/openbmc/linux/Documentation/devicetree/bindings/crypto/ |
H A D | rockchip,rk3288-crypto.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/rockchip,rk3288-crypto.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Heiko Stuebner <heiko@sntech.de> 15 - rockchip,rk3288-crypto 16 - rockchip,rk3328-crypto 17 - rockchip,rk3399-crypto 29 clock-names: 37 reset-names: [all …]
|
/openbmc/linux/drivers/crypto/rockchip/ |
H A D | rk3288_crypto.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Crypto acceleration support for Rockchip RK3288 7 * Author: Zain Wang <zain.wang@rock-chips.com> 9 * Some ideas are from marvell-cesa.c and s5p-sss.c driver. 13 #include <crypto/engine.h> 14 #include <crypto/internal/hash.h> 15 #include <crypto/internal/skcipher.h> 17 #include <linux/dma-mapping.h> 66 dev->num_clks = devm_clk_bulk_get_all(dev->dev, &dev->clks); in rk_crypto_get_clks() 67 if (dev->num_clks < dev->variant->num_clks) { in rk_crypto_get_clks() [all …]
|
H A D | rk3288_crypto.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 5 #include <crypto/aes.h> 6 #include <crypto/engine.h> 7 #include <crypto/internal/des.h> 8 #include <crypto/internal/hash.h> 9 #include <crypto/internal/skcipher.h> 10 #include <crypto/md5.h> 11 #include <crypto/sha1.h> 12 #include <crypto/sha2.h> 13 #include <linux/dma-mapping.h> [all …]
|
/openbmc/linux/drivers/crypto/starfive/ |
H A D | jh7110-cryp.c | 1 // SPDX-License-Identifier: GPL-2.0 10 #include <crypto/engine.h> 11 #include "jh7110-cryp.h" 25 #define DRIVER_NAME "jh7110-crypto" 42 if (!ctx->cryp) { in starfive_cryp_find_dev() 47 ctx->cryp = cryp; in starfive_cryp_find_dev() 49 cryp = ctx->cryp; in starfive_cryp_find_dev() 61 " 0 - Disabled\n" 62 " other - Enabled"); 71 cryp->tx = dma_request_chan(cryp->dev, "tx"); in starfive_dma_init() [all …]
|
H A D | jh7110-cryp.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 5 #include <crypto/aes.h> 6 #include <crypto/hash.h> 7 #include <crypto/scatterwalk.h> 8 #include <crypto/sha2.h> 9 #include <crypto/sm3.h> 11 #include <linux/dma-mapping.h> 172 struct reset_control *rst; member
|
/openbmc/linux/net/rxrpc/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 9 select CRYPTO 22 See Documentation/networking/rxrpc.rst. 54 See Documentation/networking/rxrpc.rst. 59 select CRYPTO 68 See Documentation/networking/rxrpc.rst.
|
/openbmc/openbmc/poky/meta/recipes-devtools/python/ |
H A D | python-pycryptodome.inc | 2 DESCRIPTION = "PyCryptodome is a self-contained Python package of low-level\ 5 LICENSE = "PD & BSD-2-Clause" 6 LIC_FILES_CHKSUM = "file://LICENSE.rst;md5=29242a70410a4eeff488a28164e7ab93" 11 python3-cffi \ 12 python3-ctypes \ 13 python3-io \ 14 python3-math \ 17 RDEPENDS:${PN}-tests += " \ 18 python3-unittest \ 21 PACKAGES =+ "${PN}-tests" [all …]
|
/openbmc/linux/fs/crypto/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 bool "FS Encryption (Per-file encryption)" 4 select CRYPTO 18 # whereas selecting them from FS_ENCRYPTION would force them to be built-in. 21 # needs "by default". If userspace will use "non-default" encryption modes such 23 # in the crypto API; see Documentation/filesystems/fscrypt.rst for details. 26 # algorithms, not any per-architecture optimized implementations. It is 43 bool "Enable fscrypt to use inline crypto"
|
/openbmc/linux/Documentation/power/ |
H A D | swsusp-dmcrypt.rst | 2 How to use dm-crypt and swsusp together 10 You know how dm-crypt works. If not, visit the following web page: 11 http://www.saout.de/misc/dm-crypt/ 12 You have read Documentation/power/swsusp.rst and understand it. 13 You did read Documentation/admin-guide/initrd.rst and know how an initrd works. 18 system for crypto setup and/or rescue purposes. You may even have 19 an initrd that does your current crypto setup already. 26 up dm-crypt and then asks swsusp to resume from the encrypted 29 The most important thing is that you set up dm-crypt in such 36 brw------- 1 root root 254, 0 Jul 28 13:37 /dev/mapper/swap0 [all …]
