Home
last modified time | relevance | path

Searched +full:aes +full:- +full:cmac (Results 1 – 25 of 43) sorted by relevance

12

/linux-6.12.1/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux-6.12.1/net/sunrpc/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
28 GSS-API mechanism (RFC 1964).
30 Secure RPC calls with Kerberos require an auxiliary user-space
31 daemon which may be found in the Linux nfs-utils package
32 available from http://linux-nfs.org/. In addition, user-space
38 bool "Enable Kerberos enctypes based on AES and SHA-1"
46 that utilize Advanced Encryption Standard (AES) ciphers and
47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
48 aes256-cts-hmac-sha1-96.
51 bool "Enable Kerberos encryption types based on Camellia and CMAC"
[all …]
/linux-6.12.1/include/linux/
Dccp.h1 /* SPDX-License-Identifier: GPL-2.0-only */
17 #include <crypto/aes.h>
27 * ccp_present - check if a CCP device is present
29 * Returns zero if a CCP device is present, -ENODEV otherwise.
34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1))
39 * ccp_version - get the version of the CCP
46 * ccp_enqueue_cmd - queue an operation for processing by the CCP
55 * result in a return code of -EBUSY.
61 * will be -EINPROGRESS. Any other "err" value during callback is
65 * the return code is -EINPROGRESS or
[all …]
/linux-6.12.1/net/mac80211/
Daes_cmac.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AES-128-CMAC with TLen 16 for IEEE 802.11w BIP
13 #include <crypto/aes.h>
19 #define CMAC_TLEN 8 /* CMAC TLen = 64 bits (8 octets) */
20 #define CMAC_TLEN_256 16 /* CMAC TLen = 128 bits (16 octets) */
32 desc->tfm = tfm; in ieee80211_aes_cmac()
40 crypto_shash_update(desc, data + 8, data_len - 8 - CMAC_TLEN); in ieee80211_aes_cmac()
42 crypto_shash_update(desc, data, data_len - CMAC_TLEN); in ieee80211_aes_cmac()
55 desc->tfm = tfm; in ieee80211_aes_cmac_256()
64 data_len - 8 - CMAC_TLEN_256); in ieee80211_aes_cmac_256()
[all …]
Dfils_aead.c1 // SPDX-License-Identifier: GPL-2.0-only
7 #include <crypto/aes.h>
32 desc->tfm = tfm; in aes_s2v()
34 /* D = AES-CMAC(K, <zero>) */ in aes_s2v()
37 for (i = 0; i < num_elem - 1; i++) { in aes_s2v()
49 crypto_shash_update(desc, addr[i], len[i] - AES_BLOCK_SIZE); in aes_s2v()
50 crypto_xor(d, addr[i] + len[i] - AES_BLOCK_SIZE, in aes_s2v()
59 /* V = AES-CMAC(K, T) */ in aes_s2v()
87 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in aes_siv_encrypt()
99 * overwriting this during AES-CTR. in aes_siv_encrypt()
[all …]
/linux-6.12.1/net/sunrpc/auth_gss/
Dgss_krb5_mech.c1 // SPDX-License-Identifier: BSD-3-Clause
5 * Copyright (c) 2001-2008 The Regents of the University of Michigan.
