| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | architecture.rst | 5 ---------------------- 10 - Symmetric ciphers 12 - AEAD ciphers 14 - Message digest, including keyed message digest 16 - Random number generation 18 - User space interface 21 --------------------- 30 a caller or invoked together with a template to form multi-block ciphers 38 - aes 40 - ecb(aes) [all …]
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | architecture.rst | 5 ---------------------- 10 - Symmetric ciphers 12 - AEAD ciphers 14 - Message digest, including keyed message digest 16 - Random number generation 18 - User space interface 21 --------------------- 30 a caller or invoked together with a template to form multi-block ciphers 38 - aes 40 - ecb(aes) [all …]
|
| /kernel/linux/linux-6.6/arch/powerpc/crypto/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 5 # Arch-specific CryptoAPI modules. 8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o 9 obj-$(CONFIG_CRYPTO_MD5_PPC) += md5-ppc.o 10 obj-$(CONFIG_CRYPTO_SHA1_PPC) += sha1-powerpc.o 11 obj-$(CONFIG_CRYPTO_SHA1_PPC_SPE) += sha1-ppc-spe.o 12 obj-$(CONFIG_CRYPTO_SHA256_PPC_SPE) += sha256-ppc-spe.o 13 obj-$(CONFIG_CRYPTO_CRC32C_VPMSUM) += crc32c-vpmsum.o 14 obj-$(CONFIG_CRYPTO_CRCT10DIF_VPMSUM) += crct10dif-vpmsum.o 15 obj-$(CONFIG_CRYPTO_VPMSUM_TESTER) += crc-vpmsum_test.o [all …]
|
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 14 - AltiVec extensions 26 - AltiVec extensions 48 tristate "Hash functions: SHA-1" 51 SHA-1 secure hash algorithm (FIPS 180) 56 tristate "Hash functions: SHA-1 (SPE)" 59 SHA-1 secure hash algorithm (FIPS 180) 62 - SPE (Signal Processing Engine) extensions 65 tristate "Hash functions: SHA-224 and SHA-256 (SPE)" 70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
| /kernel/linux/linux-6.6/arch/arm64/crypto/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0-only 8 obj-$(CONFIG_CRYPTO_SHA1_ARM64_CE) += sha1-ce.o 9 sha1-ce-y := sha1-ce-glue.o sha1-ce-core.o 11 obj-$(CONFIG_CRYPTO_SHA2_ARM64_CE) += sha2-ce.o 12 sha2-ce-y := sha2-ce-glue.o sha2-ce-core.o 14 obj-$(CONFIG_CRYPTO_SHA512_ARM64_CE) += sha512-ce.o 15 sha512-ce-y := sha512-ce-glue.o sha512-ce-core.o 17 obj-$(CONFIG_CRYPTO_SHA3_ARM64) += sha3-ce.o 18 sha3-ce-y := sha3-ce-glue.o sha3-ce-core.o 20 obj-$(CONFIG_CRYPTO_SM3_NEON) += sm3-neon.o [all …]
|
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 GCM GHASH function (NIST SP800-38D) 16 - ARMv8 Crypto Extensions 26 - NEON (Advanced SIMD) extensions 37 - NEON (Advanced SIMD) extensions 40 tristate "Hash functions: SHA-1 (ARMv8 Crypto Extensions)" 45 SHA-1 secure hash algorithm (FIPS 180) 48 - ARMv8 Crypto Extensions 51 tristate "Hash functions: SHA-224 and SHA-256" 54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/s390/cf_z16/ |
| D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-galois.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 17 #include <crypto/aes.h> 19 #include <crypto/gcm.h> 22 #include "ccp-crypto.h" 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 45 return -EINVAL; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-galois.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support 17 #include <crypto/aes.h> 19 #include <crypto/gcm.h> 22 #include "ccp-crypto.h" 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 45 return -EINVAL; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() [all …]
|
| /kernel/linux/linux-6.6/arch/s390/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 18 tristate "Hash functions: SHA-384 and SHA-512" 22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 29 tristate "Hash functions: SHA-1" 33 SHA-1 secure hash algorithm (FIPS 180) 40 tristate "Hash functions: SHA-224 and SHA-256" 44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 51 tristate "Hash functions: SHA3-224 and SHA3-256" 55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 62 tristate "Hash functions: SHA3-384 and SHA3-512" [all …]
