Home
last modified time | relevance | path

Searched +full:aes +full:- +full:gcm (Results 1 – 25 of 122) sorted by relevance

12345

/openbmc/linux/Documentation/crypto/
H A Darchitecture.rst5 ----------------------
10 - Symmetric ciphers
12 - AEAD ciphers
14 - Message digest, including keyed message digest
16 - Random number generation
18 - User space interface
21 ---------------------
30 a caller or invoked together with a template to form multi-block ciphers
38 - aes
40 - ecb(aes)
[all …]
/openbmc/linux/arch/powerpc/crypto/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
5 # Arch-specific CryptoAPI modules.
8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o
9 obj-$(CONFIG_CRYPTO_MD5_PPC) += md5-ppc.o
10 obj-$(CONFIG_CRYPTO_SHA1_PPC) += sha1-powerpc.o
11 obj-$(CONFIG_CRYPTO_SHA1_PPC_SPE) += sha1-ppc-spe.o
12 obj-$(CONFIG_CRYPTO_SHA256_PPC_SPE) += sha256-ppc-spe.o
13 obj-$(CONFIG_CRYPTO_CRC32C_VPMSUM) += crc32c-vpmsum.o
14 obj-$(CONFIG_CRYPTO_CRCT10DIF_VPMSUM) += crct10dif-vpmsum.o
15 obj-$(CONFIG_CRYPTO_VPMSUM_TESTER) += crc-vpmsum_test.o
[all …]
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 - AltiVec extensions
26 - AltiVec extensions
48 tristate "Hash functions: SHA-1"
51 SHA-1 secure hash algorithm (FIPS 180)
56 tristate "Hash functions: SHA-1 (SPE)"
59 SHA-1 secure hash algorithm (FIPS 180)
62 - SPE (Signal Processing Engine) extensions
65 tristate "Hash functions: SHA-224 and SHA-256 (SPE)"
70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
[all …]
/openbmc/linux/arch/arm64/crypto/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0-only
8 obj-$(CONFIG_CRYPTO_SHA1_ARM64_CE) += sha1-ce.o
9 sha1-ce-y := sha1-ce-glue.o sha1-ce-core.o
11 obj-$(CONFIG_CRYPTO_SHA2_ARM64_CE) += sha2-ce.o
12 sha2-ce-y := sha2-ce-glue.o sha2-ce-core.o
14 obj-$(CONFIG_CRYPTO_SHA512_ARM64_CE) += sha512-ce.o
15 sha512-ce-y := sha512-ce-glue.o sha512-ce-core.o
17 obj-$(CONFIG_CRYPTO_SHA3_ARM64) += sha3-ce.o
18 sha3-ce-y := sha3-ce-glue.o sha3-ce-core.o
20 obj-$(CONFIG_CRYPTO_SM3_NEON) += sm3-neon.o
[all …]
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 GCM GHASH function (NIST SP800-38D)
16 - ARMv8 Crypto Extensions
26 - NEON (Advanced SIMD) extensions
37 - NEON (Advanced SIMD) extensions
40 tristate "Hash functions: SHA-1 (ARMv8 Crypto Extensions)"
45 SHA-1 secure hash algorithm (FIPS 180)
48 - ARMv8 Crypto Extensions
51 tristate "Hash functions: SHA-224 and SHA-256"
54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
[all …]
H A Dghash-ce-glue.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2014 - 2018 Linaro Ltd. <ard.biesheuvel@linaro.org>
11 #include <crypto/aes.h>
12 #include <crypto/gcm.h>
25 MODULE_DESCRIPTION("GHASH and AES-GCM using ARMv8 Crypto Extensions");
91 gf128mul_lle(&dst, &key->k); in ghash_do_update()
92 } while (--blocks); in ghash_do_update()
108 simd_update(blocks, dg, src, key->h, head); in ghash_do_simd_update()
122 unsigned int partial = ctx->count % GHASH_BLOCK_SIZE; in ghash_update()
124 ctx->count += len; in ghash_update()
[all …]
/openbmc/linux/tools/perf/pmu-events/arch/s390/cf_z16/
H A Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/openbmc/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes-galois.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AMD Cryptographic Coprocessor (CCP) AES GCM crypto API support
17 #include <crypto/aes.h>
19 #include <crypto/gcm.h>
22 #include "ccp-crypto.h"
36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey()
39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey()
42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey()
45 return -EINVAL; in ccp_aes_gcm_setkey()
48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey()
[all …]
/openbmc/linux/arch/s390/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
18 tristate "Hash functions: SHA-384 and SHA-512"
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
29 tristate "Hash functions: SHA-1"
33 SHA-1 secure hash algorithm (FIPS 180)
40 tristate "Hash functions: SHA-224 and SHA-256"
44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
51 tristate "Hash functions: SHA3-224 and SHA3-256"
55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)
62 tristate "Hash functions: SHA3-384 and SHA3-512"
[all …]
/openbmc/linux/Documentation/devicetree/bindings/crypto/
H A Dxlnx,zynqmp-aes.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/xlnx,zynqmp-aes.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Xilinx ZynqMP AES-GCM Hardware Accelerator
10 - Kalyani Akula <kalyani.akula@amd.com>
11 - Michal Simek <michal.simek@amd.com>
14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to
19 const: xlnx,zynqmp-aes
22 - compatible
[all …]
/openbmc/qemu/target/s390x/
H A Dcpu_features_def.h.inc5 * - _FEAT: Feature (enum) name used internally (S390_FEAT_##_FEAT)
6 * - _NAME: Feature name exposed to the user.
