/linux-6.12.1/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
/linux-6.12.1/net/sunrpc/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 28 GSS-API mechanism (RFC 1964). 30 Secure RPC calls with Kerberos require an auxiliary user-space 31 daemon which may be found in the Linux nfs-utils package 32 available from http://linux-nfs.org/. In addition, user-space 38 bool "Enable Kerberos enctypes based on AES and SHA-1" 46 that utilize Advanced Encryption Standard (AES) ciphers and 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 48 aes256-cts-hmac-sha1-96. 51 bool "Enable Kerberos encryption types based on Camellia and CMAC" [all …]
|
/linux-6.12.1/include/linux/ |
D | ccp.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 17 #include <crypto/aes.h> 27 * ccp_present - check if a CCP device is present 29 * Returns zero if a CCP device is present, -ENODEV otherwise. 34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1)) 39 * ccp_version - get the version of the CCP 46 * ccp_enqueue_cmd - queue an operation for processing by the CCP 55 * result in a return code of -EBUSY. 61 * will be -EINPROGRESS. Any other "err" value during callback is 65 * the return code is -EINPROGRESS or [all …]
|
/linux-6.12.1/net/mac80211/ |
D | aes_cmac.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AES-128-CMAC with TLen 16 for IEEE 802.11w BIP 13 #include <crypto/aes.h> 19 #define CMAC_TLEN 8 /* CMAC TLen = 64 bits (8 octets) */ 20 #define CMAC_TLEN_256 16 /* CMAC TLen = 128 bits (16 octets) */ 32 desc->tfm = tfm; in ieee80211_aes_cmac() 40 crypto_shash_update(desc, data + 8, data_len - 8 - CMAC_TLEN); in ieee80211_aes_cmac() 42 crypto_shash_update(desc, data, data_len - CMAC_TLEN); in ieee80211_aes_cmac() 55 desc->tfm = tfm; in ieee80211_aes_cmac_256() 64 data_len - 8 - CMAC_TLEN_256); in ieee80211_aes_cmac_256() [all …]
|
D | fils_aead.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 #include <crypto/aes.h> 32 desc->tfm = tfm; in aes_s2v() 34 /* D = AES-CMAC(K, <zero>) */ in aes_s2v() 37 for (i = 0; i < num_elem - 1; i++) { in aes_s2v() 49 crypto_shash_update(desc, addr[i], len[i] - AES_BLOCK_SIZE); in aes_s2v() 50 crypto_xor(d, addr[i] + len[i] - AES_BLOCK_SIZE, in aes_s2v() 59 /* V = AES-CMAC(K, T) */ in aes_s2v() 87 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in aes_siv_encrypt() 99 * overwriting this during AES-CTR. in aes_siv_encrypt() [all …]
|
/linux-6.12.1/net/sunrpc/auth_gss/ |
D | gss_krb5_mech.c | 1 // SPDX-License-Identifier: BSD-3-Clause 5 * Copyright (c) 2001-2008 The Regents of the University of Michigan. 36 * AES-128 with SHA-1 (RFC 3962) 41 .name = "aes128-cts", 42 .encrypt_name = "cts(cbc(aes))", 43 .aux_cipher = "cbc(aes)", 54 .signalg = -1, 55 .sealalg = -1, 65 * AES-256 with SHA-1 (RFC 3962) 70 .name = "aes256-cts", [all …]
|
D | gss_krb5_keys.c | 73 * krb5_nfold - n-fold function 79 * This is the n-fold function as described in rfc3961, sec 5.1 104 for (i = ulcm-1; i >= 0; i--) { in krb5_nfold() 109 ((inbits << 3) - 1) in krb5_nfold() 115 + ((inbits - (i % inbits)) << 3) in krb5_nfold() 119 byte += (((in[((inbits - 1) - (msbit >> 3)) % inbits] << 8)| in krb5_nfold() 120 (in[((inbits) - (msbit >> 3)) % inbits])) in krb5_nfold() 134 for (i = outbits - 1; i >= 0; i--) { in krb5_nfold() 158 int ret = -EINVAL; in krb5_DK() 160 keybytes = gk5e->keybytes; in krb5_DK() [all …]
