_prepare_key_sockaddr()
[all …]
/linux/net/xfrm/
H A Dxfrm_algo.c1 // SPDX-License-Identifier: GPL-2.0-or-later
29 .name = "rfc4106(gcm(aes))",
48 .name = "rfc4106(gcm(aes))",
67 .name = "rfc4106(gcm(aes))",
86 .name = "rfc4309(ccm(aes))",
105 .name = "rfc4309(ccm(aes))",
[all...]
/linux/drivers/crypto/caam/
H A Dcaamhash.c1 // SPDX-License-Identifier: GPL-2.0+
3 * caam - Freescale FSL CAAM support for ahash functions of crypto API
6 * Copyright 2018-2019, 2023 NXP
13 * --------------- ---------------
14 * | JobDesc #1 |-------------------->| ShareDesc |
16 * --------------- | (operation) |
17 * ---------------
21 * --------------- ---------------
22 * | JobDesc #2 |-------------------->| ShareDesc |
23 * | *(packet 2) | |------------->| (hashKey) |
[all …]
/linux/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c1 // SPDX-License-Identifier: GPL-2.0
23 err = add_vrf("ksft-vrf", test_vrf_tabid, test_vrf_ifindex, -1); in setup_vrfs()
27 err = link_set_up("ksft-vrf"); in setup_vrfs()
91 return -errno; in test_del_key()
100 return -EEXIST; in test_del_key()
101 if (err != -E2BIG) in test_del_key()
108 return -ENOTRECOVERABLE; in test_del_key()
110 return -ENOTRECOVERABLE; in test_del_key()
121 if ((err == -EBUSY && fault(BUSY)) || (err == -EINVAL && fault(CURRNEXT))) { in try_delete_key()
162 return -ENOTRECOVERABLE; in test_set_key()
[all …]
/linux/drivers/staging/rtl8723bs/core/
H A Drtw_security.c1 // SPDX-License-Identifier: GPL-2.0
4 * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved.
9 #include <crypto/aes.h>
17 "AES",
47 struct pkt_attrib *pattrib = &((struct xmit_frame *)pxmitframe)->attrib; in rtw_wep_encrypt()
48 struct security_priv *psecuritypriv = &padapter->securitypriv; in rtw_wep_encrypt()
49 struct xmit_priv *pxmitpriv = &padapter->xmitpriv; in rtw_wep_encrypt()
50 struct arc4_ctx *ctx = &psecuritypriv->xmit_arc4_ctx; in rtw_wep_encrypt()
52 if (!((struct xmit_frame *)pxmitframe)->buf_addr) in rtw_wep_encrypt()
56 pframe = ((struct xmit_frame *)pxmitframe)->buf_addr + hw_hdr_offset; in rtw_wep_encrypt()
[all …]
/linux/drivers/crypto/tegra/
H A Dtegra-se-aes.c1 // SPDX-License-Identifier: GPL-2.0-only
2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
8 #include <linux/dma-mapping.h>
14 #include <crypto/aes.h>
23 #include "tegra-se.h"
93 /* increment counter (128-bit int) */
97 --bits; in ctr_iv_inc()
109 offset = req->cryptlen - ctx->ivsize; in tegra_cbc_iv_copyback()
111 if (rctx->encrypt) in tegra_cbc_iv_copyback()
112 memcpy(req->iv, rctx->datbuf.buf + offset, ctx->ivsize); in tegra_cbc_iv_copyback()
[all …]

12