/openbmc/linux/arch/arm64/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (arm64)" 54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 94 SHA-3 secure hash algorithms (FIPS 202) 135 Block ciphers: AES cipher algorithms (FIPS-197) 149 Block ciphers: AES cipher algorithms (FIPS-197) 160 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 177 Length-preserving ciphers: AES cipher algorithms (FIPS-197) [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | SecurityPolicy.v1_0_2.json | 75 "description": "The AEAD algorithms.", 82 …algorithms. The allowable values for this property shall be the AEAD algorithm names found in the… 87 "description": "The asymmetric signature algorithms.", 94 …algorithms. The allowable values for this property shall be the asymmetric key signature algorith… 99 "description": "The hash algorithms.", 106 …algorithms. The allowable values for this property shall be the hash algorithm names found in the… 132 "Algorithms": { object 134 "description": "The SPDM algorithms.", 135 "longDescription": "This property shall contain the SPDM algorithms." 173 "description": "An indication of whether SPDM extended algorithms are allowed.", [all …]
|
/openbmc/linux/drivers/crypto/ |
H A D | Kconfig | 23 operations with supported algorithms. 42 tristate "PadLock driver for SHA1 and SHA256 algorithms" 48 Use VIA PadLock for SHA1/SHA256 algorithms. 111 tristate "PAES cipher algorithms" 119 AES cipher algorithms for use with protected key. 258 you want to use the OMAP modules for any of the crypto algorithms. 273 want to use the OMAP module for MD5/SHA1/SHA2 algorithms. 287 want to use the OMAP module for AES algorithms. 297 want to use the OMAP module for DES and 3DES algorithms. Currently 337 algorithms execution. [all …]
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | open_session.cpp | 32 // Check for valid Authentication Algorithms in openSession() 34 static_cast<cipher::rakp_auth::Algorithms>(request->authAlgo))) in openSession() 41 // Check for valid Integrity Algorithms in openSession() 43 static_cast<cipher::integrity::Algorithms>(request->intAlgo))) in openSession() 53 // matching proposed algorithms. The maximum privilege level the session in openSession() 66 // Check for valid Confidentiality Algorithms in openSession() 68 static_cast<cipher::crypt::Algorithms>(request->confAlgo))) in openSession() 81 static_cast<cipher::rakp_auth::Algorithms>(request->authAlgo), in openSession() 82 static_cast<cipher::integrity::Algorithms>(request->intAlgo), in openSession() 83 static_cast<cipher::crypt::Algorithms>(request->confAlgo)); in openSession()
|
/openbmc/phosphor-net-ipmid/ |
H A D | auth_algo.hpp | 20 * @enum RAKP Authentication Algorithms 30 enum class Algorithms : uint8_t enum 43 * Interface is the base class for the Authentication Algorithms. 52 explicit Interface(integrity::Algorithms intAlgo, in Interface() 53 crypt::Algorithms cryptAlgo) : in Interface() 105 static bool isAlgorithmSupported(Algorithms algo) in isAlgorithmSupported() 107 if (algo == Algorithms::RAKP_HMAC_SHA256) in isAlgorithmSupported() 137 integrity::Algorithms intAlgo; 146 crypt::Algorithms cryptAlgo; 164 explicit AlgoSHA1(integrity::Algorithms intAlgo, in AlgoSHA1() [all …]
|
H A D | integrity_algo.hpp | 16 * @enum Integrity Algorithms 25 enum class Algorithms : uint8_t enum 37 * Interface is the base class for the Integrity Algorithms. 95 static bool isAlgorithmSupported(Algorithms algo) in isAlgorithmSupported() 97 if (algo == Algorithms::HMAC_SHA256_128) in isAlgorithmSupported() 117 * integrity and authentication algorithms are both based on the same 118 * digest method (integrity::Algorithms::HMAC_SHA1_96 uses SHA1 and 119 * rakp_auth::Algorithms::RAKP_HMAC_SHA1 uses SHA1). None of the
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | SecurityPolicy_v1.xml | 124 … Term="OData.Description" String="An indication of whether SPDM extended algorithms are allowed."/> 125 …escription" String="This property shall indicate whether SPDM extended algorithms as defined in DS… 143 …="The SPDM policy settings that are allowed, such as the allowable SPDM versions and algorithms."/> 144 …n the SPDM policy settings that are allowed, such as the allowable SPDM versions and algorithms."/> 147 …e SPDM policy settings that are prohibited, such as the prohibited SPDM versions and algorithms."/> 148 …e SPDM policy settings that are prohibited, such as the prohibited SPDM versions and algorithms."/> 156 <Property Name="Algorithms" Type="SecurityPolicy.v1_0_0.SPDMAlgorithmSet" Nullable="false"> 157 <Annotation Term="OData.Description" String="The SPDM algorithms."/> 158 …Annotation Term="OData.LongDescription" String="This property shall contain the SPDM algorithms."/> 174 <Annotation Term="OData.Description" String="The AEAD algorithms."/> [all …]
|
/openbmc/linux/crypto/ |
H A D | Kconfig | 3 # Generic algorithms support 61 This option provides the API for cryptographic algorithms. 180 Enable extra run-time self tests of registered crypto algorithms, 187 tristate "Null algorithms" 190 These are 'Null' algorithms, used by IPsec, which do nothing. 312 One of the Russian cryptographic standard algorithms (called GOST 313 algorithms). Only signature verification is implemented. 349 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3) 367 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3) 435 Camellia cipher algorithms (ISO/IEC 18033-3) [all …]
|
/openbmc/linux/arch/s390/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (s390)" 11 CRC32c and CRC32 CRC algorithms 22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202) 89 Block cipher: AES cipher algorithms (FIPS 197)
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (powerpc)" 34 Stress test for CRC32c and CRCT10DIF algorithms implemented with 36 Unless you are testing these algorithms, you don't need this. 70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 80 Block ciphers: AES cipher algorithms (FIPS-197) 106 AEAD cipher: AES cipher algorithms (FIPS-197) 123 stream cipher algorithms
