| /kernel/linux/linux-4.19/Documentation/crypto/ |
| D | architecture.rst | 5 ---------------------- 10 - Symmetric ciphers 12 - AEAD ciphers 14 - Message digest, including keyed message digest 16 - Random number generation 18 - User space interface 21 --------------------- 30 a caller or invoked together with a template to form multi-block ciphers 38 - aes 40 - ecb(aes) [all …]
|
| D | api.rst | 9 rfc4106(gcm(aes)) is the AEAD cipher with external IV generation and 10 seqniv(rfc4106(gcm(aes))) implies that the kernel crypto API generates 13 .. class:: toc-title 20 api-skcipher 21 api-aead 22 api-digest 23 api-rng 24 api-akcipher 25 api-kpp
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | architecture.rst | 5 ---------------------- 10 - Symmetric ciphers 12 - AEAD ciphers 14 - Message digest, including keyed message digest 16 - Random number generation 18 - User space interface 21 --------------------- 30 a caller or invoked together with a template to form multi-block ciphers 38 - aes 40 - ecb(aes) [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-galois.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 17 #include <crypto/aes.h> 19 #include <crypto/gcm.h> 22 #include "ccp-crypto.h" 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 45 return -EINVAL; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() [all …]
|
| /kernel/linux/linux-4.19/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-galois.c | 2 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 20 #include <crypto/aes.h> 22 #include <crypto/gcm.h> 25 #include "ccp-crypto.h" 39 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 45 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 49 return -EINVAL; in ccp_aes_gcm_setkey() 52 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() 53 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() [all …]
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/crypto/ |
| D | xlnx,zynqmp-aes.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/xlnx,zynqmp-aes.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Xilinx ZynqMP AES-GCM Hardware Accelerator Device Tree Bindings 10 - Kalyani Akula <kalyani.akula@xilinx.com> 11 - Michal Simek <michal.simek@xilinx.com> 14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to 19 const: xlnx,zynqmp-aes 22 - compatible [all …]
|
| /kernel/linux/linux-4.19/drivers/crypto/ccree/ |
| D | cc_aead.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2012-2018 ARM Limited or its affiliates. */ 15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */ 20 /* defines for AES GCM configuration buffer */ 28 /* Offsets into AES CCM configuration buffer */ 39 ccm_header_size_null = -1, 49 * Used for both: digest HW compare and CCM/GCM MAC value 54 //used in gcm 76 //used in gcm 77 /* buffer for internal gcm configurations */ [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ccree/ |
| D | cc_aead.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */ 15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */ 20 /* defines for AES GCM configuration buffer */ 28 /* Offsets into AES CCM configuration buffer */ 39 ccm_header_size_null = -1, 49 * Used for both: digest HW compare and CCM/GCM MAC value 54 //used in gcm 75 //used in gcm 76 /* buffer for internal gcm configurations */ [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/nx/ |
| D | nx-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver 11 #include <crypto/aes.h> 13 #include <crypto/gcm.h> 28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key() 29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key() 37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key() 42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key() 47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key() 50 return -EINVAL; in gcm_aes_nx_set_key() [all …]
