Home
last modified time | relevance | path

Searched full:nist (Results 1 – 25 of 99) sorted by relevance

1234

/kernel/linux/linux-6.6/arch/arm64/crypto/
DKconfig13 GCM GHASH function (NIST SP800-38D)
162 - ECB (Electronic Codebook) mode (NIST SP800-38A)
163 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
164 - CTR (Counter) mode (NIST SP800-38A)
165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
179 - ECB (Electronic Codebook) mode (NIST SP800-38A)
180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
181 - CTR (Counter) mode (NIST SP800-38A)
182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
210 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
/kernel/linux/linux-6.6/arch/arm/crypto/
DKconfig25 GCM GHASH function (NIST SP800-38D)
177 - ECB (Electronic Codebook) mode (NIST SP800-38A)
178 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
179 - CTR (Counter) mode (NIST SP800-38A)
180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
198 - ECB (Electronic Codebook) mode (NIST SP800-38A)
199 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
200 - CTR (Counter) mode (NIST SP800-38A)
201 - CTS (Cipher Text Stealing) mode (NIST SP800-38A)
202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/kernel/linux/linux-6.6/crypto/
Decdsa.c112 /* faster alternative for NIST p384, p256 & p192 */ in _ecdsa_verify()
273 .cra_name = "ecdsa-nist-p384",
274 .cra_driver_name = "ecdsa-nist-p384-generic",
295 .cra_name = "ecdsa-nist-p256",
296 .cra_driver_name = "ecdsa-nist-p256-generic",
317 .cra_name = "ecdsa-nist-p192",
318 .cra_driver_name = "ecdsa-nist-p192-generic",
330 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init()
367 MODULE_ALIAS_CRYPTO("ecdsa-nist-p192");
368 MODULE_ALIAS_CRYPTO("ecdsa-nist-p256");
[all …]
Decdh.c145 .cra_name = "ecdh-nist-p192",
146 .cra_driver_name = "ecdh-nist-p192-generic",
170 .cra_name = "ecdh-nist-p256",
171 .cra_driver_name = "ecdh-nist-p256-generic",
195 .cra_name = "ecdh-nist-p384",
196 .cra_driver_name = "ecdh-nist-p384-generic",
209 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
DKconfig659 CBC (Cipher Block Chaining) mode (NIST SP800-38A)
668 CFB (Cipher Feedback) mode (NIST SP800-38A)
677 CTR (Counter) mode (NIST SP800-38A)
684 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST
695 ECB (Electronic Codebook) mode (NIST SP800-38A)
717 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F
742 OFB (Output Feedback) mode (NIST SP800-38A)
778 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
829 authenticated encryption mode (NIST SP800-38C)
840 (GCM Message Authentication Code) (NIST SP800-38D)
[all …]
Decc_curve_defs.h5 /* NIST P-192: a = p - 3 */
31 /* NIST P-256: a = p - 3 */
57 /* NIST P-384 */
Dghash-generic.c18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
Dkeywrap.c2 * Key Wrapping: RFC3394 / NIST SP800-38F
318 MODULE_DESCRIPTION("Key Wrapping (RFC3394 / NIST SP800-38F)");
Dansi_cprng.c4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using
34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
/kernel/linux/linux-5.10/crypto/
Decdsa.c125 /* faster alternative for NIST p384, p256 & p192 */ in _ecdsa_verify()
282 .cra_name = "ecdsa-nist-p384",
283 .cra_driver_name = "ecdsa-nist-p384-generic",
304 .cra_name = "ecdsa-nist-p256",
305 .cra_driver_name = "ecdsa-nist-p256-generic",
326 .cra_name = "ecdsa-nist-p192",
327 .cra_driver_name = "ecdsa-nist-p192-generic",
339 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init()
Decc_curve_defs.h5 /* NIST P-192: a = p - 3 */
31 /* NIST P-256: a = p - 3 */
57 /* NIST P-384 */
DKconfig252 tristate "ECDSA (NIST P192, P256 etc.) algorithm"
257 Elliptic Curve Digital Signature Algorithm (NIST P192, P256 etc.)
258 is A NIST cryptographic standard algorithm. Only signature verification
414 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010.
418 See: https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final
476 Support for key wrapping (NIST SP800-38F / RFC3394) without
560 The National Institute of Standards and Technology (NIST).
563 http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf
580 http://csrc.nist.gov/encryption/modes/proposedmodes/
1127 See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information.
[all …]
Dghash-generic.c18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
Dkeywrap.c2 * Key Wrapping: RFC3394 / NIST SP800-38F
317 MODULE_DESCRIPTION("Key Wrapping (RFC3394 / NIST SP800-38F)");
Dansi_cprng.c4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using
33 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/
Dintel,keembay-ocs-ecc.yaml16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/
Dkeembay-ocs-ecc.c509 * The maximum security strength identified by NIST SP800-57pt1r4 for in kmb_ecc_gen_privkey()
832 .cra_name = "ecdh-nist-p256",
833 .cra_driver_name = "ecdh-nist-p256-keembay-ocs",
849 .cra_name = "ecdh-nist-p384",
850 .cra_driver_name = "ecdh-nist-p384-keembay-ocs",
1006 MODULE_ALIAS_CRYPTO("ecdh-nist-p256");
1007 MODULE_ALIAS_CRYPTO("ecdh-nist-p384");
1008 MODULE_ALIAS_CRYPTO("ecdh-nist-p256-keembay-ocs");
1009 MODULE_ALIAS_CRYPTO("ecdh-nist-p384-keembay-ocs");
/kernel/linux/linux-6.6/fs/udf/
Dudftime.c19 * For more NIST information (especially dealing with leap seconds), see:
20 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
/kernel/linux/linux-5.10/fs/udf/
Dudftime.c33 * For more NIST information (especially dealing with leap seconds), see:
34 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
/kernel/linux/linux-6.6/drivers/crypto/
Datmel-ecc.c107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret()
290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size()
306 .cra_name = "ecdh-nist-p256",
/kernel/linux/linux-6.6/arch/s390/crypto/
DKconfig77 GCM GHASH hash function (NIST SP800-38D)
/kernel/linux/linux-5.10/drivers/crypto/
Datmel-ecc.c119 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret()
302 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size()
/kernel/linux/linux-6.6/net/sunrpc/
DKconfig59 (NIST Special Publication 800-38B). These include
/kernel/linux/linux-6.6/arch/powerpc/crypto/
DKconfig107 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
/kernel/linux/linux-5.10/certs/
DKconfig36 Use an elliptic curve key (NIST P384) for module signing. Consider

1234