Home
last modified time | relevance | path

Searched full:nist (Results 1 – 25 of 59) sorted by relevance

123

/linux-6.8/arch/arm64/crypto/
DKconfig13 GCM GHASH function (NIST SP800-38D)
162 - ECB (Electronic Codebook) mode (NIST SP800-38A)
163 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
164 - CTR (Counter) mode (NIST SP800-38A)
165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
179 - ECB (Electronic Codebook) mode (NIST SP800-38A)
180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
181 - CTR (Counter) mode (NIST SP800-38A)
182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
210 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
/linux-6.8/arch/arm/crypto/
DKconfig25 GCM GHASH function (NIST SP800-38D)
177 - ECB (Electronic Codebook) mode (NIST SP800-38A)
178 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
179 - CTR (Counter) mode (NIST SP800-38A)
180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
198 - ECB (Electronic Codebook) mode (NIST SP800-38A)
199 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
200 - CTR (Counter) mode (NIST SP800-38A)
201 - CTS (Cipher Text Stealing) mode (NIST SP800-38A)
202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/linux-6.8/crypto/
Decdh.c143 .cra_name = "ecdh-nist-p192",
144 .cra_driver_name = "ecdh-nist-p192-generic",
168 .cra_name = "ecdh-nist-p256",
169 .cra_driver_name = "ecdh-nist-p256-generic",
193 .cra_name = "ecdh-nist-p384",
194 .cra_driver_name = "ecdh-nist-p384-generic",
207 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
Decdsa.c125 /* faster alternative for NIST p384, p256 & p192 */ in _ecdsa_verify()
282 .cra_name = "ecdsa-nist-p384",
283 .cra_driver_name = "ecdsa-nist-p384-generic",
304 .cra_name = "ecdsa-nist-p256",
305 .cra_driver_name = "ecdsa-nist-p256-generic",
326 .cra_name = "ecdsa-nist-p192",
327 .cra_driver_name = "ecdsa-nist-p192-generic",
339 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init()
DKconfig660 CBC (Cipher Block Chaining) mode (NIST SP800-38A)
669 CTR (Counter) mode (NIST SP800-38A)
676 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST
687 ECB (Electronic Codebook) mode (NIST SP800-38A)
709 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F
756 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
807 authenticated encryption mode (NIST SP800-38C)
818 (GCM Message Authentication Code) (NIST SP800-38D)
908 mode (NIST SP800-38B and IETF RFC4493)
915 GCM GHASH function (NIST SP800-38D)
[all …]
Decc_curve_defs.h5 /* NIST P-192: a = p - 3 */
31 /* NIST P-256: a = p - 3 */
57 /* NIST P-384 */
Dghash-generic.c18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
Dkeywrap.c2 * Key Wrapping: RFC3394 / NIST SP800-38F
318 MODULE_DESCRIPTION("Key Wrapping (RFC3394 / NIST SP800-38F)");
Dansi_cprng.c4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using
34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
Dsha3_generic.c6 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
Dkdf_sp800108.c98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
Dccm.c141 * NIST Special Publication 800-38C in format_input()
155 * RFC 3610 and NIST Special Publication 800-38C in format_adata()
264 /* Note: rfc 3610 and NIST 800-38C require counter of in crypto_ccm_init_crypt()
/linux-6.8/Documentation/devicetree/bindings/riscv/
Dextensions.yaml250 The standard Zkn NIST algorithm suite extensions as ratified in
256 The standard Zknd for NIST suite: AES decryption instructions as
262 The standard Zkne for NIST suite: AES encryption instructions as
268 The standard Zknh for NIST suite: hash function instructions as
410 The standard Zvkn extension for NIST algorithm suite instructions, as
416 The standard Zvknc extension for NIST algorithm suite with carryless
428 The standard Zvkng extension for NIST algorithm suite with GCM
434 The standard Zvknha extension for NIST suite: vector SHA-2 secure,
440 The standard Zvknhb extension for NIST suite: vector SHA-2 secure,
/linux-6.8/Documentation/devicetree/bindings/crypto/
Dintel,keembay-ocs-ecc.yaml16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
/linux-6.8/drivers/crypto/intel/keembay/
Dkeembay-ocs-ecc.c509 * The maximum security strength identified by NIST SP800-57pt1r4 for in kmb_ecc_gen_privkey()
832 .cra_name = "ecdh-nist-p256",
833 .cra_driver_name = "ecdh-nist-p256-keembay-ocs",
849 .cra_name = "ecdh-nist-p384",
850 .cra_driver_name = "ecdh-nist-p384-keembay-ocs",
1004 MODULE_ALIAS_CRYPTO("ecdh-nist-p256");
1005 MODULE_ALIAS_CRYPTO("ecdh-nist-p384");
1006 MODULE_ALIAS_CRYPTO("ecdh-nist-p256-keembay-ocs");
1007 MODULE_ALIAS_CRYPTO("ecdh-nist-p384-keembay-ocs");
/linux-6.8/fs/udf/
Dudftime.c19 * For more NIST information (especially dealing with leap seconds), see:
20 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
/linux-6.8/drivers/crypto/
Datmel-ecc.c107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret()
290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size()
306 .cra_name = "ecdh-nist-p256",
/linux-6.8/arch/s390/crypto/
DKconfig77 GCM GHASH hash function (NIST SP800-38D)
/linux-6.8/arch/powerpc/crypto/
DKconfig106 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
/linux-6.8/net/sunrpc/
DKconfig59 (NIST Special Publication 800-38B). These include
/linux-6.8/Documentation/admin-guide/
Dmodule-signing.rst31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA
150 (``MODULE_SIG_KEY_TYPE_ECDSA``) to generate either RSA 4k or NIST
/linux-6.8/security/integrity/
Ddigsig_asymmetric.c115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
/linux-6.8/include/linux/sunrpc/
Dgss_krb5.h141 #define ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */
/linux-6.8/certs/
DKconfig35 Use an elliptic curve key (NIST P384) for module signing. Use
/linux-6.8/crypto/asymmetric_keys/
Dx509_cert_parser.c533 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data()
536 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data()
539 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data()

123