|
/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-crypto-aes-cmac.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * AMD Cryptographic Coprocessor (CCP) AES CMAC crypto API support 16 #include <crypto/aes.h> 21 #include "ccp-crypto.h" 34 if (rctx->hash_rem) { in ccp_aes_cmac_complete() 36 unsigned int offset = rctx->nbytes - rctx->hash_rem; in ccp_aes_cmac_complete() 38 scatterwalk_map_and_copy(rctx->buf, rctx->src, in ccp_aes_cmac_complete() 39 offset, rctx->hash_rem, 0); in ccp_aes_cmac_complete() 40 rctx->buf_count = rctx->hash_rem; in ccp_aes_cmac_complete() 42 rctx->buf_count = 0; in ccp_aes_cmac_complete() [all …]
|
D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_CCP_DD) += ccp.o 3 ccp-objs := sp-dev.o sp-platform.o 4 ccp-$(CONFIG_CRYPTO_DEV_SP_CCP) += ccp-dev.o \ 5 ccp-ops.o \ 6 ccp-dev-v3.o \ 7 ccp-dev-v5.o \ 8 ccp-dmaengine.o 9 ccp-$(CONFIG_CRYPTO_DEV_CCP_DEBUGFS) += ccp-debugfs.o 10 ccp-$(CONFIG_PCI) += sp-pci.o [all …]
|
D | ccp-crypto.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 17 #include <crypto/aes.h> 59 /* Child algorithm used for HMAC, CMAC, etc */ 82 struct crypto_alg *alg = tfm->__crt_alg; in ccp_crypto_ahash_alg() 90 /***** AES related defines *****/ 105 /* CMAC key structures */ 182 /* SHA-related defines 266 struct ccp_aes_ctx aes; member
|
/linux-6.12.1/Documentation/devicetree/bindings/crypto/ |
D | nvidia,tegra234-se-aes.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-aes.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: NVIDIA Tegra Security Engine for AES algorithms 10 The Tegra Security Engine accelerates the following AES encryption/decryption 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM, 12 AES-CMAC 15 - Akhil R <akhilrajeev@nvidia.com> 19 const: nvidia,tegra234-se-aes [all …]
|
/linux-6.12.1/fs/smb/client/ |
D | smb2transport.c | 1 // SPDX-License-Identifier: LGPL-2.1 32 struct cifs_secmech *p = &server->secmech; in smb3_crypto_shash_allocate() 35 rc = cifs_alloc_hash("hmac(sha256)", &p->hmacsha256); in smb3_crypto_shash_allocate() 39 rc = cifs_alloc_hash("cmac(aes)", &p->aes_cmac); in smb3_crypto_shash_allocate() 45 cifs_free_hash(&p->hmacsha256); in smb3_crypto_shash_allocate() 52 struct cifs_secmech *p = &server->secmech; in smb311_crypto_shash_allocate() 55 rc = cifs_alloc_hash("hmac(sha256)", &p->hmacsha256); in smb311_crypto_shash_allocate() 59 rc = cifs_alloc_hash("cmac(aes)", &p->aes_cmac); in smb311_crypto_shash_allocate() 63 rc = cifs_alloc_hash("sha512", &p->sha512); in smb311_crypto_shash_allocate() 70 cifs_free_hash(&p->aes_cmac); in smb311_crypto_shash_allocate() [all …]
|
/linux-6.12.1/drivers/crypto/tegra/ |
D | tegra-se.h | 1 /* SPDX-License-Identifier: GPL-2.0-only 2 * SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved. 91 /* AES Configuration */ 154 /* AES Crypto Configuration */ 359 SE_ALG_CMAC, /* Cipher-based MAC (CMAC) mode */ 365 SE_ALG_SHA1, /* Secure Hash Algorithm-1 (SHA1) mode */ 366 SE_ALG_SHA224, /* Secure Hash Algorithm-224 (SHA224) mode */ 367 SE_ALG_SHA256, /* Secure Hash Algorithm-256 (SHA256) mode */ 368 SE_ALG_SHA384, /* Secure Hash Algorithm-384 (SHA384) mode */ 369 SE_ALG_SHA512, /* Secure Hash Algorithm-512 (SHA512) mode */ [all …]
