/linux-6.15/arch/s390/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 6 tristate "Hash functions: SHA-384 and SHA-512" 10 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 17 tristate "Hash functions: SHA-1" 21 SHA-1 secure hash algorithm (FIPS 180) 28 tristate "Hash functions: SHA-224 and SHA-256" 32 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 39 tristate "Hash functions: SHA3-224 and SHA3-256" 43 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 50 tristate "Hash functions: SHA3-384 and SHA3-512" [all …]
|
D | hmac_s390.c | 1 // SPDX-License-Identifier: GPL-2.0+ 20 * blocksize of the used hashing sha2-algorithm function codes. The param block 21 * contains the hash chaining value (cv), the input message bit-length (imbl) 22 * and the hmac-secret (key). To prevent code duplication, the sizes of all 25 * param-block: 26 * +-------+ 28 * +-------+ 30 * +-------+ 32 * +-------+ 35 * part | sh2-alg | calculation | size | type [all …]
|
/linux-6.15/arch/arm/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 16 - NEON (Advanced SIMD) extensions 27 GCM GHASH function (NIST SP800-38D) 30 - PMULL (Polynomial Multiply Long) instructions 31 - NEON (Advanced SIMD) extensions 32 - ARMv8 Crypto Extensions 47 - NEON (Advanced SIMD) extensions 58 - NEON (Advanced SIMD) extensions 81 - NEON (Advanced SIMD) extensions 86 much faster than the SHA-2 family and slightly faster than [all …]
|
D | sha2-ce-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * sha2-ce-glue.c - SHA-224/SHA-256 using ARMv8 Crypto Extensions 23 MODULE_DESCRIPTION("SHA-224/SHA-256 secure hash using ARMv8 Crypto Extensions"); 36 (sctx->count % SHA256_BLOCK_SIZE) + len < SHA256_BLOCK_SIZE) in sha2_ce_update() 77 .cra_driver_name = "sha224-ce", 91 .cra_driver_name = "sha256-ce",
|
/linux-6.15/arch/arm64/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 GCM GHASH function (NIST SP800-38D) 16 - ARMv8 Crypto Extensions 26 - NEON (Advanced SIMD) extensions 38 - NEON (Advanced SIMD) extensions 41 tristate "Hash functions: SHA-1 (ARMv8 Crypto Extensions)" 46 SHA-1 secure hash algorithm (FIPS 180) 49 - ARMv8 Crypto Extensions 52 tristate "Hash functions: SHA-224 and SHA-256" 55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
D | sha2-ce-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * sha2-ce-glue.c - SHA-224/SHA-256 using ARMv8 Crypto Extensions 5 * Copyright (C) 2014 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org> 19 MODULE_DESCRIPTION("SHA-224/SHA-256 secure hash using ARMv8 Crypto Extensions"); 47 src += (blocks - rem) * SHA256_BLOCK_SIZE; in sha256_ce_transform() 62 sha256_block_data_order(sst->state, src, blocks); in sha256_arm64_transform() 74 sctx->finalize = 0; in sha256_ce_update() 84 bool finalize = !sctx->sst.count && !(len % SHA256_BLOCK_SIZE) && len; in sha256_ce_finup() 98 sctx->finalize = finalize; in sha256_ce_finup() 115 sctx->finalize = 0; in sha256_ce_final() [all …]
|
/linux-6.15/arch/mips/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 27 tristate "Hash functions: SHA-1 (OCTEON)" 32 SHA-1 secure hash algorithm (FIPS 180) 37 tristate "Hash functions: SHA-224 and SHA-256 (OCTEON)" 42 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 47 tristate "Hash functions: SHA-384 and SHA-512 (OCTEON)" 52 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 63 Length-preserving ciphers: ChaCha20, XChaCha20, and XChaCha12
|
/linux-6.15/arch/powerpc/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 16 - Little-endian 28 tristate "Hash functions: SHA-1" 31 SHA-1 secure hash algorithm (FIPS 180) 36 tristate "Hash functions: SHA-1 (SPE)" 39 SHA-1 secure hash algorithm (FIPS 180) 42 - SPE (Signal Processing Engine) extensions 45 tristate "Hash functions: SHA-224 and SHA-256 (SPE)" 50 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 53 - SPE (Signal Processing Engine) extensions [all …]
|