7 * - _TYPE: Feature type (S390_FEAT_TYPE_##_TYPE).
8 * - _BIT: Feature bit number within feature type block (unused for MISC).
9 * - _DESC: Feature description, exposed to the user.
18 * your option) any later version. See the COPYING file in the top-level
25 DEF_FEAT(DAT_ENH, "dateh", STFL, 3, "DAT-enhancement facility")
26 DEF_FEAT(IDTE_SEGMENT, "idtes", STFL, 4, "IDTE selective TLB segment-table clearing")
27 DEF_FEAT(IDTE_REGION, "idter", STFL, 5, "IDTE selective TLB region-table clearing")
28 DEF_FEAT(ASN_LX_REUSE, "asnlxr", STFL, 6, "ASN-and-LX reuse facility")
[all …]
/openbmc/linux/drivers/crypto/intel/keembay/
H A DKconfig2 tristate "Support for Intel Keem Bay OCS AES/SM4 HW acceleration"
9 Support for Intel Keem Bay Offload and Crypto Subsystem (OCS) AES and
13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4)
14 and gcm(sm4).
17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)).
20 bool "Support for Intel Keem Bay OCS AES/SM4 ECB HW acceleration"
24 AES/SM4 ECB mode hardware acceleration for use with Crypto API.
26 Provides OCS version of ecb(aes) and ecb(sm4)
28 Intel does not recommend use of ECB mode with AES/SM4.
31 bool "Support for Intel Keem Bay OCS AES/SM4 CTS HW acceleration"
[all …]
H A Dkeembay-ocs-aes-core.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Intel Keem Bay OCS AES Crypto Driver.
5 * Copyright (C) 2018-2020 Intel Corporation
8 #include <crypto/aes.h>
10 #include <crypto/gcm.h>
16 #include <linux/dma-mapping.h>
26 #include "ocs-aes.h"
29 #define DRV_NAME "keembay-ocs-aes"
39 * struct ocs_aes_tctx - OCS AES Transform context
40 * @aes_dev: The OCS AES device.
[all …]
H A Docs-aes.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Intel Keem Bay OCS AES Crypto Driver.
5 * Copyright (C) 2018-2020 Intel Corporation
8 #include <linux/dma-mapping.h>
17 #include <crypto/aes.h>
18 #include <crypto/gcm.h>
20 #include "ocs-aes.h"
131 * 11-bit value, but it is actually 10-bits.
137 * before the tag is written. For 128-bit mode this required delay is 28 OCS
138 * clock cycles. For 256-bit mode it is 36 OCS clock cycles.
[all …]
/openbmc/linux/drivers/crypto/ccree/
H A Dcc_aead.h1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (C) 2012-2019 ARM Limited (or its affiliates). */
15 /* mac_cmp - HW writes 8 B but all bytes hold the same value */
20 /* defines for AES GCM configuration buffer */
28 /* Offsets into AES CCM configuration buffer */
39 ccm_header_size_null = -1,
49 * Used for both: digest HW compare and CCM/GCM MAC value
54 //used in gcm
75 //used in gcm
76 /* buffer for internal gcm configurations */
[all …]
/openbmc/linux/drivers/crypto/nx/
H A Dnx-aes-gcm.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AES GCM routines supporting the Power 7+ Nest Accelerators driver
11 #include <crypto/aes.h>
13 #include <crypto/gcm.h>
28 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; in gcm_aes_nx_set_key()
29 struct nx_csbcpb *csbcpb_aead = nx_ctx->csbcpb_aead; in gcm_aes_nx_set_key()
37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; in gcm_aes_nx_set_key()
42 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; in gcm_aes_nx_set_key()
47 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; in gcm_aes_nx_set_key()
50 return -EINVAL; in gcm_aes_nx_set_key()
[all …]
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
2 obj-$(CONFIG_CRYPTO_DEV_NX_ENCRYPT) += nx-crypto.o
3 nx-crypto-objs := nx.o \
4 nx-aes-cbc.o \
5 nx-aes-ecb.o \
6 nx-aes-gcm.o \
7 nx-aes-ccm.o \
8 nx-aes-ctr.o \
9 nx-aes-xcbc.o \
10 nx-sha256.o \
[all …]
/openbmc/linux/lib/crypto/
H A Daesgcm.c1 // SPDX-License-Identifier: GPL-2.0
3 * Minimal library implementation of GCM
11 #include <crypto/gcm.h>
22 * In AES-GCM, both the GHASH key derivation and the CTR mode in aesgcm_encrypt_block()