|
D | tegra-se-aes.c | 1 // SPDX-License-Identifier: GPL-2.0-only 2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved. 8 #include <linux/dma-mapping.h> 14 #include <crypto/aes.h> 23 #include "tegra-se.h" 87 /* increment counter (128-bit int) */ 91 --bits; in ctr_iv_inc() 103 offset = req->cryptlen - ctx->ivsize; in tegra_cbc_iv_copyback() 105 if (rctx->encrypt) in tegra_cbc_iv_copyback() 106 memcpy(req->iv, rctx->datbuf.buf + offset, ctx->ivsize); in tegra_cbc_iv_copyback() [all …]
|
/linux-6.12.1/arch/arm64/crypto/ |
D | aes-glue.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * linux/arch/arm64/crypto/aes-glue.c - wrapper code for ARMv8 AES 5 * Copyright (C) 2013 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org> 11 #include <crypto/aes.h> 22 #include "aes-ce-setkey.h" 41 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 Crypto Extensions"); 58 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 NEON"); 61 MODULE_ALIAS_CRYPTO("ecb(aes)"); 62 MODULE_ALIAS_CRYPTO("cbc(aes)"); 63 MODULE_ALIAS_CRYPTO("ctr(aes)"); [all …]
|
/linux-6.12.1/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 149 cbc(aes). 168 cbc(aes). 171 bool "Disable run-time self tests" 174 Disable run-time self tests that normally take place at 178 bool "Enable extra run-time crypto self tests" 181 Enable extra run-time self tests of registered crypto algorithms, 247 menu "Public-key cryptography" 250 tristate "RSA (Rivest-Shamir-Adleman)" 256 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) [all …]
|
D | tcrypt.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org> 12 * Updated RFC4106 AES-GCM testing. 91 while (i-- > 0) in testmgr_alloc_buf() 94 return -ENOMEM; in testmgr_alloc_buf() 109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead() 124 np--; in sg_init_aead() 134 struct crypto_wait *wait = req->base.data; in do_one_aead_op() 185 return -ENOMEM; in test_mb_aead_jiffies() 212 return -ENOMEM; in test_mb_aead_cycles() [all …]
|
/linux-6.12.1/fs/smb/server/ |
D | crypto_ctx.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 34 crypto_free_shash(shash->tfm); in free_shash() 45 tfm = crypto_alloc_aead("gcm(aes)", 0, 0); in alloc_aead() 48 tfm = crypto_alloc_aead("ccm(aes)", 0, 0); in alloc_aead() 76 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in alloc_shash_desc() 96 shash->tfm = tfm; in alloc_shash_desc() 105 free_shash(ctx->desc[i]); in ctx_free() 107 free_aead(ctx->ccmaes[i]); in ctx_free() 121 list_del(&ctx->list); in ksmbd_find_crypto_ctx() 139 ctx_list.avail_ctx--; in ksmbd_find_crypto_ctx() [all …]
|
/linux-6.12.1/drivers/crypto/ccree/ |
D | cc_hash.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */ 27 /* this struct was taken from drivers/crypto/nx/nx-aes-xcbc.c and it is used 28 * for xcbc/cmac statesize 61 return &state->buf_cnt[state->buff_index]; in cc_hash_buf_cnt() 66 return state->buffers[state->buff_index]; in cc_hash_buf() 71 return &state->buf_cnt[state->buff_index ^ 1]; in cc_next_buf_cnt() 76 return state->buffers[state->buff_index ^ 1]; in cc_next_buf() 84 * cc_digest_len_addr() - Gets the initial digest length 95 * cc_larval_digest_addr() - Gets the address of the initial digest in SRAM