|
/openbmc/linux/crypto/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 11 source "crypto/async_tx/Kconfig" 16 menuconfig CRYPTO config 22 if CRYPTO 24 menu "Crypto core or helper" 41 This option sets the FIPS Module name reported by the Crypto API via 42 the /proc/sys/crypto/fips_name file. 170 bool "Disable run-time self tests" 173 Disable run-time self tests that normally take place at 177 bool "Enable extra run-time crypto self tests" [all …]
|
/openbmc/linux/ |
H A D | MAINTAINERS | 5 --------------------------------------------------- 21 W: *Web-page* with status/info 23 B: URI for where to file *bugs*. A web-page with detailed bug 28 patches to the given subsystem. This is either an in-tree file, 29 or a URI. See Documentation/maintainer/maintainer-entry-profile.rst 46 N: [^a-z]tegra all files whose path contains tegra 64 ---------------- 74 F: Documentation/networking/device_drivers/ethernet/3com/vortex.rst 83 3WARE SAS/SATA-RAID SCSI DRIVERS (3W-XXXX, 3W-9XXX, 3W-SAS) 85 L: linux-scsi@vger.kernel.org [all …]
|
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 4 # see Documentation/kbuild/kconfig-language.rst. 26 source "crypto/Kconfig"
|
/openbmc/linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/ |
H A D | switchdev.rst | 1 .. SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB 19 - Change device to switchdev mode:: 23 - Attach mlx5 switchdev representor 'enp8s0f0' to bridge netdev 'bridge1':: 28 ----- 32 - VLAN filtering (including multiple VLANs per port):: 35 $ bridge vlan add dev enp8s0f0 vid 2-3 37 - VLAN push on bridge ingress:: 41 - VLAN pop on bridge egress:: 48 Subfunction which are spawned over the E-switch are created only with devlink 55 - Create SF:: [all …]
|
/openbmc/linux/drivers/crypto/allwinner/sun4i-ss/ |
H A D | sun4i-ss.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * sun4i-ss.h - hardware cryptographic accelerator for Allwinner A20 SoC 5 * Copyright (C) 2013-2015 Corentin LABBE <clabbe.montjoie@gmail.com> 11 * You could find the datasheet in Documentation/arch/arm/sunxi.rst 15 #include <linux/crypto.h> 21 #include <crypto/scatterwalk.h> 26 #include <crypto/md5.h> 27 #include <crypto/skcipher.h> 28 #include <crypto/sha1.h> 29 #include <crypto/hash.h> [all …]
|
/openbmc/linux/block/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 18 - block device files will become unusable 19 - some filesystems (such as ext3) will become unavailable. 86 support for ZAC/ZBC/ZNS host-managed and host-aware zoned block 101 See Documentation/admin-guide/cgroup-v1/blkio-controller.rst for more information. 128 Enable writeback throttling by default for request-based block devices. 197 Build the blk-crypto subsystem. Enabling this lets the 202 bool "Enable crypto API fallback for blk-crypto" 204 select CRYPTO 208 by falling back to the kernel crypto API when inline
|
H A D | blk-crypto.c | 1 // SPDX-License-Identifier: GPL-2.0 7 * Refer to Documentation/block/inline-encryption.rst for detailed explanation. 10 #define pr_fmt(fmt) "blk-crypto: " fmt 14 #include <linux/blk-crypto-profile.h> 19 #include "blk-crypto-internal.h" 23 .name = "AES-256-XTS", 29 .name = "AES-128-CBC-ESSIV", 41 .name = "SM4-XTS", 58 "Number of bio crypto contexts to preallocate"); 104 bc->bc_key = key; in bio_crypt_set_ctx() [all …]
|
