Home
last modified time | relevance | path

Searched +full:aes +full:- +full:gcm (Results 1 – 25 of 160) sorted by relevance

1234567

/kernel/linux/linux-4.19/Documentation/crypto/
Darchitecture.rst5 ----------------------
10 - Symmetric ciphers
12 - AEAD ciphers
14 - Message digest, including keyed message digest
16 - Random number generation
18 - User space interface
21 ---------------------
30 a caller or invoked together with a template to form multi-block ciphers
38 - aes
40 - ecb(aes)
[all …]
Dapi.rst9 rfc4106(gcm(aes)) is the AEAD cipher with external IV generation and
10 seqniv(rfc4106(gcm(aes))) implies that the kernel crypto API generates
13 .. class:: toc-title
20 api-skcipher
21 api-aead
22 api-digest
23 api-rng
24 api-akcipher
25 api-kpp
/kernel/linux/linux-5.10/Documentation/crypto/
Darchitecture.rst5 ----------------------
10 - Symmetric ciphers
12 - AEAD ciphers
14 - Message digest, including keyed message digest
16 - Random number generation
18 - User space interface
21 ---------------------
30 a caller or invoked together with a template to form multi-block ciphers
38 - aes
40 - ecb(aes)
[all …]
/kernel/linux/linux-5.10/drivers/crypto/ccp/
Dccp-crypto-aes-galois.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support
17 #include <crypto/aes.h>
19 #include <crypto/gcm.h>
22 #include "ccp-crypto.h"
36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey()
39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey()
42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey()
45 return -EINVAL; in ccp_aes_gcm_setkey()
48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey()
[all …]
/kernel/linux/linux-4.19/drivers/crypto/ccp/
Dccp-crypto-aes-galois.c2 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support
20 #include <crypto/aes.h>
22 #include <crypto/gcm.h>
25 #include "ccp-crypto.h"
39 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey()
42 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey()
45 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey()
49 return -EINVAL; in ccp_aes_gcm_setkey()
52 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey()
53 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey()
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/crypto/
Dxlnx,zynqmp-aes.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/xlnx,zynqmp-aes.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Xilinx ZynqMP AES-GCM Hardware Accelerator Device Tree Bindings
10 - Kalyani Akula <kalyani.akula@xilinx.com>
11 - Michal Simek <michal.simek@xilinx.com>
14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to
19 const: xlnx,zynqmp-aes
22 - compatible
[all …]
/kernel/linux/linux-4.19/drivers/crypto/ccree/
Dcc_aead.h1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (C) 2012-2018 ARM Limited or its affiliates. */
15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */
20 /* defines for AES GCM configuration buffer */
28 /* Offsets into AES CCM configuration buffer */
39 ccm_header_size_null = -1,
49 * Used for both: digest HW compare and CCM/GCM MAC value
54 //used in gcm
76 //used in gcm
77 /* buffer for internal gcm configurations */
[all …]
/kernel/linux/linux-5.10/drivers/crypto/ccree/
Dcc_aead.h1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */
15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */
20 /* defines for AES GCM configuration buffer */
28 /* Offsets into AES CCM configuration buffer */
39 ccm_header_size_null = -1,
49 * Used for both: digest HW compare and CCM/GCM MAC value
54 //used in gcm
75 //used in gcm
76 /* buffer for internal gcm configurations */
[all …]
/kernel/linux/linux-5.10/drivers/crypto/nx/
Dnx-aes-gcm.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver
11 #include <crypto/aes.h>
13 #include <crypto/gcm.h>
28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key()
