Searched full:nist (Results 1 – 25 of 99) sorted by relevance
1234
| /kernel/linux/linux-6.6/arch/arm64/crypto/ |
| D | Kconfig | 13 GCM GHASH function (NIST SP800-38D) 162 - ECB (Electronic Codebook) mode (NIST SP800-38A) 163 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 164 - CTR (Counter) mode (NIST SP800-38A) 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 179 - ECB (Electronic Codebook) mode (NIST SP800-38A) 180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 181 - CTR (Counter) mode (NIST SP800-38A) 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 210 - ECB (Electronic Codebook) mode (NIST SP800-38A) [all …]
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| D | Kconfig | 25 GCM GHASH function (NIST SP800-38D) 177 - ECB (Electronic Codebook) mode (NIST SP800-38A) 178 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 179 - CTR (Counter) mode (NIST SP800-38A) 180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 198 - ECB (Electronic Codebook) mode (NIST SP800-38A) 199 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 200 - CTR (Counter) mode (NIST SP800-38A) 201 - CTS (Cipher Text Stealing) mode (NIST SP800-38A) 202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
| /kernel/linux/linux-6.6/crypto/ |
| D | ecdsa.c | 112 /* faster alternative for NIST p384, p256 & p192 */ in _ecdsa_verify() 273 .cra_name = "ecdsa-nist-p384", 274 .cra_driver_name = "ecdsa-nist-p384-generic", 295 .cra_name = "ecdsa-nist-p256", 296 .cra_driver_name = "ecdsa-nist-p256-generic", 317 .cra_name = "ecdsa-nist-p192", 318 .cra_driver_name = "ecdsa-nist-p192-generic", 330 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init() 367 MODULE_ALIAS_CRYPTO("ecdsa-nist-p192"); 368 MODULE_ALIAS_CRYPTO("ecdsa-nist-p256"); [all …]
|
| D | ecdh.c | 145 .cra_name = "ecdh-nist-p192", 146 .cra_driver_name = "ecdh-nist-p192-generic", 170 .cra_name = "ecdh-nist-p256", 171 .cra_driver_name = "ecdh-nist-p256-generic", 195 .cra_name = "ecdh-nist-p384", 196 .cra_driver_name = "ecdh-nist-p384-generic", 209 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
|
| D | Kconfig | 659 CBC (Cipher Block Chaining) mode (NIST SP800-38A) 668 CFB (Cipher Feedback) mode (NIST SP800-38A) 677 CTR (Counter) mode (NIST SP800-38A) 684 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST 695 ECB (Electronic Codebook) mode (NIST SP800-38A) 717 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F 742 OFB (Output Feedback) mode (NIST SP800-38A) 778 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 829 authenticated encryption mode (NIST SP800-38C) 840 (GCM Message Authentication Code) (NIST SP800-38D) [all …]
|
| D | ecc_curve_defs.h | 5 /* NIST P-192: a = p - 3 */ 31 /* NIST P-256: a = p - 3 */ 57 /* NIST P-384 */
|
| D | ghash-generic.c | 18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X 34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
|
| D | keywrap.c | 2 * Key Wrapping: RFC3394 / NIST SP800-38F 318 MODULE_DESCRIPTION("Key Wrapping (RFC3394 / NIST SP800-38F)");
|
| D | ansi_cprng.c | 4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using 34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
|
| /kernel/linux/linux-5.10/crypto/ |
| D | ecdsa.c | 125 /* faster alternative for NIST p384, p256 & p192 */ in _ecdsa_verify() 282 .cra_name = "ecdsa-nist-p384", 283 .cra_driver_name = "ecdsa-nist-p384-generic", 304 .cra_name = "ecdsa-nist-p256", 305 .cra_driver_name = "ecdsa-nist-p256-generic", 326 .cra_name = "ecdsa-nist-p192", 327 .cra_driver_name = "ecdsa-nist-p192-generic", 339 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init()
|
| D | ecc_curve_defs.h | 5 /* NIST P-192: a = p - 3 */ 31 /* NIST P-256: a = p - 3 */ 57 /* NIST P-384 */
|
| D | Kconfig | 252 tristate "ECDSA (NIST P192, P256 etc.) algorithm" 257 Elliptic Curve Digital Signature Algorithm (NIST P192, P256 etc.) 258 is A NIST cryptographic standard algorithm. Only signature verification 414 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010. 418 See: https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final 476 Support for key wrapping (NIST SP800-38F / RFC3394) without 560 The National Institute of Standards and Technology (NIST). 563 http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf 580 http://csrc.nist.gov/encryption/modes/proposedmodes/ 1127 See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information. [all …]
|
| D | ghash-generic.c | 18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X 34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
|
| D | keywrap.c | 2 * Key Wrapping: RFC3394 / NIST SP800-38F 317 MODULE_DESCRIPTION("Key Wrapping (RFC3394 / NIST SP800-38F)");
|
| D | ansi_cprng.c | 4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using 33 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/ |
| D | intel,keembay-ocs-ecc.yaml | 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
|
| /kernel/linux/linux-6.6/drivers/crypto/intel/keembay/ |
| D | keembay-ocs-ecc.c | 509 * The maximum security strength identified by NIST SP800-57pt1r4 for in kmb_ecc_gen_privkey() 832 .cra_name = "ecdh-nist-p256", 833 .cra_driver_name = "ecdh-nist-p256-keembay-ocs", 849 .cra_name = "ecdh-nist-p384", 850 .cra_driver_name = "ecdh-nist-p384-keembay-ocs", 1006 MODULE_ALIAS_CRYPTO("ecdh-nist-p256"); 1007 MODULE_ALIAS_CRYPTO("ecdh-nist-p384"); 1008 MODULE_ALIAS_CRYPTO("ecdh-nist-p256-keembay-ocs"); 1009 MODULE_ALIAS_CRYPTO("ecdh-nist-p384-keembay-ocs");
|
| /kernel/linux/linux-6.6/fs/udf/ |
| D | udftime.c | 19 * For more NIST information (especially dealing with leap seconds), see: 20 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
|
| /kernel/linux/linux-5.10/fs/udf/ |
| D | udftime.c | 33 * For more NIST information (especially dealing with leap seconds), see: 34 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
|
| /kernel/linux/linux-6.6/drivers/crypto/ |
| D | atmel-ecc.c | 107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret() 290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size() 306 .cra_name = "ecdh-nist-p256",
|
| /kernel/linux/linux-6.6/arch/s390/crypto/ |
| D | Kconfig | 77 GCM GHASH hash function (NIST SP800-38D)
|
| /kernel/linux/linux-5.10/drivers/crypto/ |
| D | atmel-ecc.c | 119 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret() 302 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size()
|
| /kernel/linux/linux-6.6/net/sunrpc/ |
| D | Kconfig | 59 (NIST Special Publication 800-38B). These include
|
| /kernel/linux/linux-6.6/arch/powerpc/crypto/ |
| D | Kconfig | 107 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
| /kernel/linux/linux-5.10/certs/ |
| D | Kconfig | 36 Use an elliptic curve key (NIST P384) for module signing. Consider
|
1234