Searched +full:sha +full:- +full:256 (Results 1 – 13 of 13) sorted by relevance
| /Documentation/devicetree/bindings/crypto/ |
| D | samsung-slimsss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS 16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC 21 - const: samsung,exynos5433-slim-sss 29 clock-names: [all …]
|
| D | samsung-sss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) 16 -- Data Encryption Standard (DES)/3DES 17 -- Public Key Accelerator (PKA) 18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG [all …]
|
| /Documentation/ABI/testing/ |
| D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
| D | sysfs-driver-chromeos-acpi | 56 Returns firmware version for the read-only portion of the 79 256 to 511 Debug header GPIO 0 to GPIO 255. 121 Returns the SHA-1 or SHA-256 hash that is read out of the 132 Returns offset in CMOS bank 0 of the verified boot non-volatile 142 Return the size in bytes of the verified boot non-volatile
|
| /Documentation/admin-guide/ |
| D | module-signing.rst | 2 ------------------------------ 6 .. - Overview. 7 .. - Configuring module signing. 8 .. - Generating signing keys. 9 .. - Public keys in the kernel. 10 .. - Manually signing modules. 11 .. - Signed modules and stripping. 12 .. - Loading signed modules. 13 .. - Non-valid signatures and unsigned modules. 14 .. - Administering/protecting the private key. [all …]
|
| /Documentation/firmware-guide/acpi/ |
| D | chromeos-acpi-device.rst | 1 .. SPDX-License-Identifier: GPL-2.0 11 .. flat-table:: Supported ACPI Objects 13 :header-rows: 1 15 * - Object 16 - Description 18 * - CHSW 19 - Chrome OS switch positions 21 * - HWID 22 - Chrome OS hardware ID 24 * - FWID [all …]
|
| /Documentation/crypto/ |
| D | api-samples.rst | 5 ----------------------------------------------- 7 This code encrypts some data with AES-256-XTS. For sake of example, 8 all inputs are random bytes, the encryption is done in-place, and it's 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 28 * In real-world use, a tfm and key are typically used for many 49 err = -ENOMEM; 56 err = -ENOMEM; 65 * Encrypt the data in-place. 94 ----------------------------------------------------------- [all …]
|
| /Documentation/devicetree/bindings/riscv/ |
| D | extensions.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR MIT) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: RISC-V ISA extensions 10 - Paul Walmsley <paul.walmsley@sifive.com> 11 - Palmer Dabbelt <palmer@sifive.com> 12 - Conor Dooley <conor@kernel.org> 15 RISC-V has a large number of extensions, some of which are "standard" 16 extensions, meaning they are ratified by RISC-V International, and others 36 Identifies the specific RISC-V instruction set architecture [all …]
|
| /Documentation/filesystems/ |
| D | fscrypt.rst | 2 Filesystem-level encryption (fscrypt) 11 Note: "fscrypt" in this document refers to the kernel-level portion, 14 covers the kernel-level portion. For command-line examples of how to 20 <https://source.android.com/security/encryption/file-based>`_, over 25 Unlike dm-crypt, fscrypt operates at the filesystem level rather than 28 filesystem. This is useful for multi-user systems where each user's 29 data-at-rest needs to be cryptographically isolated from the others. 34 directly into supported filesystems --- currently ext4, F2FS, UBIFS, 44 fscrypt does not support encrypting files in-place. Instead, it 54 --------------- [all …]
|
| D | fsverity.rst | 1 .. SPDX-License-Identifier: GPL-2.0 6 fs-verity: read-only file-based authenticity protection 12 fs-verity (``fs/verity/``) is a support layer that filesystems can 14 of read-only files. Currently, it is supported by the ext4, f2fs, and 15 btrfs filesystems. Like fscrypt, not too much filesystem-specific 16 code is needed to support fs-verity. 18 fs-verity is similar to `dm-verity 19 <https://www.kernel.org/doc/Documentation/device-mapper/verity.txt>`_ 21 filesystems supporting fs-verity, userspace can execute an ioctl that 23 it to a filesystem-specific location associated with the file. [all …]
|
| /Documentation/ABI/stable/ |
| D | sysfs-class-tpm | 4 Contact: linux-integrity@vger.kernel.org 12 Contact: linux-integrity@vger.kernel.org 24 Contact: linux-integrity@vger.kernel.org 32 Contact: linux-integrity@vger.kernel.org 49 Contact: linux-integrity@vger.kernel.org 50 Description: The "durations" property shows the 3 vendor-specific values 72 Contact: linux-integrity@vger.kernel.org 81 Contact: linux-integrity@vger.kernel.org 89 Contact: linux-integrity@vger.kernel.org 97 PCR-00: 3A 3F 78 0F 11 A4 B4 99 69 FC AA 80 CD 6E 39 57 C3 3B 22 75 [all …]
|
| /Documentation/virt/kvm/x86/ |
| D | amd-memory-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 12 SEV is an extension to the AMD-V architecture which supports running 46 Hence, the ASID for the SEV-enabled guests must be from 1 to a maximum value 57 of zero if SEV is enabled). If non-NULL, the argument to 74 are defined in ``<linux/psp-dev.h>``. 80 ---------------- 91 Returns: 0 on success, -negative on error 127 ``debug_swap`` parameter of ``kvm-amd.ko``. 130 ----------------------- 134 the owner's public Diffie-Hellman (PDH) key and session information. [all …]
|
| /Documentation/netlink/specs/ |
| D | tc.yaml | 1 # SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 4 protocol: netlink-raw 12 - 16 - 19 - 23 - 26 - 29 - 32 - 35 - [all …]
|