29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key()
37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key()
42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key()
47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key()
50 return -EINVAL; in gcm_aes_nx_set_key()
[all …]
DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_NX_ENCRYPT) += nx-crypto.o
3 nx-crypto-objs := nx.o \
5 nx-aes-cbc.o \
6 nx-aes-ecb.o \
7 nx-aes-gcm.o \
8 nx-aes-ccm.o \
9 nx-aes-ctr.o \
10 nx-aes-xcbc.o \
11 nx-sha256.o \
[all …]
/kernel/linux/linux-4.19/drivers/crypto/nx/
Dnx-aes-gcm.c2 * AES GCM routines supporting the Power 7+ Nest Accelerators driver
23 #include <crypto/aes.h>
25 #include <crypto/gcm.h>
40 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key()
41 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key()
49 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key()
54 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key()
59 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key()
62 return -EINVAL; in gcm_aes_nx_set_key()
65 csbcpb->cpb.hdr.mode = NX_MODE_AES_GCM; in gcm_aes_nx_set_key()
[all …]
DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_NX_ENCRYPT) += nx-crypto.o
3 nx-crypto-objs := nx.o \
5 nx-aes-cbc.o \
6 nx-aes-ecb.o \
7 nx-aes-gcm.o \
8 nx-aes-ccm.o \
9 nx-aes-ctr.o \
10 nx-aes-xcbc.o \
11 nx-sha256.o \
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/net/
Dl2tp.sh2 # SPDX-License-Identifier: GPL-2.0
6 # host-1 | router | host-2
29 if [ ${rc} -eq ${expected} ]; then
30 printf "TEST: %-60s [ OK ]\n" "${msg}"
35 printf "TEST: %-60s [FAIL]\n" "${msg}"
62 if [ "$VERBOSE" = "1" -a -n "$out" ]; then
80 [ -z "${addr}" ] && addr="-"
81 [ -z "${addr6}" ] && addr6="-"
85 ip -netns ${ns} link set lo up
86 if [ "${addr}" != "-" ]; then
[all …]
/kernel/linux/linux-4.19/drivers/crypto/mediatek/
Dmtk-aes.c4 * Driver for EIP97 AES acceleration.
12 * Some ideas are from atmel-aes.c drivers.
15 #include <crypto/aes.h>
16 #include <crypto/gcm.h>
17 #include "mtk-platform.h"
22 & ~(AES_BLOCK_SIZE - 1))
29 /* AES-CBC/ECB/CTR command token */
33 /* AES-GCM command token */
42 /* AES transform information word 0 fields */
53 /* AES transform information word 1 fields */
[all …]
/kernel/linux/linux-5.10/drivers/crypto/xilinx/
Dzynqmp-aes-gcm.c1 // SPDX-License-Identifier: GPL-2.0
3 * Xilinx ZynqMP AES Driver.
7 #include <crypto/aes.h>
9 #include <crypto/gcm.h>
13 #include <linux/dma-mapping.h>
18 #include <linux/firmware/xlnx-zynqmp.h>
82 struct device *dev = tfm_ctx->dev; in zynqmp_aes_aead_cipher()
92 if (tfm_ctx->keysrc == ZYNQMP_AES_KUP_KEY) in zynqmp_aes_aead_cipher()
93 dma_size = req->cryptlen + ZYNQMP_AES_KEY_SIZE in zynqmp_aes_aead_cipher()
96 dma_size = req->cryptlen + GCM_AES_IV_SIZE; in zynqmp_aes_aead_cipher()
[all …]
/kernel/linux/linux-5.10/drivers/crypto/mediatek/
Dmtk-aes.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Driver for EIP97 AES acceleration.
9 * Some ideas are from atmel-aes.c drivers.
12 #include <crypto/aes.h>
13 #include <crypto/gcm.h>
15 #include "mtk-platform.h"
20 & ~(AES_BLOCK_SIZE - 1))
27 /* AES-CBC/ECB/CTR/OFB/CFB command token */
31 /* AES-GCM command token */
40 /* AES transform information word 0 fields */
[all …]
/kernel/linux/linux-4.19/arch/x86/crypto/
Daesni-intel_glue.c2 * Support for Intel AES-NI instructions. This file contains glue
3 * code, the real AES implementation is in intel-aes_asm.S.
8 * Added RFC4106 AES-GCM support for 128-bit keys under the AEAD
9 * interface for 64-bit kernels.
27 #include <crypto/aes.h>
31 #include <crypto/gcm.h>
35 #include <asm/crypto/aes.h>
49 #define AES_BLOCK_MASK (~(AES_BLOCK_SIZE - 1))
51 #define AESNI_ALIGN_EXTRA ((AESNI_ALIGN - 1) & ~(CRYPTO_MINALIGN - 1))
122 * void *ctx, AES Key schedule. Starts on a 16 byte boundary.
