| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /linux/include/linux/ |
| H A D | ccp.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 17 #include <crypto/aes.h> 27 * ccp_present - check if a CCP device is present 29 * Returns zero if a CCP device is present, -ENODEV otherwise. 34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1)) 39 * ccp_version - get the version of the CCP 46 * ccp_enqueue_cmd - queue an operation for processing by the CCP 55 * result in a return code of -EBUSY. 61 * will be -EINPROGRESS. Any other "err" value during callback is 65 * the return code is -EINPROGRESS or [all …]
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 28 GSS-API mechanism (RFC 1964). 30 Secure RPC calls with Kerberos require an auxiliary user-space 31 daemon which may be found in the Linux nfs-utils package 32 available from http://linux-nfs.org/. In addition, user-space 38 bool "Enable Kerberos enctypes based on AES and SHA-1" 46 that utilize Advanced Encryption Standard (AES) ciphers and 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 48 aes256-cts-hmac-sha1-96. 51 bool "Enable Kerberos encryption types based on Camellia and CMAC" [all …]
|
| /linux/net/mac80211/ |
| H A D | aes_cmac.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AES-128-CMAC with TLen 16 for IEEE 802.11w BIP 13 #include <crypto/aes.h> 32 desc->tf in ieee80211_aes_cmac() [all...] |
| H A D | fils_aead.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 #include <crypto/aes.h> 32 desc->tfm = tfm; in aes_s2v() 34 /* D = AES-CMAC(K, <zero>) */ in aes_s2v() 37 for (i = 0; i < num_elem - 1; i++) { in aes_s2v() 49 crypto_shash_update(desc, addr[i], len[i] - AES_BLOCK_SIZE); in aes_s2v() 50 crypto_xor(d, addr[i] + len[i] - AES_BLOCK_SIZE, in aes_s2v() 59 /* V = AES-CMAC(K, T) */ in aes_s2v() 87 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in aes_siv_encrypt() 99 * overwriting this during AES-CTR. in aes_siv_encrypt() [all …]
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_mech.c | 1 // SPDX-License-Identifier: BSD-3-Clause 5 * Copyright (c) 2001-2008 The Regents of the University of Michigan. 36 * AES-128 with SHA-1 (RFC 3962) 41 .name = "aes128-cts", 42 .encrypt_name = "cts(cbc(aes))", 43 .aux_cipher = "cbc(aes)", 54 .signalg = -1, 55 .sealalg = -1, 65 * AES-256 with SHA-1 (RFC 3962) 70 .name = "aes256-cts", [all …]
|
| H A D | gss_krb5_keys.c | 73 * krb5_nfold - n-fold function 79 * This is the n-fold function as described in rfc3961, sec 5.1 104 for (i = ulcm-1; i >= 0; i--) { in krb5_nfold() 109 ((inbits << 3) - 1) in krb5_nfold() 115 + ((inbits - (i % inbits)) << 3) in krb5_nfold() 119 byte += (((in[((inbits - 1) - (msbit >> 3)) % inbits] << 8)| in krb5_nfold() 120 (in[((inbits) - (msbit >> 3)) % inbits])) in krb5_nfold() 134 for (i = outbits - 1; i >= 0; i--) { in krb5_nfold() 158 int ret = -EINVAL; in krb5_DK() 160 keybytes = gk5e->keybytes; in krb5_DK() [all …]
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-cmac.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AMD Cryptographic Coprocessor (CCP) AES CMAC crypto API support 16 #include <crypto/aes.h> 21 #include "ccp-crypto.h" 34 if (rctx->hash_rem) { in ccp_aes_cmac_complete() 36 unsigned int offset = rctx->nbytes - rctx->hash_rem; in ccp_aes_cmac_complete() 38 scatterwalk_map_and_copy(rctx->buf, rctx->src, in ccp_aes_cmac_complete() 39 offset, rctx->hash_rem, 0); in ccp_aes_cmac_complete() 40 rctx->buf_count = rctx->hash_rem; in ccp_aes_cmac_complete() 42 rctx->buf_count = 0; in ccp_aes_cmac_complete() [all …]
|
| H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_CCP_DD) += ccp.o 3 ccp-objs := sp-dev.o sp-platform.o 4 ccp-$(CONFIG_CRYPTO_DEV_SP_CCP) += ccp-dev.o \ 5 ccp-ops.o \ 6 ccp-dev-v3.o \ 7 ccp-dev-v5.o \ 8 ccp-dmaengine.o 9 ccp-$(CONFIG_CRYPTO_DEV_CCP_DEBUGFS) += ccp-debugfs.o 10 ccp-$(CONFIG_PCI) += sp-pci.o [all …]
|