36 * AES-128 with SHA-1 (RFC 3962)
41 .name = "aes128-cts",
42 .encrypt_name = "cts(cbc(aes))",
43 .aux_cipher = "cbc(aes)",
54 .signalg = -1,
55 .sealalg = -1,
65 * AES-256 with SHA-1 (RFC 3962)
70 .name = "aes256-cts",
[all …]
Dgss_krb5_keys.c73 * krb5_nfold - n-fold function
79 * This is the n-fold function as described in rfc3961, sec 5.1
104 for (i = ulcm-1; i >= 0; i--) { in krb5_nfold()
109 ((inbits << 3) - 1) in krb5_nfold()
115 + ((inbits - (i % inbits)) << 3) in krb5_nfold()
119 byte += (((in[((inbits - 1) - (msbit >> 3)) % inbits] << 8)| in krb5_nfold()
120 (in[((inbits) - (msbit >> 3)) % inbits])) in krb5_nfold()
134 for (i = outbits - 1; i >= 0; i--) { in krb5_nfold()
158 int ret = -EINVAL; in krb5_DK()
160 keybytes = gk5e->keybytes; in krb5_DK()
[all …]
/linux-6.12.1/drivers/crypto/ccp/
Dccp-crypto-aes-cmac.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AMD Cryptographic Coprocessor (CCP) AES CMAC crypto API support
16 #include <crypto/aes.h>
21 #include "ccp-crypto.h"
34 if (rctx->hash_rem) { in ccp_aes_cmac_complete()
36 unsigned int offset = rctx->nbytes - rctx->hash_rem; in ccp_aes_cmac_complete()
38 scatterwalk_map_and_copy(rctx->buf, rctx->src, in ccp_aes_cmac_complete()
39 offset, rctx->hash_rem, 0); in ccp_aes_cmac_complete()
40 rctx->buf_count = rctx->hash_rem; in ccp_aes_cmac_complete()
42 rctx->buf_count = 0; in ccp_aes_cmac_complete()
[all …]
DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_CCP_DD) += ccp.o
3 ccp-objs := sp-dev.o sp-platform.o
4 ccp-$(CONFIG_CRYPTO_DEV_SP_CCP) += ccp-dev.o \
5 ccp-ops.o \
6 ccp-dev-v3.o \
7 ccp-dev-v5.o \
8 ccp-dmaengine.o
9 ccp-$(CONFIG_CRYPTO_DEV_CCP_DEBUGFS) += ccp-debugfs.o
10 ccp-$(CONFIG_PCI) += sp-pci.o
[all …]
Dccp-crypto.h1 /* SPDX-License-Identifier: GPL-2.0-only */
17 #include <crypto/aes.h>
59 /* Child algorithm used for HMAC, CMAC, etc */
82 struct crypto_alg *alg = tfm->__crt_alg; in ccp_crypto_ahash_alg()
90 /***** AES related defines *****/
105 /* CMAC key structures */
182 /* SHA-related defines
266 struct ccp_aes_ctx aes; member
/linux-6.12.1/Documentation/devicetree/bindings/crypto/
Dnvidia,tegra234-se-aes.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-aes.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: NVIDIA Tegra Security Engine for AES algorithms
10 The Tegra Security Engine accelerates the following AES encryption/decryption
11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
12 AES-CMAC
15 - Akhil R <akhilrajeev@nvidia.com>
19 const: nvidia,tegra234-se-aes
[all …]
/linux-6.12.1/fs/smb/client/
Dsmb2transport.c1 // SPDX-License-Identifier: LGPL-2.1
32 struct cifs_secmech *p = &server->secmech; in smb3_crypto_shash_allocate()
35 rc = cifs_alloc_hash("hmac(sha256)", &p->hmacsha256); in smb3_crypto_shash_allocate()
39 rc = cifs_alloc_hash("cmac(aes)", &p->aes_cmac); in smb3_crypto_shash_allocate()
45 cifs_free_hash(&p->hmacsha256); in smb3_crypto_shash_allocate()
52 struct cifs_secmech *p = &server->secmech; in smb311_crypto_shash_allocate()
55 rc = cifs_alloc_hash("hmac(sha256)", &p->hmacsha256); in smb311_crypto_shash_allocate()
59 rc = cifs_alloc_hash("cmac(aes)", &p->aes_cmac); in smb311_crypto_shash_allocate()
63 rc = cifs_alloc_hash("sha512", &p->sha512); in smb311_crypto_shash_allocate()
70 cifs_free_hash(&p->aes_cmac); in smb311_crypto_shash_allocate()
[all …]
/linux-6.12.1/drivers/crypto/tegra/