|
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_NX_ENCRYPT) += nx-crypto.o 3 nx-crypto-objs := nx.o \ 5 nx-aes-cbc.o \ 6 nx-aes-ecb.o \ 7 nx-aes-gcm.o \ 8 nx-aes-ccm.o \ 9 nx-aes-ctr.o \ 10 nx-aes-xcbc.o \ 11 nx-sha256.o \ [all …]
|
| /kernel/linux/linux-4.19/drivers/crypto/nx/ |
| D | nx-aes-gcm.c | 2 * AES GCM routines supporting the Power 7+ Nest Accelerators driver 23 #include <crypto/aes.h> 25 #include <crypto/gcm.h> 40 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key() 41 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key() 49 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key() 54 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key() 59 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key() 62 return -EINVAL; in gcm_aes_nx_set_key() 65 csbcpb->cpb.hdr.mode = NX_MODE_AES_GCM; in gcm_aes_nx_set_key() [all …]
|
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_NX_ENCRYPT) += nx-crypto.o 3 nx-crypto-objs := nx.o \ 5 nx-aes-cbc.o \ 6 nx-aes-ecb.o \ 7 nx-aes-gcm.o \ 8 nx-aes-ccm.o \ 9 nx-aes-ctr.o \ 10 nx-aes-xcbc.o \ 11 nx-sha256.o \ [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/net/ |
| D | l2tp.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 # host-1 | router | host-2 29 if [ ${rc} -eq ${expected} ]; then 30 printf "TEST: %-60s [ OK ]\n" "${msg}" 35 printf "TEST: %-60s [FAIL]\n" "${msg}" 62 if [ "$VERBOSE" = "1" -a -n "$out" ]; then 80 [ -z "${addr}" ] && addr="-" 81 [ -z "${addr6}" ] && addr6="-" 85 ip -netns ${ns} link set lo up 86 if [ "${addr}" != "-" ]; then [all …]
|
| /kernel/linux/linux-4.19/drivers/crypto/mediatek/ |
| D | mtk-aes.c | 4 * Driver for EIP97 AES acceleration. 12 * Some ideas are from atmel-aes.c drivers. 15 #include <crypto/aes.h> 16 #include <crypto/gcm.h> 17 #include "mtk-platform.h" 22 & ~(AES_BLOCK_SIZE - 1)) 29 /* AES-CBC/ECB/CTR command token */ 33 /* AES-GCM command token */ 42 /* AES transform information word 0 fields */ 53 /* AES transform information word 1 fields */ [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/xilinx/ |
| D | zynqmp-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Xilinx ZynqMP AES Driver. 7 #include <crypto/aes.h> 9 #include <crypto/gcm.h> 13 #include <linux/dma-mapping.h> 18 #include <linux/firmware/xlnx-zynqmp.h> 82 struct device *dev = tfm_ctx->dev; in zynqmp_aes_aead_cipher() 92 if (tfm_ctx->keysrc == ZYNQMP_AES_KUP_KEY) in zynqmp_aes_aead_cipher() 93 dma_size = req->cryptlen + ZYNQMP_AES_KEY_SIZE in zynqmp_aes_aead_cipher() 96 dma_size = req->cryptlen + GCM_AES_IV_SIZE; in zynqmp_aes_aead_cipher() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/mediatek/ |
| D | mtk-aes.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Driver for EIP97 AES acceleration. 9 * Some ideas are from atmel-aes.c drivers. 12 #include <crypto/aes.h> 13 #include <crypto/gcm.h> 15 #include "mtk-platform.h" 20 & ~(AES_BLOCK_SIZE - 1)) 27 /* AES-CBC/ECB/CTR/OFB/CFB command token */ 31 /* AES-GCM command token */ 40 /* AES transform information word 0 fields */ [all …]
|
| /kernel/linux/linux-4.19/arch/x86/crypto/ |
| D | aesni-intel_glue.c | 2 * Support for Intel AES-NI instructions. This file contains glue 3 * code, the real AES implementation is in intel-aes_asm.S. 8 * Added RFC4106 AES-GCM support for 128-bit keys under the AEAD 9 * interface for 64-bit kernels. 27 #include <crypto/aes.h> 31 #include <crypto/gcm.h> 35 #include <asm/crypto/aes.h> 49 #define AES_BLOCK_MASK (~(AES_BLOCK_SIZE - 1)) 51 #define AESNI_ALIGN_EXTRA ((AESNI_ALIGN - 1) & ~(CRYPTO_MINALIGN - 1)) 122 * void *ctx, AES Key schedule. Starts on a 16 byte boundary. [all …]