/linux-6.15/arch/sparc/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 12 Block cipher: DES (FIPS 46-2) cipher algorithm 13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 14 Length-preserving ciphers: DES with ECB and CBC modes 15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes 30 tristate "Hash functions: SHA-1" 35 SHA-1 secure hash algorithm (FIPS 180) 40 tristate "Hash functions: SHA-224 and SHA-256" 45 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 50 tristate "Hash functions: SHA-384 and SHA-512" [all …]
|
D | sha256_glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 6 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 35 sctx->count += len; in __sha256_sparc64_update() 37 done = SHA256_BLOCK_SIZE - partial; in __sha256_sparc64_update() 38 memcpy(sctx->buf + partial, data, done); in __sha256_sparc64_update() 39 sha256_sparc64_transform(sctx->state, sctx->buf, 1); in __sha256_sparc64_update() 41 if (len - done >= SHA256_BLOCK_SIZE) { in __sha256_sparc64_update() 42 const unsigned int rounds = (len - done) / SHA256_BLOCK_SIZE; in __sha256_sparc64_update() 44 sha256_sparc64_transform(sctx->state, data + done, rounds); in __sha256_sparc64_update() 48 memcpy(sctx->buf, data + done, len - done); in __sha256_sparc64_update() [all …]
|
/linux-6.15/arch/riscv/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTS 16 - Zvkned vector crypto extension 17 - Zvbb vector extension (XTS) 18 - Zvkb vector crypto extension (CTR) 19 - Zvkg vector crypto extension (XTS) 26 Length-preserving ciphers: ChaCha20 stream cipher algorithm 29 - Zvkb vector crypto extension 36 GCM GHASH function (NIST SP 800-38D) 39 - Zvkg vector crypto extension [all …]
|
D | sha256-riscv64-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * SHA-256 and SHA-224 using the RISC-V vector crypto extensions 31 * Ensure struct sha256_state begins directly with the SHA-256 in riscv64_sha256_update() 32 * 256-bit internal state, as this is what the asm function expects. in riscv64_sha256_update() 91 .cra_driver_name = "sha256-riscv64-zvknha_or_zvknhb-zvkb", 105 .cra_driver_name = "sha224-riscv64-zvknha_or_zvknhb-zvkb", 113 /* Both zvknha and zvknhb provide the SHA-256 instructions. */ in riscv64_sha256_mod_init() 121 return -ENODEV; in riscv64_sha256_mod_init() 133 MODULE_DESCRIPTION("SHA-256 (RISC-V accelerated)");
|
/linux-6.15/drivers/crypto/aspeed/ |
D | Kconfig | 32 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and so on. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
/linux-6.15/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
/linux-6.15/Documentation/devicetree/bindings/crypto/ |
D | samsung-slimsss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS 16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC 21 - const: samsung,exynos5433-slim-sss 29 clock-names: [all …]
|
D | samsung-sss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) 16 -- Data Encryption Standard (DES)/3DES 17 -- Public Key Accelerator (PKA) 18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG [all …]
|
/linux-6.15/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 177 bool "Disable run-time self tests" 180 Disable run-time self tests that normally take place at 184 bool "Enable extra run-time crypto self tests" 187 Enable extra run-time self tests of registered crypto algorithms, 246 profile. This is required for Kerberos 5-style encryption, used by 265 menu "Public-key cryptography" 268 tristate "RSA (Rivest-Shamir-Adleman)" 275 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) 278 tristate "DH (Diffie-Hellman)" [all …]
|
/linux-6.15/Documentation/ABI/testing/ |
D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