| H A D | ccp-crypto.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 17 #include <crypto/aes.h> 59 /* Child algorithm used for HMAC, CMAC, etc */ 82 struct crypto_alg *alg = tfm->__crt_alg; in ccp_crypto_ahash_alg() 90 /***** AES related defines *****/ 105 /* CMAC key structures */ 182 /* SHA-related defines 266 struct ccp_aes_ctx aes; member
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | nvidia,tegra234-se-aes.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-aes.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: NVIDIA Tegra Security Engine for AES algorithms 10 The Tegra Security Engine accelerates the following AES encryption/decryption 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM, 12 AES-CMAC 15 - Akhil R <akhilrajeev@nvidia.com> 19 const: nvidia,tegra234-se-aes [all …]
|
| /linux/fs/smb/client/ |
| H A D | smb2transport.c | 1 // SPDX-License-Identifier: LGPL-2.1 33 struct cifs_secmech *p = &server->secmech; in smb3_crypto_shash_allocate() 35 return cifs_alloc_hash("cmac(aes)", &p->aes_cmac); in smb3_crypto_shash_allocate() 51 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server; in smb3_get_sign_key() 53 list_for_each_entry(ses, &pserver->smb_ses_list, smb_ses_list) { in smb3_get_sign_key() 54 if (ses->Suid == ses_id) in smb3_get_sign_key() 60 rc = -ENOENT; in smb3_get_sign_key() 64 spin_lock(&ses->ses_lock); in smb3_get_sign_key() 65 spin_lock(&ses->chan_lock); in smb3_get_sign_key() 68 ses->ses_status == SES_GOOD); in smb3_get_sign_key() [all …]
|
| /linux/arch/arm64/crypto/ |
| H A D | aes-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * linux/arch/arm64/crypto/aes-glue.c - wrapper code for ARMv8 AES 5 * Copyright (C) 2013 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org> 8 #include <crypto/aes.h> 24 #include "aes-ce-setkey.h" 43 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 Crypto Extensions"); 60 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 NEON"); 63 MODULE_ALIAS_CRYPTO("ecb(aes)"); 64 MODULE_ALIAS_CRYPTO("cbc(aes)"); 65 MODULE_ALIAS_CRYPTO("ctr(aes)"); [all …]
|
| /linux/crypto/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 156 cbc(aes), and the support for the crypto self-tests. 175 cbc(aes). 178 bool "Enable cryptographic self-tests" 181 Enable the cryptographic self-tests. 183 The cryptographic self-tests run at boot time, or at algorithm 188 - Development and pre-release testing. In this case, also enable 192 - Production kernels, to help prevent buggy drivers from being used 193 and/or meet FIPS 140-3 pre-operational testing requirements. In 197 bool "Enable the full set of cryptographic self-tests" [all …]
|
| H A D | tcrypt.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 12 * Updated RFC4106 AES-GCM testing. 91 while (i-- > 0) in testmgr_alloc_buf() 94 return -ENOMEM; in testmgr_alloc_buf() 109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead() 124 np--; in sg_init_aead() 134 struct crypto_wait *wait = req->base.data; in do_one_aead_op() 185 return -ENOMEM; in test_mb_aead_jiffies() 212 return -ENOMEM; in test_mb_aead_cycles() [all …]
|
| H A D | testmgr.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 6 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 11 * Updated RFC4106 AES-GCM testing. 46 MODULE_PARM_DESC(notests, "disable all crypto self-tests"); 51 MODULE_PARM_DESC(noslowtests, "disable slow crypto self-tests"); 98 * behavior when the two IV copies differ is implementation-defined. 179 while (i-- > 0) in __testmgr_alloc_buf() 182 return -ENOMEM; in __testmgr_alloc_buf() 225 /* likewise, but also export and re-import the intermediate state */ 237 * Whether the crypto operation will occur in-place, and if so whether the [all …]
|
| /linux/fs/smb/server/ |
| H A D | crypto_ctx.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 34 crypto_free_shash(shash->tfm); in free_shash() 45 tfm = crypto_alloc_aead("gcm(aes)", 0, 0); in alloc_aead() 48 tfm = crypto_alloc_aead("ccm(aes)", 0, 0); in alloc_aead() 70 tfm = crypto_alloc_shash("cmac(aes)", in alloc_shash_desc() [all...] |