/openbmc/linux/fs/ecryptfs/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 depends on KEYS && CRYPTO && (ENCRYPTED_KEYS || ENCRYPTED_KEYS=n) 10 <file:Documentation/filesystems/ecryptfs.rst> to learn more about
|
/openbmc/linux/drivers/net/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 25 # All the following symbols are dependent on NETDEVICES - do not repeat 54 Refer to <file:Documentation/networking/bonding.rst> for more 63 This is essentially a bit-bucket device (i.e. traffic you send to 79 depends on !KMSAN # KMSAN doesn't support the crypto configs below 82 select CRYPTO 130 <file:Documentation/networking/eql.rst>. You may also want to read 131 section 6.2 of the NET-3-HOWTO, available from 167 tristate "MAC-VLAN support" 173 iproute2 package starting with the iproute2-2.6.23 release: [all …]
|
/openbmc/linux/lib/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 31 converting bitfields between a CPU-usable representation and a 33 - Is little endian (bytes are reversed within a 32-bit group) 34 - The least-significant 32-bit word comes first (within a 64-bit 36 - The most significant bit of a byte is at its right (bit 0 of a 50 This option enables the use of hardware bit-reversal instructions on 93 bool "Access I/O in non-MMIO mode" 99 mechanism, the host-local I/O resource can be mapped into system 101 system can access the I/O devices with the mapped-logic PIO through 130 source "lib/crypto/Kconfig" [all …]
|
/openbmc/linux/include/keys/ |
H A D | asymmetric-parser.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 2 /* Asymmetric public-key cryptography data parser 4 * See Documentation/crypto/asymmetric-keys.rst
|
H A D | asymmetric-subtype.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 2 /* Asymmetric public-key cryptography key subtype 4 * See Documentation/crypto/asymmetric-keys.rst 14 #include <keys/asymmetric-type.h> 48 * asymmetric_key_subtype - Get the subtype from an asymmetric key 52 * type-specific data attached to the key. 57 return key->payload.data[asym_subtype]; in asymmetric_key_subtype()
|
/openbmc/linux/net/ceph/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 11 select CRYPTO 36 bool "Use in-kernel support for DNS lookup" 45 Documentation/networking/dns_resolver.rst
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | trusted-services-src.inc | 3 LICENSE = "Apache-2.0 & BSD-3-Clause & BSD-2-Clause & Zlib" 5 …it.trustedfirmware.org/TS/trusted-services.git;protocol=https;branch=main;name=trusted-services;de… 11 file://0001-Allow-configuring-flash-image-files-compile-time.patch \ 15 SRCREV_trusted-services = "602be607198ea784bc5ab1c0c9d3ac4e2c67f1d9" 16 LIC_FILES_CHKSUM = "file://${S}/license.rst;md5=ea160bac7f690a069c608516b17997f4" 18 S = "${WORKDIR}/git/trusted-services" 31 # Nanopb, tag "nanopb-0.4.7" plus some further fixes 51 SRCREV_FORMAT = "trusted-services_dtc_mbedtls_nanopb_qcbor_tcose_cpputest" 66 # Fine tune MbedTLS configuration for crypto only operation. 67 sh -c "cd ${WORKDIR}/git/mbedtls; python3 scripts/config.py crypto" [all …]
|
/openbmc/linux/net/tipc/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 21 as a module, say M here and read <file:Documentation/kbuild/modules.rst>. 30 IP-over-InfiniBand devices. 42 select CRYPTO 48 advanced algorithm: AEAD AES-GCM (like IPSec or TLS) before leaving/ 50 Key setting from user-space is performed via netlink by a user program
|
/openbmc/linux/kernel/ |
H A D | Kconfig.kexec | 1 # SPDX-License-Identifier: GPL-2.0-only 39 select CRYPTO 104 which are loaded in the main kernel with kexec-tools into 110 For more details see Documentation/admin-guide/kdump/kdump.rst 113 See also <file:Documentation/s390/zfcpdump.rst>
|