Home
last modified time | relevance | path

Searched +full:sha3 +full:- +full:224 (Results 1 – 18 of 18) sorted by relevance

/linux-6.14.4/arch/s390/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
6 tristate "Hash functions: SHA-384 and SHA-512"
10 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
17 tristate "Hash functions: SHA-1"
21 SHA-1 secure hash algorithm (FIPS 180)
28 tristate "Hash functions: SHA-224 and SHA-256"
32 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
39 tristate "Hash functions: SHA3-224 and SHA3-256"
43 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)
50 tristate "Hash functions: SHA3-384 and SHA3-512"
[all …]
Dsha3_256_s390.c1 // SPDX-License-Identifier: GPL-2.0+
15 #include <crypto/sha3.h>
25 memset(sctx->state, 0, sizeof(sctx->state)); in sha3_256_init()
26 sctx->count = 0; in sha3_256_init()
27 sctx->func = CPACF_KIMD_SHA3_256; in sha3_256_init()
28 sctx->first_message_part = 1; in sha3_256_init()
38 octx->rsiz = sctx->count; in sha3_256_export()
39 memcpy(octx->st, sctx->state, sizeof(octx->st)); in sha3_256_export()
40 memcpy(octx->buf, sctx->buf, sizeof(octx->buf)); in sha3_256_export()
41 octx->partial = sctx->first_message_part; in sha3_256_export()
[all …]
/linux-6.14.4/arch/arm64/crypto/
Dsha3-ce-glue.c1 // SPDX-License-Identifier: GPL-2.0
3 * sha3-ce-glue.c - core SHA-3 transform using v8.2 Crypto Extensions
18 #include <crypto/sha3.h>
23 MODULE_DESCRIPTION("SHA3 secure hash using ARMv8 Crypto Extensions");
26 MODULE_ALIAS_CRYPTO("sha3-224");
27 MODULE_ALIAS_CRYPTO("sha3-256");
28 MODULE_ALIAS_CRYPTO("sha3-384");
29 MODULE_ALIAS_CRYPTO("sha3-512");
38 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update()
43 if ((sctx->partial + len) >= sctx->rsiz) { in sha3_update()
[all …]
Dsha3-ce-core.S1 /* SPDX-License-Identifier: GPL-2.0 */
3 * sha3-ce-core.S - core SHA-3 transform using v8.2 Crypto Extensions
46 ld1 { v0.1d- v3.1d}, [x0]
47 ld1 { v4.1d- v7.1d}, [x8], #32
48 ld1 { v8.1d-v11.1d}, [x8], #32
49 ld1 {v12.1d-v15.1d}, [x8], #32
50 ld1 {v16.1d-v19.1d}, [x8], #32
51 ld1 {v20.1d-v23.1d}, [x8], #32
59 ld1 {v25.8b-v28.8b}, [x1], #32
60 ld1 {v29.8b-v31.8b}, [x1], #24
[all …]
/linux-6.14.4/crypto/
Dsha3_generic.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * SHA-3, as specified in
8 * SHA-3 code by Jeff Garzik <[email protected]>
15 #include <crypto/sha3.h>
19 * On some 32-bit architectures (h8300), GCC ends up using
21 * in keccakf(). On the other hand, on 64-bit architectures with plenty
22 * of [64-bit wide] general purpose registers, not inlining it severely
23 * hurts performance. So let's use 64-bitness as a heuristic to decide
164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init()
166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init()
[all …]
Dtcrypt.c1 // SPDX-License-Identifier: GPL-2.0-or-later
9 * Copyright (c) 2002 Jean-Francois Dive <[email protected]>
12 * Updated RFC4106 AES-GCM testing.
91 while (i-- > 0) in testmgr_alloc_buf()
94 return -ENOMEM; in testmgr_alloc_buf()
109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead()
124 np--; in sg_init_aead()
134 struct crypto_wait *wait = req->base.data; in do_one_aead_op()
185 return -ENOMEM; in test_mb_aead_jiffies()
212 return -ENOMEM; in test_mb_aead_cycles()
[all …]
Dtestmgr.c1 // SPDX-License-Identifier: GPL-2.0-or-later
6 * Copyright (c) 2002 Jean-Francois Dive <[email protected]>
11 * Updated RFC4106 AES-GCM testing.
46 MODULE_PARM_DESC(notests, "disable crypto self-tests");
54 MODULE_PARM_DESC(noextratests, "disable expensive crypto self-tests");
98 * behavior when the two IV copies differ is implementation-defined.