[all …]
/kernel/linux/linux-5.10/net/xfrm/
Dxfrm_algo.c1 // SPDX-License-Identifier: GPL-2.0-or-later
28 .name = "rfc4106(gcm(aes))",
47 .name = "rfc4106(gcm(aes))",
66 .name = "rfc4106(gcm(aes))",
85 .name = "rfc4309(ccm(aes))",
104 .name = "rfc4309(ccm(aes))",
123 .name = "rfc4309(ccm(aes))",
142 .name = "rfc4543(gcm(aes))",
313 .name = "xcbc(aes)",
333 .name = "cmac(aes)",
[all …]
/kernel/linux/linux-4.19/net/xfrm/
Dxfrm_algo.c32 .name = "rfc4106(gcm(aes))",
51 .name = "rfc4106(gcm(aes))",
70 .name = "rfc4106(gcm(aes))",
89 .name = "rfc4309(ccm(aes))",
108 .name = "rfc4309(ccm(aes))",
127 .name = "rfc4309(ccm(aes))",
146 .name = "rfc4543(gcm(aes))",
317 .name = "xcbc(aes)",
337 .name = "cmac(aes)",
456 .name = "cbc(aes)",
[all …]
/kernel/linux/linux-4.19/arch/arm64/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
57 tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions"
75 tristate "AES core cipher using scalar instructions"
79 tristate "AES core cipher using ARMv8 Crypto Extensions"
85 tristate "AES in CCM mode using ARMv8 Crypto Extensions"
[all …]
/kernel/linux/linux-5.10/arch/arm64/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
57 tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions"
69 tristate "AES core cipher using scalar instructions"
73 tristate "AES core cipher using ARMv8 Crypto Extensions"
79 tristate "AES in CCM mode using ARMv8 Crypto Extensions"
[all …]
/kernel/linux/linux-4.19/drivers/crypto/
DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o
3 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA) += atmel-sha.o
4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_TDES) += atmel-tdes.o
5 obj-$(CONFIG_CRYPTO_DEV_ATMEL_ECC) += atmel-ecc.o
6 obj-$(CONFIG_CRYPTO_DEV_CAVIUM_ZIP) += cavium/
7 obj-$(CONFIG_CRYPTO_DEV_CCP) += ccp/
8 obj-$(CONFIG_CRYPTO_DEV_CCREE) += ccree/
9 obj-$(CONFIG_CRYPTO_DEV_CHELSIO) += chelsio/
10 obj-$(CONFIG_CRYPTO_DEV_CPT) += cavium/cpt/
[all …]
/kernel/linux/linux-5.10/crypto/
Dghash-generic.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * GHASH: hash function for GCM (Galois/Counter Mode).
5 * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
11 * GHASH is a keyed hash function used in GCM authentication tag generation.
13 * The original GCM paper [1] presents GHASH as a function GHASH(H, A, C) which
14 * takes a 16-byte hash key H, additional authenticated data A, and a ciphertext
18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
19 * is the already-formatted byte string containing both A and C.
21 * "ghash" in the Linux crypto API uses the 'X' (pre-formatted) convention,
23 * formatting of 'A' and 'C' is done in the "gcm" template, not in "ghash".
[all …]
/kernel/linux/linux-5.10/drivers/crypto/
DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_ALLWINNER) += allwinner/
3 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o
4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA) += atmel-sha.o
5 obj-$(CONFIG_CRYPTO_DEV_ATMEL_TDES) += atmel-tdes.o
6 obj-$(CONFIG_CRYPTO_DEV_ATMEL_I2C) += atmel-i2c.o
7 obj-$(CONFIG_CRYPTO_DEV_ATMEL_ECC) += atmel-ecc.o
8 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA204A) += atmel-sha204a.o
9 obj-$(CONFIG_CRYPTO_DEV_CAVIUM_ZIP) += cavium/
10 obj-$(CONFIG_CRYPTO_DEV_CCP) += ccp/
[all …]
/kernel/linux/linux-4.19/arch/arm/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 tristate "SHA1 digest algorithm (ARM-asm)"
17 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
27 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
37 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)"
46 SHA-256 secure hash standard (DFIPS 180-2) implemented
50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)"
54 SHA-256 secure hash standard (DFIPS 180-2) implemented
58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
[all …]

1234567