/linux-6.15/arch/x86/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 16 - ADX (large integer arithmetic) 19 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XCTR, XTS, GCM (AES-NI/VAES)" 30 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XCTR, XTS 32 Architecture: x86 (32-bit and 64-bit) using: 33 - AES-NI (AES new instructions) 34 - VAES (Vector AES) 36 Some algorithm implementations are supported only in 64-bit builds, 47 Length-preserving ciphers: Blowfish with ECB and CBC modes 58 Length-preserving ciphers: Camellia with ECB and CBC modes [all …]
|
D | sha256_ni_asm.S | 2 * Intel SHA Extensions optimized implementation of a SHA-256 update function 84 movdqa (\i-32)*4(SHA256CONSTANTS), MSG 101 * Intel SHA Extensions optimized implementation of a SHA-256 update function 127 * DCBA, HGFE -> ABEF, CDGH 177 .section .rodata.cst256.K256, "aM", @progbits, 256
|
/linux-6.15/drivers/crypto/ccp/ |
D | ccp-ops.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 2013-2019 Advanced Micro Devices, Inc. 11 #include <linux/dma-mapping.h> 19 #include "ccp-dev.h" 21 /* SHA initial context values */ 56 #define CCP_NEW_JOBID(ccp) ((ccp->vdata->version == CCP_VERSION(3, 0)) ? \ 61 return atomic_inc_return(&ccp->current_id) & CCP_JOBID_MASK; in ccp_gen_jobid() 66 if (wa->dma_count) in ccp_sg_free() 67 dma_unmap_sg(wa->dma_dev, wa->dma_sg_head, wa->nents, wa->dma_dir); in ccp_sg_free() 69 wa->dma_count = 0; in ccp_sg_free() [all …]
|
/linux-6.15/fs/crypto/ |
D | hkdf.c | 1 // SPDX-License-Identifier: GPL-2.0 16 * SHA-512 because it is well-established, secure, and reasonably efficient. 18 * HKDF-SHA256 was also considered, as its 256-bit security strength would be 19 * sufficient here. A 512-bit security strength is "nice to have", though. 20 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the 21 * common case of deriving an AES-256-XTS key (512 bits), that can result in 22 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of 23 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two. 31 * 1. HKDF-Extract: extract a pseudorandom key of length HKDF_HASHLEN bytes from 33 * 2. HKDF-Expand: expand the pseudorandom key into output keying material of [all …]
|
/linux-6.15/include/linux/ |
D | ccp.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 27 * ccp_present - check if a CCP device is present 29 * Returns zero if a CCP device is present, -ENODEV otherwise. 34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1)) 39 * ccp_version - get the version of the CCP 46 * ccp_enqueue_cmd - queue an operation for processing by the CCP 55 * result in a return code of -EBUSY. 61 * will be -EINPROGRESS. Any other "err" value during callback is 65 * the return code is -EINPROGRESS or 66 * the return code is -EBUSY and CCP_CMD_MAY_BACKLOG flag is set [all …]
|
/linux-6.15/fs/verity/ |
D | fsverity_private.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * fs-verity: read-only file-based authenticity protection 11 #define pr_fmt(fmt) "fs-verity: " fmt 17 * it's enough for over U64_MAX bytes of data using SHA-256 and 4K blocks. 21 /* A hash algorithm supported by fs-verity */ 25 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */ 26 unsigned int block_size; /* block size in bytes, e.g. 64 for SHA-256 */ 38 unsigned int digest_size; /* same as hash_alg->digest_size */ 52 * to root level ('num_levels - 1') 58 * fsverity_info - cached verity metadata for an inode [all …]
|
/linux-6.15/arch/mips/cavium-octeon/crypto/ |
D | octeon-sha256.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 5 * SHA-224 and SHA-256 Secure Hash Algorithm. 11 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 27 #include "octeon-crypto.h" 30 * We pass everything as 64-bit. OCTEON can handle misaligned data. 35 u64 *hash = (u64 *)sctx->state; in octeon_sha256_store_hash() 45 u64 *hash = (u64 *)sctx->state; in octeon_sha256_read_hash() 74 partial = sctx->count % SHA256_BLOCK_SIZE; in __octeon_sha256_update() 75 sctx->count += len; in __octeon_sha256_update() 81 done = -partial; in __octeon_sha256_update() [all …]
|