|
/openbmc/linux/arch/mips/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (mips)" 10 CRC32c and CRC32 CRC algorithms 49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 70 stream cipher algorithms
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | README.lanplus | 12 and all of the authentication algorithms (except for "none") are HMAC 13 algorithms, whereas the integrity algorithms are not all HMAC. See section 20 users key, Kuid, is used in its place in algorithms where Kg is required, 29 that HMAC integrity algorithms use the session integrity key as the HMAC 32 "all keying material for the RSP integrity and confidentiality algorithms 35 integrity and confidentiality algorithms defined in this specification,
|
/openbmc/linux/arch/sparc/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (sparc64)" 55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 74 Block ciphers: AES cipher algorithms (FIPS-197) 85 Block ciphers: Camellia cipher algorithms
|
/openbmc/linux/arch/arm/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (arm)" 123 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 133 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 143 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 153 Block ciphers: AES cipher algorithms (FIPS-197) 175 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 196 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 214 stream cipher algorithms
|
/openbmc/linux/Documentation/crypto/ |
H A D | api-intro.rst | 23 At the lowest level are algorithms, which register dynamically with the 28 abstraction to the underlying algorithms. However, at the user 35 [algorithm api] (for registering algorithms) 100 Adding New Algorithms 112 Algorithms submitted must also be generally patent-free (e.g. IDEA 117 Also check for any RFCs which may relate to the use of specific algorithms, 119 Cipher Algorithms"). 188 Original developers of the crypto algorithms:
|
/openbmc/linux/arch/x86/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (x86)" 25 Block cipher: AES cipher algorithms 50 Block cipher: Camellia cipher algorithms 199 Length-preserving ciphers: SM4 cipher algorithms 221 Length-preserving ciphers: SM4 cipher algorithms 297 Length-preserving cipher: ARIA cipher algorithms 316 Length-preserving cipher: ARIA cipher algorithms 336 Length-preserving cipher: ARIA cipher algorithms 353 stream cipher algorithms 446 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
/openbmc/linux/net/ipv6/ |
H A D | Kconfig | 57 AH can be used with various authentication algorithms. Besides 59 implementations of the algorithms that RFC 8221 lists as MUST be 60 implemented. If you need any other algorithms, you'll need to enable 62 implementations of any needed algorithms when available. 72 ESP can be used with various encryption and authentication algorithms. 74 implementations of the algorithms that RFC 8221 lists as MUST be 75 implemented. If you need any other algorithms, you'll need to enable 77 implementations of any needed algorithms when available.
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_ssh_security.robot | 20 ${mac_key_regex} ${left_anchor}(MD5|96-bit MAC algorithms)${right_anchor} 31 # debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256, 35 # debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa 47 # Example of weak algorithms to check: 50 # - MAC: MD5 and 96-bit MAC algorithms
|
/openbmc/linux/Documentation/admin-guide/blockdev/ |
H A D | zram.rst | 92 currently selected (shown in square brackets) compression algorithms, 98 #show supported compression algorithms 110 and, if some of the algorithms were built as modules, it's impossible 352 algorithms can compress) this can be accomplished with:: 413 (secondary) compression algorithms. The basic idea is that alternative 421 With CONFIG_ZRAM_MULTI_COMP, zram supports up to 4 compression algorithms: 423 in "3) Select compression algorithm", secondary algorithms are configured 428 #show supported recompression algorithms 433 Alternative compression algorithms are sorted by priority. In the example 436 Alternative compression algorithm's priority is provided during algorithms [all …]
|
/openbmc/linux/Documentation/filesystems/ |
H A D | btrfs.rst | 21 * Checksums on data and metadata (multiple algorithms available) 22 * Compression (multiple algorithms available) 26 * Integrated multiple device support, with several raid algorithms
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/psa-apitest/ |
H A D | 0002-corstone1000-Disable-obsolete-algorithms.patch | 4 Subject: [PATCH] corstone1000: Disable obsolete algorithms 6 curves of size <255 are obsolete algorithms 23 +/* curves of size <255 are obsolete algorithms, should be disabled. */
|
/openbmc/openbmc/meta-security/recipes-security/libmhash/ |
H A D | libmhash_0.9.9.9.bb | 1 SUMMARY = "Library of hashing algorithms." 5 algorithms. These algorithms can be used to compute checksums, \
|
/openbmc/linux/fs/crypto/ |
H A D | Kconfig | 17 # allows the algorithms to be built as modules when all the filesystems are, 20 # Note: this option only pulls in the algorithms that filesystem encryption 26 # algorithms, not any per-architecture optimized implementations. It is
|
/openbmc/linux/drivers/crypto/hisilicon/ |
H A D | Kconfig | 36 It provides AES, SM4, and 3DES algorithms with ECB 37 CBC, and XTS cipher mode, and AEAD algorithms. 76 accelerator, which can accelerate RSA and DH algorithms.
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_cipher.robot | 81 Verify Cipher Suite And Supported Algorithms Via IPMI Raw Command 82 [Documentation] Verify cipher ID and Supported Algorithms for all Available Channels. 132 [Documentation] Get the supported algorithms from data/ipmi_raw_cmd_table.py and 156 …# e.g 01 c0 11 03 44 81 ---> list of algorithms by cipher suite (0x80 in request data 3rd byt… 165 [Documentation] Compare the supported algorithms got from ipmi_raw_cmd_table with 186 # 0x00 for supported algorithms.
|