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/ |
| D | xlnx,zynqmp-aes.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/xlnx,zynqmp-aes.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Xilinx ZynqMP AES-GCM Hardware Accelerator 10 - Kalyani Akula <kalyani.akula@amd.com> 11 - Michal Simek <michal.simek@amd.com> 14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to 19 const: xlnx,zynqmp-aes 22 - compatible [all …]
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/crypto/ |
| D | xlnx,zynqmp-aes.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/xlnx,zynqmp-aes.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Xilinx ZynqMP AES-GCM Hardware Accelerator Device Tree Bindings 10 - Kalyani Akula <kalyani.akula@xilinx.com> 11 - Michal Simek <michal.simek@xilinx.com> 14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to 19 const: xlnx,zynqmp-aes 22 - compatible [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/intel/keembay/ |
| D | Kconfig | 2 tristate "Support for Intel Keem Bay OCS AES/SM4 HW acceleration" 9 Support for Intel Keem Bay Offload and Crypto Subsystem (OCS) AES and 13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4) 14 and gcm(sm4). 17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)). 20 bool "Support for Intel Keem Bay OCS AES/SM4 ECB HW acceleration" 24 AES/SM4 ECB mode hardware acceleration for use with Crypto API. 26 Provides OCS version of ecb(aes) and ecb(sm4) 28 Intel does not recommend use of ECB mode with AES/SM4. 31 bool "Support for Intel Keem Bay OCS AES/SM4 CTS HW acceleration" [all …]
|
| D | keembay-ocs-aes-core.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Intel Keem Bay OCS AES Crypto Driver. 5 * Copyright (C) 2018-2020 Intel Corporation 8 #include <crypto/aes.h> 10 #include <crypto/gcm.h> 16 #include <linux/dma-mapping.h> 26 #include "ocs-aes.h" 29 #define DRV_NAME "keembay-ocs-aes" 39 * struct ocs_aes_tctx - OCS AES Transform context 40 * @aes_dev: The OCS AES device. [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ccree/ |
| D | cc_aead.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */ 15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */ 20 /* defines for AES GCM configuration buffer */ 28 /* Offsets into AES CCM configuration buffer */ 39 ccm_header_size_null = -1, 49 * Used for both: digest HW compare and CCM/GCM MAC value 54 //used in gcm 75 //used in gcm 76 /* buffer for internal gcm configurations */ [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/ccree/ |
| D | cc_aead.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */ 15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */ 20 /* defines for AES GCM configuration buffer */ 28 /* Offsets into AES CCM configuration buffer */ 39 ccm_header_size_null = -1, 49 * Used for both: digest HW compare and CCM/GCM MAC value 54 //used in gcm 75 //used in gcm 76 /* buffer for internal gcm configurations */ [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/nx/ |
| D | nx-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver 11 #include <crypto/aes.h> 13 #include <crypto/gcm.h> 28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key() 29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key() 37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key() 42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key() 47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key() 50 return -EINVAL; in gcm_aes_nx_set_key() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/nx/ |
| D | nx-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver 11 #include <crypto/aes.h> 13 #include <crypto/gcm.h> 28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key() 29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key() 37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key() 42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key() 47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key() 50 return -EINVAL; in gcm_aes_nx_set_key() [all …]
