Searched full:nist (Results 1 – 25 of 64) sorted by relevance
123
/linux-6.15/arch/arm64/crypto/ |
D | Kconfig | 13 GCM GHASH function (NIST SP800-38D) 163 - ECB (Electronic Codebook) mode (NIST SP800-38A) 164 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 165 - CTR (Counter) mode (NIST SP800-38A) 166 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 180 - ECB (Electronic Codebook) mode (NIST SP800-38A) 181 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 182 - CTR (Counter) mode (NIST SP800-38A) 183 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 212 - ECB (Electronic Codebook) mode (NIST SP800-38A) [all …]
|
/linux-6.15/arch/arm/crypto/ |
D | Kconfig | 27 GCM GHASH function (NIST SP800-38D) 179 - ECB (Electronic Codebook) mode (NIST SP800-38A) 180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 181 - CTR (Counter) mode (NIST SP800-38A) 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 207 - ECB (Electronic Codebook) mode (NIST SP800-38A) 208 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 209 - CTR (Counter) mode (NIST SP800-38A) 210 - CTS (Cipher Text Stealing) mode (NIST SP800-38A) 211 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/linux-6.15/crypto/ |
D | ecdsa.c | 54 /* faster alternative for NIST p521, p384, p256 & p192 */ in _ecdsa_verify() 199 .cra_name = "ecdsa-nist-p521", 200 .cra_driver_name = "ecdsa-nist-p521-generic", 222 .cra_name = "ecdsa-nist-p384", 223 .cra_driver_name = "ecdsa-nist-p384-generic", 245 .cra_name = "ecdsa-nist-p256", 246 .cra_driver_name = "ecdsa-nist-p256-generic", 268 .cra_name = "ecdsa-nist-p192", 269 .cra_driver_name = "ecdsa-nist-p192-generic", 281 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init() [all …]
|
D | ecdh.c | 148 .cra_name = "ecdh-nist-p192", 149 .cra_driver_name = "ecdh-nist-p192-generic", 173 .cra_name = "ecdh-nist-p256", 174 .cra_driver_name = "ecdh-nist-p256-generic", 198 .cra_name = "ecdh-nist-p384", 199 .cra_driver_name = "ecdh-nist-p384-generic", 212 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
|
D | Kconfig | 663 CBC (Cipher Block Chaining) mode (NIST SP800-38A) 672 CTR (Counter) mode (NIST SP800-38A) 679 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST 690 ECB (Electronic Codebook) mode (NIST SP800-38A) 751 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 802 authenticated encryption mode (NIST SP800-38C) 813 (GCM Message Authentication Code) (NIST SP800-38D) 903 mode (NIST SP800-38B and IETF RFC4493) 910 GCM GHASH function (NIST SP800-38D) 1191 tristate "NIST SP800-90A DRBG (Deterministic Random Bit Generator)" [all …]
|
D | ecc_curve_defs.h | 5 /* NIST P-192: a = p - 3 */ 32 /* NIST P-256: a = p - 3 */ 59 /* NIST P-384 */ 92 /* NIST P-521 */
|
D | ecdsa-x962.c | 113 * NIST P192/256/384 may prepend a '0' to a coordinate to indicate in ecdsa_x962_max_size() 114 * a positive integer. NIST P521 never needs it. in ecdsa_x962_max_size() 116 if (strcmp(alg->base.cra_name, "ecdsa-nist-p521") != 0) in ecdsa_x962_max_size()
|
D | ghash-generic.c | 18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X 34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
|
D | ansi_cprng.c | 4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using 34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
|
D | sha3_generic.c | 6 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
|
D | kdf_sp800108.c | 98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
|
/linux-6.15/Documentation/devicetree/bindings/crypto/ |
D | intel,keembay-ocs-ecc.yaml | 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
|
/linux-6.15/Documentation/devicetree/bindings/riscv/ |
D | extensions.yaml | 377 The standard Zkn NIST algorithm suite extensions as ratified in 383 The standard Zknd for NIST suite: AES decryption instructions as 389 The standard Zkne for NIST suite: AES encryption instructions as 395 The standard Zknh for NIST suite: hash function instructions as 584 The standard Zvkn extension for NIST algorithm suite instructions, as 590 The standard Zvknc extension for NIST algorithm suite with carryless 602 The standard Zvkng extension for NIST algorithm suite with GCM 608 The standard Zvknha extension for NIST suite: vector SHA-2 secure, 614 The standard Zvknhb extension for NIST suite: vector SHA-2 secure,
|
/linux-6.15/drivers/crypto/intel/keembay/ |
D | keembay-ocs-ecc.c | 509 * The maximum security strength identified by NIST SP800-57pt1r4 for in kmb_ecc_gen_privkey() 832 .cra_name = "ecdh-nist-p256", 833 .cra_driver_name = "ecdh-nist-p256-keembay-ocs", 849 .cra_name = "ecdh-nist-p384", 850 .cra_driver_name = "ecdh-nist-p384-keembay-ocs", 1004 MODULE_ALIAS_CRYPTO("ecdh-nist-p256"); 1005 MODULE_ALIAS_CRYPTO("ecdh-nist-p384"); 1006 MODULE_ALIAS_CRYPTO("ecdh-nist-p256-keembay-ocs"); 1007 MODULE_ALIAS_CRYPTO("ecdh-nist-p384-keembay-ocs");
|
/linux-6.15/fs/udf/ |
D | udftime.c | 19 * For more NIST information (especially dealing with leap seconds), see: 20 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
|
/linux-6.15/drivers/crypto/ |
D | atmel-ecc.c | 107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret() 290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size() 306 .cra_name = "ecdh-nist-p256",
|
/linux-6.15/arch/riscv/crypto/ |
D | Kconfig | 36 GCM GHASH function (NIST SP 800-38D)
|
/linux-6.15/arch/s390/crypto/ |
D | Kconfig | 65 GCM GHASH hash function (NIST SP800-38D)
|
/linux-6.15/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 513 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data() 516 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data() 519 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data() 522 ctx->cert->pub->pkey_algo = "ecdsa-nist-p521"; in x509_extract_key_data()
|
/linux-6.15/arch/powerpc/crypto/ |
D | Kconfig | 87 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
/linux-6.15/net/sunrpc/ |
D | Kconfig | 59 (NIST Special Publication 800-38B). These include
|
/linux-6.15/security/integrity/ |
D | digsig_asymmetric.c | 115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
|
/linux-6.15/Documentation/admin-guide/ |
D | module-signing.rst | 31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA 150 (``MODULE_SIG_KEY_TYPE_ECDSA``) to generate either RSA 4k or NIST
|
/linux-6.15/include/crypto/ |
D | krb5.h | 28 #define KRB5_ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */
|
/linux-6.15/include/linux/sunrpc/ |
D | gss_krb5.h | 140 #define ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */
|
123