| /kernel/linux/linux-6.6/arch/s390/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 18 tristate "Hash functions: SHA-384 and SHA-512" 22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 29 tristate "Hash functions: SHA-1" 33 SHA-1 secure hash algorithm (FIPS 180) 40 tristate "Hash functions: SHA-224 and SHA-256" 44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 51 tristate "Hash functions: SHA3-224 and SHA3-256" 55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 62 tristate "Hash functions: SHA3-384 and SHA3-512" [all …]
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 14 - NEON (Advanced SIMD) extensions 25 GCM GHASH function (NIST SP800-38D) 28 - PMULL (Polynomial Multiply Long) instructions 29 - NEON (Advanced SIMD) extensions 30 - ARMv8 Crypto Extensions 45 - NEON (Advanced SIMD) extensions 55 - NEON (Advanced SIMD) extensions 78 - NEON (Advanced SIMD) extensions 83 much faster than the SHA-2 family and slightly faster than [all …]
|
| D | sha2-ce-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * sha2-ce-glue.c - SHA-224/SHA-256 using ARMv8 Crypto Extensions 23 MODULE_DESCRIPTION("SHA-224/SHA-256 secure hash using ARMv8 Crypto Extensions"); 36 (sctx->count % SHA256_BLOCK_SIZE) + len < SHA256_BLOCK_SIZE) in sha2_ce_update() 77 .cra_driver_name = "sha224-ce", 91 .cra_driver_name = "sha256-ce",
|
| /kernel/linux/linux-6.6/arch/arm64/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 GCM GHASH function (NIST SP800-38D) 16 - ARMv8 Crypto Extensions 26 - NEON (Advanced SIMD) extensions 37 - NEON (Advanced SIMD) extensions 40 tristate "Hash functions: SHA-1 (ARMv8 Crypto Extensions)" 45 SHA-1 secure hash algorithm (FIPS 180) 48 - ARMv8 Crypto Extensions 51 tristate "Hash functions: SHA-224 and SHA-256" 54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
| /kernel/linux/linux-6.6/arch/mips/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 34 tristate "Hash functions: SHA-1 (OCTEON)" 39 SHA-1 secure hash algorithm (FIPS 180) 44 tristate "Hash functions: SHA-224 and SHA-256 (OCTEON)" 49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 54 tristate "Hash functions: SHA-384 and SHA-512 (OCTEON)" 59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 69 Length-preserving ciphers: ChaCha20, XChaCha20, and XChaCha12
|
| /kernel/linux/linux-5.10/arch/arm/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 tristate "SHA1 digest algorithm (ARM-asm)" 17 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented 27 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented 37 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 46 SHA-256 secure hash standard (DFIPS 180-2) implemented 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 54 SHA-256 secure hash standard (DFIPS 180-2) implemented 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" [all …]
|
| D | sha2-ce-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * sha2-ce-glue.c - SHA-224/SHA-256 using ARMv8 Crypto Extensions 10 #include <crypto/sha.h> 23 MODULE_DESCRIPTION("SHA-224/SHA-256 secure hash using ARMv8 Crypto Extensions"); 36 (sctx->count % SHA256_BLOCK_SIZE) + len < SHA256_BLOCK_SIZE) in sha2_ce_update() 77 .cra_driver_name = "sha224-ce", 91 .cra_driver_name = "sha256-ce",
|
| /kernel/linux/linux-6.6/arch/powerpc/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 14 - AltiVec extensions 26 - AltiVec extensions 48 tristate "Hash functions: SHA-1" 51 SHA-1 secure hash algorithm (FIPS 180) 56 tristate "Hash functions: SHA-1 (SPE)" 59 SHA-1 secure hash algorithm (FIPS 180) 62 - SPE (Signal Processing Engine) extensions 65 tristate "Hash functions: SHA-224 and SHA-256 (SPE)" 70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
| /kernel/linux/linux-6.6/arch/sparc/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 12 Block cipher: DES (FIPS 46-2) cipher algorithm 13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 14 Length-preserving ciphers: DES with ECB and CBC modes 15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes 40 tristate "Hash functions: SHA-1" 45 SHA-1 secure hash algorithm (FIPS 180) 50 tristate "Hash functions: SHA-224 and SHA-256" 55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 60 tristate "Hash functions: SHA-384 and SHA-512" [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 57 tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions" 122 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
| /kernel/linux/linux-6.6/drivers/crypto/aspeed/ |
| D | Kconfig | 32 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and so on. 47 Supports AES/DES symmetric-key encryption and decryption 58 Supports 256 bits to 4096 bits RSA encryption/decryption
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/ |
| D | samsung-slimsss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS 16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC 21 - const: samsung,exynos5433-slim-sss 29 clock-names: [all …]
|
| D | samsung-sss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) 16 -- Data Encryption Standard (DES)/3DES 17 -- Public Key Accelerator (PKA) 18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG [all …]