| /linux/drivers/crypto/ccree/ |
| H A D | cc_hash.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */ 27 /* this struct was taken from drivers/crypto/nx/nx-aes-xcbc.c and it is used 28 * for xcbc/cmac statesize 61 return &state->buf_cnt[state->buff_index]; in cc_hash_buf_cnt() 66 return state->buffers[state->buff_index]; in cc_hash_buf() 71 return &state->buf_cnt[state->buff_index ^ 1]; in cc_next_buf_cnt() 76 return state->buffers[state->buff_index ^ 1]; in cc_next_buf() 84 * cc_digest_len_addr() - Gets the initial digest length 95 * cc_larval_digest_addr() - Gets the address of the initial digest in SRAM
|
| /linux/tools/testing/selftests/net/tcp_ao/lib/ |
| H A D | sock.c | 1 // SPDX-License-Identifier: GPL-2.0 54 return -errno; in __test_wait_fd() 57 return -ETIMEDOUT; in __test_wait_fd() 61 return -errno; in __test_wait_fd() 63 return -ret; in __test_wait_fd() 101 if (ret != -ETIMEDOUT) in __test_skpair_poll() 109 *err = -ETIMEDOUT; in __test_skpair_poll() 110 return -ETIMEDOUT; in __test_skpair_poll() 132 err = -errno; in __test_connect_socket() 217 ao->set_current = !!set_current; in test_prepare_key_sockaddr() [all …]
|
| /linux/net/xfrm/ |
| H A D | xfrm_algo.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 29 .name = "rfc4106(gcm(aes))", 48 .name = "rfc4106(gcm(aes))", 67 .name = "rfc4106(gcm(aes))", 86 .name = "rfc4309(ccm(aes))", 105 .name = "rfc4309(ccm(aes))", [all...] |
| /linux/drivers/crypto/caam/ |
| H A D | caamhash.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * caam - Freescale FSL CAAM support for ahash functions of crypto API 6 * Copyright 2018-2019, 2023 NXP 13 * --------------- --------------- 14 * | JobDesc #1 |-------------------->| ShareDesc | 16 * --------------- | (operation) | 17 * --------------- 21 * --------------- --------------- 22 * | JobDesc #2 |-------------------->| ShareDesc | 23 * | *(packet 2) | |------------->| (hashKey) | [all …]
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | key-management.c | 1 // SPDX-License-Identifier: GPL-2.0 23 err = add_vrf("ksft-vrf", test_vrf_tabid, test_vrf_ifindex, -1); in setup_vrfs() 27 err = link_set_up("ksft-vrf"); in setup_vrfs() 91 return -errno; in test_del_key() 100 return -EEXIST; in test_del_key() 101 if (err != -E2BIG) in test_del_key() 108 return -ENOTRECOVERABLE; in test_del_key() 110 return -ENOTRECOVERABLE; in test_del_key() 121 if ((err == -EBUSY && fault(BUSY)) || (err == -EINVAL && fault(CURRNEXT))) { in try_delete_key() 162 return -ENOTRECOVERABLE; in test_set_key() [all …]
|
| /linux/drivers/staging/rtl8723bs/core/ |
| H A D | rtw_security.c | 1 // SPDX-License-Identifier: GPL-2.0 4 * Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved. 9 #include <crypto/aes.h> 17 "AES", 47 struct pkt_attrib *pattrib = &((struct xmit_frame *)pxmitframe)->attrib; in rtw_wep_encrypt() 48 struct security_priv *psecuritypriv = &padapter->securitypriv; in rtw_wep_encrypt() 49 struct xmit_priv *pxmitpriv = &padapter->xmitpriv; in rtw_wep_encrypt() 50 struct arc4_ctx *ctx = &psecuritypriv->xmit_arc4_ctx; in rtw_wep_encrypt() 52 if (!((struct xmit_frame *)pxmitframe)->buf_addr) in rtw_wep_encrypt() 56 pframe = ((struct xmit_frame *)pxmitframe)->buf_addr + hw_hdr_offset; in rtw_wep_encrypt() [all …]
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-aes.c | 1 // SPDX-License-Identifier: GPL-2.0-only 2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved. 8 #include <linux/dma-mapping.h> 14 #include <crypto/aes.h> 23 #include "tegra-se.h" 93 /* increment counter (128-bit int) */ 97 --bits; in ctr_iv_inc() 109 offset = req->cryptlen - ctx->ivsize; in tegra_cbc_iv_copyback() 111 if (rctx->encrypt) in tegra_cbc_iv_copyback() 112 memcpy(req->iv, rctx->datbuf.buf + offset, ctx->ivsize); in tegra_cbc_iv_copyback() [all …]
|