|
| /kernel/linux/linux-6.6/lib/crypto/ |
| D | aesgcm.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Minimal library implementation of GCM 11 #include <crypto/gcm.h> 22 * In AES-GCM, both the GHASH key derivation and the CTR mode in aesgcm_encrypt_block() 24 * timing attacks on the encryption key. The AES library already in aesgcm_encrypt_block() 25 * mitigates this risk to some extent by pulling the entire S-box into in aesgcm_encrypt_block() 35 * aesgcm_expandkey - Expands the AES and GHASH keys for the AES-GCM key 38 * @ctx: The data structure that will hold the AES-GCM key schedule 39 * @key: The AES encryption input key 41 * @authsize: The size in bytes of the GCM authentication tag [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/net/ |
| D | l2tp.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 # host-1 | router | host-2 29 if [ ${rc} -eq ${expected} ]; then 30 printf "TEST: %-60s [ OK ]\n" "${msg}" 35 printf "TEST: %-60s [FAIL]\n" "${msg}" 62 if [ "$VERBOSE" = "1" -a -n "$out" ]; then 80 [ -z "${addr}" ] && addr="-" 81 [ -z "${addr6}" ] && addr6="-" 85 ip -netns ${ns} link set lo up 86 if [ "${addr}" != "-" ]; then [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/net/ |
| D | l2tp.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 # host-1 | router | host-2 29 if [ ${rc} -eq ${expected} ]; then 30 printf "TEST: %-60s [ OK ]\n" "${msg}" 35 printf "TEST: %-60s [FAIL]\n" "${msg}" 62 if [ "$VERBOSE" = "1" -a -n "$out" ]; then 80 [ -z "${addr}" ] && addr="-" 81 [ -z "${addr6}" ] && addr6="-" 85 ip -netns ${ns} link set lo up 86 if [ "${addr}" != "-" ]; then [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | tcrypt.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 12 * Updated RFC4106 AES-GCM testing. 91 while (i-- > 0) in testmgr_alloc_buf() 94 return -ENOMEM; in testmgr_alloc_buf() 109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead() 124 np--; in sg_init_aead() 134 struct crypto_wait *wait = req->base.data; in do_one_aead_op() 185 return -ENOMEM; in test_mb_aead_jiffies() 212 return -ENOMEM; in test_mb_aead_cycles() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/xilinx/ |
| D | zynqmp-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Xilinx ZynqMP AES Driver. 7 #include <crypto/aes.h> 9 #include <crypto/gcm.h> 13 #include <linux/dma-mapping.h> 18 #include <linux/firmware/xlnx-zynqmp.h> 82 struct device *dev = tfm_ctx->dev; in zynqmp_aes_aead_cipher() 92 if (tfm_ctx->keysrc == ZYNQMP_AES_KUP_KEY) in zynqmp_aes_aead_cipher() 93 dma_size = req->cryptlen + ZYNQMP_AES_KEY_SIZE in zynqmp_aes_aead_cipher() 96 dma_size = req->cryptlen + GCM_AES_IV_SIZE; in zynqmp_aes_aead_cipher() [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/xilinx/ |
| D | zynqmp-aes-gcm.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Xilinx ZynqMP AES Driver. 7 #include <crypto/aes.h> 9 #include <crypto/gcm.h> 12 #include <linux/dma-mapping.h> 14 #include <linux/firmware/xlnx-zynqmp.h> 82 struct device *dev = tfm_ctx->dev; in zynqmp_aes_aead_cipher() 92 if (tfm_ctx->keysrc == ZYNQMP_AES_KUP_KEY) in zynqmp_aes_aead_cipher() 93 dma_size = req->cryptlen + ZYNQMP_AES_KEY_SIZE in zynqmp_aes_aead_cipher() 96 dma_size = req->cryptlen + GCM_AES_IV_SIZE; in zynqmp_aes_aead_cipher() [all …]
|
| /kernel/linux/linux-6.6/arch/x86/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 14 - ADX (large integer arithmetic) 17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTR, XTS, GCM (AES-NI)" 25 Block cipher: AES cipher algorithms 26 AEAD cipher: AES with GCM 27 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTR, XTS 29 Architecture: x86 (32-bit and 64-bit) using: 30 - AES-NI (AES new instructions) 40 Length-preserving ciphers: Blowfish with ECB and CBC modes 51 Length-preserving ciphers: Camellia with ECB and CBC modes [all …]
|