Dtegra-se.h1 /* SPDX-License-Identifier: GPL-2.0-only
2 * SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
91 /* AES Configuration */
154 /* AES Crypto Configuration */
359 SE_ALG_CMAC, /* Cipher-based MAC (CMAC) mode */
365 SE_ALG_SHA1, /* Secure Hash Algorithm-1 (SHA1) mode */
366 SE_ALG_SHA224, /* Secure Hash Algorithm-224 (SHA224) mode */
367 SE_ALG_SHA256, /* Secure Hash Algorithm-256 (SHA256) mode */
368 SE_ALG_SHA384, /* Secure Hash Algorithm-384 (SHA384) mode */
369 SE_ALG_SHA512, /* Secure Hash Algorithm-512 (SHA512) mode */
[all …]
Dtegra-se-aes.c1 // SPDX-License-Identifier: GPL-2.0-only
2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
8 #include <linux/dma-mapping.h>
14 #include <crypto/aes.h>
23 #include "tegra-se.h"
87 /* increment counter (128-bit int) */
91 --bits; in ctr_iv_inc()
103 offset = req->cryptlen - ctx->ivsize; in tegra_cbc_iv_copyback()
105 if (rctx->encrypt) in tegra_cbc_iv_copyback()
106 memcpy(req->iv, rctx->datbuf.buf + offset, ctx->ivsize); in tegra_cbc_iv_copyback()
[all …]
/linux-6.12.1/arch/arm64/crypto/
Daes-glue.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * linux/arch/arm64/crypto/aes-glue.c - wrapper code for ARMv8 AES
5 * Copyright (C) 2013 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org>
11 #include <crypto/aes.h>
22 #include "aes-ce-setkey.h"
41 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 Crypto Extensions");
58 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS/XCTR using ARMv8 NEON");
61 MODULE_ALIAS_CRYPTO("ecb(aes)");
62 MODULE_ALIAS_CRYPTO("cbc(aes)");
63 MODULE_ALIAS_CRYPTO("ctr(aes)");
[all …]
/linux-6.12.1/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
149 cbc(aes).
168 cbc(aes).
171 bool "Disable run-time self tests"
174 Disable run-time self tests that normally take place at
178 bool "Enable extra run-time crypto self tests"
181 Enable extra run-time self tests of registered crypto algorithms,
247 menu "Public-key cryptography"
250 tristate "RSA (Rivest-Shamir-Adleman)"
256 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
[all …]
Dtcrypt.c1 // SPDX-License-Identifier: GPL-2.0-or-later
9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
12 * Updated RFC4106 AES-GCM testing.
91 while (i-- > 0) in testmgr_alloc_buf()
94 return -ENOMEM; in testmgr_alloc_buf()
109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead()
124 np--; in sg_init_aead()
134 struct crypto_wait *wait = req->base.data; in do_one_aead_op()
185 return -ENOMEM; in test_mb_aead_jiffies()
212 return -ENOMEM; in test_mb_aead_cycles()
[all …]
/linux-6.12.1/fs/smb/server/
Dcrypto_ctx.c1 // SPDX-License-Identifier: GPL-2.0-or-later
34 crypto_free_shash(shash->tfm); in free_shash()
45 tfm = crypto_alloc_aead("gcm(aes)", 0, 0); in alloc_aead()
48 tfm = crypto_alloc_aead("ccm(aes)", 0, 0); in alloc_aead()
76 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in alloc_shash_desc()
96 shash->tfm = tfm; in alloc_shash_desc()
105 free_shash(ctx->desc[i]); in ctx_free()
107 free_aead(ctx->ccmaes[i]); in ctx_free()
121 list_del(&ctx->list); in ksmbd_find_crypto_ctx()
139 ctx_list.avail_ctx--; in ksmbd_find_crypto_ctx()
[all …]
/linux-6.12.1/drivers/crypto/ccree/
Dcc_hash.h1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */
27 /* this struct was taken from drivers/crypto/nx/nx-aes-xcbc.c and it is used
28 * for xcbc/cmac statesize