|
| /kernel/linux/linux-5.10/net/xfrm/ |
| D | xfrm_algo.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 28 .name = "rfc4106(gcm(aes))", 47 .name = "rfc4106(gcm(aes))", 66 .name = "rfc4106(gcm(aes))", 85 .name = "rfc4309(ccm(aes))", 104 .name = "rfc4309(ccm(aes))", 123 .name = "rfc4309(ccm(aes))", 142 .name = "rfc4543(gcm(aes))", 313 .name = "xcbc(aes)", 333 .name = "cmac(aes)", [all …]
|
| /kernel/linux/linux-4.19/net/xfrm/ |
| D | xfrm_algo.c | 32 .name = "rfc4106(gcm(aes))", 51 .name = "rfc4106(gcm(aes))", 70 .name = "rfc4106(gcm(aes))", 89 .name = "rfc4309(ccm(aes))", 108 .name = "rfc4309(ccm(aes))", 127 .name = "rfc4309(ccm(aes))", 146 .name = "rfc4543(gcm(aes))", 317 .name = "xcbc(aes)", 337 .name = "cmac(aes)", 456 .name = "cbc(aes)", [all …]
|
| /kernel/linux/linux-4.19/arch/arm64/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 57 tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions" 75 tristate "AES core cipher using scalar instructions" 79 tristate "AES core cipher using ARMv8 Crypto Extensions" 85 tristate "AES in CCM mode using ARMv8 Crypto Extensions" [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 57 tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions" 69 tristate "AES core cipher using scalar instructions" 73 tristate "AES core cipher using ARMv8 Crypto Extensions" 79 tristate "AES in CCM mode using ARMv8 Crypto Extensions" [all …]
|
| /kernel/linux/linux-4.19/drivers/crypto/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 3 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA) += atmel-sha.o 4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_TDES) += atmel-tdes.o 5 obj-$(CONFIG_CRYPTO_DEV_ATMEL_ECC) += atmel-ecc.o 6 obj-$(CONFIG_CRYPTO_DEV_CAVIUM_ZIP) += cavium/ 7 obj-$(CONFIG_CRYPTO_DEV_CCP) += ccp/ 8 obj-$(CONFIG_CRYPTO_DEV_CCREE) += ccree/ 9 obj-$(CONFIG_CRYPTO_DEV_CHELSIO) += chelsio/ 10 obj-$(CONFIG_CRYPTO_DEV_CPT) += cavium/cpt/ [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | ghash-generic.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * GHASH: hash function for GCM (Galois/Counter Mode). 5 * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi> 11 * GHASH is a keyed hash function used in GCM authentication tag generation. 13 * The original GCM paper [1] presents GHASH as a function GHASH(H, A, C) which 14 * takes a 16-byte hash key H, additional authenticated data A, and a ciphertext 18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X 19 * is the already-formatted byte string containing both A and C. 21 * "ghash" in the Linux crypto API uses the 'X' (pre-formatted) convention, 23 * formatting of 'A' and 'C' is done in the "gcm" template, not in "ghash". [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_ALLWINNER) += allwinner/ 3 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA) += atmel-sha.o 5 obj-$(CONFIG_CRYPTO_DEV_ATMEL_TDES) += atmel-tdes.o 6 obj-$(CONFIG_CRYPTO_DEV_ATMEL_I2C) += atmel-i2c.o 7 obj-$(CONFIG_CRYPTO_DEV_ATMEL_ECC) += atmel-ecc.o 8 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA204A) += atmel-sha204a.o 9 obj-$(CONFIG_CRYPTO_DEV_CAVIUM_ZIP) += cavium/ 10 obj-$(CONFIG_CRYPTO_DEV_CCP) += ccp/ [all …]
|
| /kernel/linux/linux-4.19/arch/arm/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 tristate "SHA1 digest algorithm (ARM-asm)" 17 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented 27 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented 37 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 46 SHA-256 secure hash standard (DFIPS 180-2) implemented 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 54 SHA-256 secure hash standard (DFIPS 180-2) implemented 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" [all …]
|