24 * timing attacks on the encryption key. The AES library already in aesgcm_encrypt_block()
25 * mitigates this risk to some extent by pulling the entire S-box into in aesgcm_encrypt_block()
35 * aesgcm_expandkey - Expands the AES and GHASH keys for the AES-GCM key
38 * @ctx: The data structure that will hold the AES-GCM key schedule
39 * @key: The AES encryption input key
41 * @authsize: The size in bytes of the GCM authentication tag
[all …]
/openbmc/linux/tools/testing/selftests/net/
H A Dl2tp.sh2 # SPDX-License-Identifier: GPL-2.0
6 # host-1 | router | host-2
29 if [ ${rc} -eq ${expected} ]; then
30 printf "TEST: %-60s [ OK ]\n" "${msg}"
35 printf "TEST: %-60s [FAIL]\n" "${msg}"
62 if [ "$VERBOSE" = "1" -a -n "$out" ]; then
80 [ -z "${addr}" ] && addr="-"
81 [ -z "${addr6}" ] && addr6="-"
85 ip -netns ${ns} link set lo up
86 if [ "${addr}" != "-" ]; then
[all …]
/openbmc/linux/crypto/
H A Dtcrypt.c1 // SPDX-License-Identifier: GPL-2.0-or-later
9 * Copyright (c) 2002 Jean-Francois Dive <jef@linuxbe.org>
12 * Updated RFC4106 AES-GCM testing.
91 while (i-- > 0) in testmgr_alloc_buf()
94 return -ENOMEM; in testmgr_alloc_buf()
109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead()
124 np--; in sg_init_aead()
134 struct crypto_wait *wait = req->base.data; in do_one_aead_op()
185 return -ENOMEM; in test_mb_aead_jiffies()
212 return -ENOMEM; in test_mb_aead_cycles()
[all …]
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
148 cbc(aes).
167 cbc(aes).
170 bool "Disable run-time self tests"
173 Disable run-time self tests that normally take place at
177 bool "Enable extra run-time crypto self tests"
180 Enable extra run-time self tests of registered crypto algorithms,
246 menu "Public-key cryptography"
249 tristate "RSA (Rivest-Shamir-Adleman)"
255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
[all …]
/openbmc/linux/drivers/crypto/xilinx/
H A Dzynqmp-aes-gcm.c1 // SPDX-License-Identifier: GPL-2.0
3 * Xilinx ZynqMP AES Driver.
7 #include <crypto/aes.h>
9 #include <crypto/gcm.h>
12 #include <linux/dma-mapping.h>
14 #include <linux/firmware/xlnx-zynqmp.h>
82 struct device *dev = tfm_ctx->dev; in zynqmp_aes_aead_cipher()
92 if (tfm_ctx->keysrc == ZYNQMP_AES_KUP_KEY) in zynqmp_aes_aead_cipher()
93 dma_size = req->cryptlen + ZYNQMP_AES_KEY_SIZE in zynqmp_aes_aead_cipher()
96 dma_size = req->cryptlen + GCM_AES_IV_SIZE; in zynqmp_aes_aead_cipher()
[all …]
/openbmc/linux/arch/x86/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 - ADX (large integer arithmetic)
17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTR, XTS, GCM (AES-NI)"
25 Block cipher: AES cipher algorithms
26 AEAD cipher: AES with GCM
27 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTR, XTS
29 Architecture: x86 (32-bit and 64-bit) using:
30 - AES-NI (AES new instructions)
40 Length-preserving ciphers: Blowfish with ECB and CBC modes
51 Length-preserving ciphers: Camellia with ECB and CBC modes
[all …]
/openbmc/linux/arch/arm/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 - NEON (Advanced SIMD) extensions
25 GCM GHASH function (NIST SP800-38D)
28 - PMULL (Polynomial Multiply Long) instructions
29 - NEON (Advanced SIMD) extensions
30 - ARMv8 Crypto Extensions
32 Use an implementation of GHASH (used by the GCM AEAD chaining mode)
45 - NEON (Advanced SIMD) extensions
55 - NEON (Advanced SIMD) extensions
78 - NEON (Advanced SIMD) extensions
[all …]
/openbmc/linux/net/xfrm/
H A Dxfrm_algo.c1 // SPDX-License-Identifier: GPL-2.0-or-later
28 .name = "rfc4106(gcm(aes))",
47 .name = "rfc4106(gcm(aes))",
66 .name = "rfc4106(gcm(aes))",
85 .name = "rfc4309(ccm(aes))",
104 .name = "rfc4309(ccm(aes))",
123 .name = "rfc4309(ccm(aes))",
142 .name = "rfc4543(gcm(aes))",
313 .name = "xcbc(aes)",
333 .name = "cmac(aes)",
[all …]

12345