61 return &state->buf_cnt[state->buff_index]; in cc_hash_buf_cnt()
66 return state->buffers[state->buff_index]; in cc_hash_buf()
71 return &state->buf_cnt[state->buff_index ^ 1]; in cc_next_buf_cnt()
76 return state->buffers[state->buff_index ^ 1]; in cc_next_buf()
84 * cc_digest_len_addr() - Gets the initial digest length
95 * cc_larval_digest_addr() - Gets the address of the initial digest in SRAM
/linux-6.12.1/drivers/crypto/inside-secure/
Dsafexcel_hash.c1 // SPDX-License-Identifier: GPL-2.0
5 * Antoine Tenart <antoine.tenart@free-electrons.com>
8 #include <crypto/aes.h>
18 #include <linux/dma-mapping.h>
33 struct crypto_aes_ctx *aes; member
72 return req->len - req->processed; in safexcel_queued_len()
80 (struct safexcel_token *)cdesc->control_data.token; in safexcel_hash_token()
90 token[1].packet_length = 16 - input_length; in safexcel_hash_token()
112 struct safexcel_crypto_priv *priv = ctx->base.priv; in safexcel_context_control()
115 cdesc->control_data.control0 = ctx->alg; in safexcel_context_control()
[all …]
/linux-6.12.1/tools/testing/selftests/net/tcp_ao/lib/
Dsock.c1 // SPDX-License-Identifier: GPL-2.0
59 return -errno; in test_wait_fd()
62 return -ETIMEDOUT; in test_wait_fd()
66 return -errno; in test_wait_fd()
68 return -ret; in test_wait_fd()
88 err = -errno; in __test_connect_socket()
100 err = -errno; in __test_connect_socket()
146 ao->set_current = !!set_current; in test_prepare_key_sockaddr()
147 ao->set_rnext = !!set_rnext; in test_prepare_key_sockaddr()
148 ao->prefix = prefix; in test_prepare_key_sockaddr()
[all …]
/linux-6.12.1/Documentation/crypto/
Darchitecture.rst5 ----------------------
10 - Symmetric ciphers
12 - AEAD ciphers
14 - Message digest, including keyed message digest
16 - Random number generation
18 - User space interface
21 ---------------------
30 a caller or invoked together with a template to form multi-block ciphers
38 - aes
40 - ecb(aes)
[all …]
/linux-6.12.1/net/xfrm/
Dxfrm_algo.c1 // SPDX-License-Identifier: GPL-2.0-or-later
29 .name = "rfc4106(gcm(aes))",
48 .name = "rfc4106(gcm(aes))",
67 .name = "rfc4106(gcm(aes))",
86 .name = "rfc4309(ccm(aes))",
105 .name = "rfc4309(ccm(aes))",
124 .name = "rfc4309(ccm(aes))",
143 .name = "rfc4543(gcm(aes))",
314 .name = "xcbc(aes)",
334 .name = "cmac(aes)",
[all …]
/linux-6.12.1/drivers/crypto/caam/
Dcaamhash.c1 // SPDX-License-Identifier: GPL-2.0+
3 * caam - Freescale FSL CAAM support for ahash functions of crypto API
6 * Copyright 2018-2019, 2023 NXP
13 * --------------- ---------------
14 * | JobDesc #1 |-------------------->| ShareDesc |
16 * --------------- | (operation) |
17 * ---------------
21 * --------------- ---------------
22 * | JobDesc #2 |-------------------->| ShareDesc |
23 * | *(packet 2) | |------------->| (hashKey) |
[all …]
/linux-6.12.1/tools/testing/selftests/net/tcp_ao/
Dkey-management.c1 // SPDX-License-Identifier: GPL-2.0
23 err = add_vrf("ksft-vrf", test_vrf_tabid, test_vrf_ifindex, -1); in setup_vrfs()
27 err = link_set_up("ksft-vrf"); in setup_vrfs()
91 return -errno; in test_del_key()
100 return -EEXIST; in test_del_key()
101 if (err != -E2BIG) in test_del_key()
108 return -ENOTRECOVERABLE; in test_del_key()
110 return -ENOTRECOVERABLE; in test_del_key()
121 if ((err == -EBUSY && fault(BUSY)) || (err == -EINVAL && fault(CURRNEXT))) { in try_delete_key()
162 return -ENOTRECOVERABLE; in test_set_key()
[all …]

12