185 while (i-- > 0) in __testmgr_alloc_buf()
188 return -ENOMEM; in __testmgr_alloc_buf()
231 /* likewise, but also export and re-import the intermediate state */
243 * Whether the crypto operation will occur in-place, and if so whether the
[all …]
/linux-6.14.4/Documentation/devicetree/bindings/crypto/
Dnvidia,tegra234-se-hash.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-hash.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 The Tegra Security HASH Engine accelerates the following HASH functions -
11 SHA1, SHA224, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
15 - Akhil R <[email protected]>
19 const: nvidia,tegra234-se-hash
30 dma-coherent: true
33 - compatible
[all …]
/linux-6.14.4/drivers/crypto/tegra/
Dtegra-se.h1 /* SPDX-License-Identifier: GPL-2.0-only
2 * SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
17 #include <crypto/sha3.h>
362 SE_ALG_CMAC, /* Cipher-based MAC (CMAC) mode */
368 SE_ALG_SHA1, /* Secure Hash Algorithm-1 (SHA1) mode */
369 SE_ALG_SHA224, /* Secure Hash Algorithm-224 (SHA224) mode */
370 SE_ALG_SHA256, /* Secure Hash Algorithm-256 (SHA256) mode */
371 SE_ALG_SHA384, /* Secure Hash Algorithm-384 (SHA384) mode */
372 SE_ALG_SHA512, /* Secure Hash Algorithm-512 (SHA512) mode */
373 SE_ALG_SHA3_224, /* Secure Hash Algorithm3-224 (SHA3-224) mode */
[all …]
Dtegra-se-hash.c1 // SPDX-License-Identifier: GPL-2.0-only
2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
8 #include <linux/dma-mapping.h>
16 #include <crypto/sha3.h>
22 #include "tegra-se.h"
107 return -EINVAL; in tegra_sha_get_config()
119 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback_tfm); in tegra_sha_fallback_init()
120 rctx->fallback_req.base.flags = req->base.flags & in tegra_sha_fallback_init()
123 return crypto_ahash_init(&rctx->fallback_req); in tegra_sha_fallback_init()
132 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback_tfm); in tegra_sha_fallback_update()
[all …]
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux-6.14.4/tools/testing/selftests/arm64/fp/
Dkernel-test.c1 // SPDX-License-Identifier: GPL-2.0-only
49 "crct10dif-arm64",
50 "sha1-ce",
51 "sha224-arm64",
52 "sha224-arm64-neon",
53 "sha224-ce",
54 "sha256-arm64",
55 "sha256-arm64-neon",
56 "sha256-ce",
57 "sha384-ce",
[all …]
/linux-6.14.4/drivers/crypto/stm32/
Dstm32-hash.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved
15 #include <crypto/sha3.h>
18 #include <linux/dma-mapping.h>
231 return readl_relaxed(hdev->io_base + offset); in stm32_hash_read()
237 writel_relaxed(value, hdev->io_base + offset); in stm32_hash_write()
241 * stm32_hash_wait_busy - wait until hash processor is available. It return an
250 if (!hdev->pdata->has_sr) in stm32_hash_wait_busy()
251 return readl_relaxed_poll_timeout(hdev->io_base + HASH_STR, status, in stm32_hash_wait_busy()
254 return readl_relaxed_poll_timeout(hdev->io_base + HASH_SR, status, in stm32_hash_wait_busy()
[all …]
/linux-6.14.4/drivers/crypto/inside-secure/
Dsafexcel_hash.c1 // SPDX-License-Identifier: GPL-2.0
5 * Antoine Tenart <antoine.tenart@free-electrons.com>
13 #include <crypto/sha3.h>
18 #include <linux/dma-mapping.h>
72 return req->len - req->processed; in safexcel_queued_len()
80 (struct safexcel_token *)cdesc->control_data.token; in safexcel_hash_token()
90 token[1].packet_length = 16 - input_length; in safexcel_hash_token()
112 struct safexcel_crypto_priv *priv = ctx->base.priv; in safexcel_context_control()
115 cdesc->control_data.control0 = ctx->alg; in safexcel_context_control()
116 cdesc->control_data.control1 = 0; in safexcel_context_control()
[all …]
/linux-6.14.4/drivers/crypto/bcm/
Dcipher.c1 // SPDX-License-Identifier: GPL-2.0-only
34 #include <crypto/sha3.h>
81 /* A type 3 BCM header, expected to precede the SPU header for SPU-M.
83 * 0x60 - ring 0
84 * 0x68 - ring 1
85 * 0x70 - ring 2
86 * 0x78 - ring 3
100 * select_channel() - Select a SPU channel to handle a crypto request. Selects
113 * spu_skcipher_rx_sg_create() - Build up the scatterlist of buffers used to
122 * a 4-byte boundary
[all …]
Dspu2.c1 // SPDX-License-Identifier: GPL-2.0-only
51 "SHA512", "SHA512/224", "SHA512/256", "SHA3-224", "SHA3-256",
52 "SHA3-384", "SHA3-512"
55 static char *spu2_hash_mode_names[] = { "CMAC", "CBC-MAC", "XCBC-MAC", "HMAC",
120 return -EINVAL; in spu2_cipher_mode_xlate()
126 * spu2_cipher_xlate() - Convert a cipher {alg/mode/type} triple to a SPU2
156 err = -EINVAL; in spu2_cipher_xlate()
177 err = -EINVAL; in spu2_cipher_xlate()
182 err = -EINVAL; in spu2_cipher_xlate()
216 return -EINVAL; in spu2_hash_mode_xlate()
[all …]
/linux-6.14.4/Documentation/admin-guide/LSM/
Dipe.rst1 .. SPDX-License-Identifier: GPL-2.0
9 attempting to use IPE. If you're looking for more developer-focused
13 --------
17 mechanisms that rely on labels and paths for decision-making, IPE focuses
34 a file's origin, such as dm-verity or fs-verity, which provide a layer of
36 that trust files from a dm-verity protected device. dm-verity ensures the
38 of its contents. Similarly, fs-verity offers filesystem-level integrity
40 fs-verity. These two features cannot be turned off once established, so
50 property. The latter includes checking the roothash of a dm-verity
51 protected device, determining whether dm-verity possesses a valid
[all …]
/linux-6.14.4/include/crypto/
Dhash.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
27 * struct hash_alg_common - define properties of message digest
40 * The hash_alg_common data structure now adds the hash-specific
65 * struct ahash_alg - asynchronous message digest definition
70 * implementation must not use req->result.
80 * req->result.
116 * multiple times later on for multiple re-use. No data processing
117 * happens at this point. Driver must not use req->result.
122 * req->result.
162 * Worst case is hmac(sha3-224-generic). Its context is a nested 'shash_desc'
[all …]