|
/linux-6.12.1/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Antoine Tenart <antoine.tenart@free-electrons.com> 8 #include <crypto/aes.h> 18 #include <linux/dma-mapping.h> 33 struct crypto_aes_ctx *aes; member 72 return req->len - req->processed; in safexcel_queued_len() 80 (struct safexcel_token *)cdesc->control_data.token; in safexcel_hash_token() 90 token[1].packet_length = 16 - input_length; in safexcel_hash_token() 112 struct safexcel_crypto_priv *priv = ctx->base.priv; in safexcel_context_control() 115 cdesc->control_data.control0 = ctx->alg; in safexcel_context_control() [all …]
|
/linux-6.12.1/tools/testing/selftests/net/tcp_ao/lib/ |
D | sock.c | 1 // SPDX-License-Identifier: GPL-2.0 59 return -errno; in test_wait_fd() 62 return -ETIMEDOUT; in test_wait_fd() 66 return -errno; in test_wait_fd() 68 return -ret; in test_wait_fd() 88 err = -errno; in __test_connect_socket() 100 err = -errno; in __test_connect_socket() 146 ao->set_current = !!set_current; in test_prepare_key_sockaddr() 147 ao->set_rnext = !!set_rnext; in test_prepare_key_sockaddr() 148 ao->prefix = prefix; in test_prepare_key_sockaddr() [all …]
|
/linux-6.12.1/Documentation/crypto/ |
D | architecture.rst | 5 ---------------------- 10 - Symmetric ciphers 12 - AEAD ciphers 14 - Message digest, including keyed message digest 16 - Random number generation 18 - User space interface 21 --------------------- 30 a caller or invoked together with a template to form multi-block ciphers 38 - aes 40 - ecb(aes) [all …]
|
/linux-6.12.1/net/xfrm/ |
D | xfrm_algo.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 29 .name = "rfc4106(gcm(aes))", 48 .name = "rfc4106(gcm(aes))", 67 .name = "rfc4106(gcm(aes))", 86 .name = "rfc4309(ccm(aes))", 105 .name = "rfc4309(ccm(aes))", 124 .name = "rfc4309(ccm(aes))", 143 .name = "rfc4543(gcm(aes))", 314 .name = "xcbc(aes)", 334 .name = "cmac(aes)", [all …]
|
/linux-6.12.1/drivers/crypto/caam/ |
D | caamhash.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * caam - Freescale FSL CAAM support for ahash functions of crypto API 6 * Copyright 2018-2019, 2023 NXP 13 * --------------- --------------- 14 * | JobDesc #1 |-------------------->| ShareDesc | 16 * --------------- | (operation) | 17 * --------------- 21 * --------------- --------------- 22 * | JobDesc #2 |-------------------->| ShareDesc | 23 * | *(packet 2) | |------------->| (hashKey) | [all …]
|
/linux-6.12.1/tools/testing/selftests/net/tcp_ao/ |
D | key-management.c | 1 // SPDX-License-Identifier: GPL-2.0 23 err = add_vrf("ksft-vrf", test_vrf_tabid, test_vrf_ifindex, -1); in setup_vrfs() 27 err = link_set_up("ksft-vrf"); in setup_vrfs() 91 return -errno; in test_del_key() 100 return -EEXIST; in test_del_key() 101 if (err != -E2BIG) in test_del_key() 108 return -ENOTRECOVERABLE; in test_del_key() 110 return -ENOTRECOVERABLE; in test_del_key() 121 if ((err == -EBUSY && fault(BUSY)) || (err == -EINVAL && fault(CURRNEXT))) { in try_delete_key() 162 return -ENOTRECOVERABLE; in test_set_key() [all …]
|