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/crypto/ |
| D | samsung-slimsss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 11 - Kamil Konieczny <k.konieczny@partner.samsung.com> 15 -- Feeder (FeedCtrl) 16 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS 17 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC 22 - const: samsung,exynos5433-slim-sss [all …]
|
| D | samsung-sss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 11 - Kamil Konieczny <k.konieczny@partner.samsung.com> 15 -- Feeder (FeedCtrl) 16 -- Advanced Encryption Standard (AES) 17 -- Data Encryption Standard (DES)/3DES 18 -- Public Key Accelerator (PKA) [all …]
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/s390/cf_z16/ |
| D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
| /kernel/linux/linux-5.10/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 141 bool "Disable run-time self tests" 144 Disable run-time self tests that normally take place at 148 bool "Enable extra run-time crypto self tests" 151 Enable extra run-time self tests of registered crypto algorithms, 222 comment "Public-key cryptography" 234 tristate "Diffie-Hellman algorithm" 238 Generic implementation of the Diffie-Hellman algorithm. 262 tristate "EC-RDSA (GOST 34.10) algorithm" 269 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012, [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 170 bool "Disable run-time self tests" 173 Disable run-time self tests that normally take place at 177 bool "Enable extra run-time crypto self tests" 180 Enable extra run-time self tests of registered crypto algorithms, 246 menu "Public-key cryptography" 249 tristate "RSA (Rivest-Shamir-Adleman)" 255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) 258 tristate "DH (Diffie-Hellman)" 262 DH (Diffie-Hellman) key exchange algorithm [all …]
|
| /kernel/linux/linux-6.6/arch/x86/crypto/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 14 - ADX (large integer arithmetic) 17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTR, XTS, GCM (AES-NI)" 27 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTR, XTS 29 Architecture: x86 (32-bit and 64-bit) using: 30 - AES-NI (AES new instructions) 40 Length-preserving ciphers: Blowfish with ECB and CBC modes 51 Length-preserving ciphers: Camellia with ECB and CBC modes 56 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX)" 63 Length-preserving ciphers: Camellia with ECB and CBC modes [all …]
|
| /kernel/linux/linux-5.10/fs/crypto/ |
| D | hkdf.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Implementation of HKDF ("HMAC-based Extract-and-Expand Key Derivation 13 #include <crypto/sha.h> 19 * SHA-512 because it is well-established, secure, and reasonably efficient. 21 * HKDF-SHA256 was also considered, as its 256-bit security strength would be 22 * sufficient here. A 512-bit security strength is "nice to have", though. 23 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the 24 * common case of deriving an AES-256-XTS key (512 bits), that can result in 25 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of 26 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two. [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/ccp/ |
| D | ccp-ops.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 2013-2019 Advanced Micro Devices, Inc. 11 #include <linux/dma-mapping.h> 19 #include "ccp-dev.h" 21 /* SHA initial context values */ 56 #define CCP_NEW_JOBID(ccp) ((ccp->vdata->version == CCP_VERSION(3, 0)) ? \ 61 return atomic_inc_return(&ccp->current_id) & CCP_JOBID_MASK; in ccp_gen_jobid() 66 if (wa->dma_count) in ccp_sg_free() 67 dma_unmap_sg(wa->dma_dev, wa->dma_sg_head, wa->nents, wa->dma_dir); in ccp_sg_free() 69 wa->dma_count = 0; in ccp_sg_free() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ccp/ |
| D | ccp-ops.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 2013-2019 Advanced Micro Devices, Inc. 11 #include <linux/dma-mapping.h> 19 #include "ccp-dev.h" 21 /* SHA initial context values */ 56 #define CCP_NEW_JOBID(ccp) ((ccp->vdata->version == CCP_VERSION(3, 0)) ? \ 61 return atomic_inc_return(&ccp->current_id) & CCP_JOBID_MASK; in ccp_gen_jobid() 66 if (wa->dma_count) in ccp_sg_free() 67 dma_unmap_sg(wa->dma_dev, wa->dma_sg_head, wa->nents, wa->dma_dir); in ccp_sg_free() 69 wa->dma_count = 0; in ccp_sg_free() [all …]
|
| /kernel/linux/linux-6.6/fs/crypto/ |
| D | hkdf.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Implementation of HKDF ("HMAC-based Extract-and-Expand Key Derivation 19 * SHA-512 because it is well-established, secure, and reasonably efficient. 21 * HKDF-SHA256 was also considered, as its 256-bit security strength would be 22 * sufficient here. A 512-bit security strength is "nice to have", though. 23 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the 24 * common case of deriving an AES-256-XTS key (512 bits), that can result in 25 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of 26 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two. 34 * 1. HKDF-Extract: extract a pseudorandom key of length HKDF_HASHLEN bytes from [all …]
|