/linux-6.14.4/arch/s390/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 6 tristate "Hash functions: SHA-384 and SHA-512" 10 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 17 tristate "Hash functions: SHA-1" 21 SHA-1 secure hash algorithm (FIPS 180) 28 tristate "Hash functions: SHA-224 and SHA-256" 32 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 39 tristate "Hash functions: SHA3-224 and SHA3-256" 43 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 50 tristate "Hash functions: SHA3-384 and SHA3-512" [all …]
|
D | sha3_256_s390.c | 1 // SPDX-License-Identifier: GPL-2.0+ 15 #include <crypto/sha3.h> 25 memset(sctx->state, 0, sizeof(sctx->state)); in sha3_256_init() 26 sctx->count = 0; in sha3_256_init() 27 sctx->func = CPACF_KIMD_SHA3_256; in sha3_256_init() 28 sctx->first_message_part = 1; in sha3_256_init() 38 octx->rsiz = sctx->count; in sha3_256_export() 39 memcpy(octx->st, sctx->state, sizeof(octx->st)); in sha3_256_export() 40 memcpy(octx->buf, sctx->buf, sizeof(octx->buf)); in sha3_256_export() 41 octx->partial = sctx->first_message_part; in sha3_256_export() [all …]
|
/linux-6.14.4/arch/arm64/crypto/ |
D | sha3-ce-glue.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * sha3-ce-glue.c - core SHA-3 transform using v8.2 Crypto Extensions 18 #include <crypto/sha3.h> 23 MODULE_DESCRIPTION("SHA3 secure hash using ARMv8 Crypto Extensions"); 26 MODULE_ALIAS_CRYPTO("sha3-224"); 27 MODULE_ALIAS_CRYPTO("sha3-256"); 28 MODULE_ALIAS_CRYPTO("sha3-384"); 29 MODULE_ALIAS_CRYPTO("sha3-512"); 38 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update() 43 if ((sctx->partial + len) >= sctx->rsiz) { in sha3_update() [all …]
|
D | sha3-ce-core.S | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * sha3-ce-core.S - core SHA-3 transform using v8.2 Crypto Extensions 46 ld1 { v0.1d- v3.1d}, [x0] 47 ld1 { v4.1d- v7.1d}, [x8], #32 48 ld1 { v8.1d-v11.1d}, [x8], #32 49 ld1 {v12.1d-v15.1d}, [x8], #32 50 ld1 {v16.1d-v19.1d}, [x8], #32 51 ld1 {v20.1d-v23.1d}, [x8], #32 59 ld1 {v25.8b-v28.8b}, [x1], #32 60 ld1 {v29.8b-v31.8b}, [x1], #24 [all …]
|
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 3 "Unit": "PAI-CRYPTO", 10 "Unit": "PAI-CRYPTO", 14 "PublicDescription": "KM-DEA function ending with CC=0" 17 "Unit": "PAI-CRYPTO", 21 "PublicDescription": "KM-TDEA-128 function ending with CC=0" 24 "Unit": "PAI-CRYPTO", 28 "PublicDescription": "KM-TDEA-192 function ending with CC=0" 31 "Unit": "PAI-CRYPTO", 35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0" 38 "Unit": "PAI-CRYPTO", [all …]
|
/linux-6.14.4/crypto/ |
D | sha3_generic.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 5 * SHA-3, as specified in 8 * SHA-3 code by Jeff Garzik <[email protected]> 15 #include <crypto/sha3.h> 19 * On some 32-bit architectures (h8300), GCC ends up using 21 * in keccakf(). On the other hand, on 64-bit architectures with plenty 22 * of [64-bit wide] general purpose registers, not inlining it severely 23 * hurts performance. So let's use 64-bitness as a heuristic to decide 164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() 166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init() [all …]
|
D | hash_info.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 32 [HASH_ALGO_SHA3_256] = "sha3-256", 33 [HASH_ALGO_SHA3_384] = "sha3-384", 34 [HASH_ALGO_SHA3_512] = "sha3-512",
|
D | jitterentropy-kcapi.c | 2 * Non-physical true random number generator based on timing jitter -- 5 * Copyright Stephan Mueller <[email protected]>, 2015 - 2023 24 * the restrictions contained in a BSD-style copyright.) 41 #include <crypto/sha3.h> 51 #define JENT_CONDITIONING_HASH "sha3-256-generic" 78 * Obtain a high-resolution time stamp value. The time stamp is used to measure 83 * implement a high-resolution time stamp, the RNG code's runtime test 109 SHASH_DESC_ON_STACK(desc, hash_state_desc->tfm); in jent_hash_time() 114 desc->tfm = hash_state_desc->tfm; in jent_hash_time() 116 if (sizeof(intermediary) != crypto_shash_digestsize(desc->tfm)) { in jent_hash_time() [all …]
|
D | tcrypt.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 9 * Copyright (c) 2002 Jean-Francois Dive <[email protected]> 12 * Updated RFC4106 AES-GCM testing. 72 static const int block_sizes[] = { 16, 64, 128, 256, 1024, 1420, 4096, 0 }; 73 static const int aead_sizes[] = { 16, 64, 256, 512, 1024, 1420, 4096, 8192, 0 }; 91 while (i-- > 0) in testmgr_alloc_buf() 94 return -ENOMEM; in testmgr_alloc_buf() 109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead() 124 np--; in sg_init_aead() 134 struct crypto_wait *wait = req->base.data; in do_one_aead_op() [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/crypto/ |
D | nvidia,tegra234-se-hash.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-hash.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 The Tegra Security HASH Engine accelerates the following HASH functions - 11 SHA1, SHA224, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512 15 - Akhil R <[email protected]> 19 const: nvidia,tegra234-se-hash 30 dma-coherent: true 33 - compatible [all …]
|
/linux-6.14.4/drivers/crypto/tegra/ |
D | tegra-se.h | 1 /* SPDX-License-Identifier: GPL-2.0-only 2 * SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved. 17 #include <crypto/sha3.h> 362 SE_ALG_CMAC, /* Cipher-based MAC (CMAC) mode */ 368 SE_ALG_SHA1, /* Secure Hash Algorithm-1 (SHA1) mode */ 369 SE_ALG_SHA224, /* Secure Hash Algorithm-224 (SHA224) mode */ 370 SE_ALG_SHA256, /* Secure Hash Algorithm-256 (SHA256) mode */ 371 SE_ALG_SHA384, /* Secure Hash Algorithm-384 (SHA384) mode */ 372 SE_ALG_SHA512, /* Secure Hash Algorithm-512 (SHA512) mode */ 373 SE_ALG_SHA3_224, /* Secure Hash Algorithm3-224 (SHA3-224) mode */ [all …]
|
D | tegra-se-hash.c | 1 // SPDX-License-Identifier: GPL-2.0-only 2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved. 8 #include <linux/dma-mapping.h> 16 #include <crypto/sha3.h> 22 #include "tegra-se.h" 107 return -EINVAL; in tegra_sha_get_config() 119 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback_tfm); in tegra_sha_fallback_init() 120 rctx->fallback_req.base.flags = req->base.flags & in tegra_sha_fallback_init() 123 return crypto_ahash_init(&rctx->fallback_req); in tegra_sha_fallback_init() 132 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback_tfm); in tegra_sha_fallback_update() [all …]
|
/linux-6.14.4/drivers/target/iscsi/ |
D | iscsi_target_auth.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 15 #define MAX_RESPONSE_LENGTH 128 /* sufficient for SHA3 256 */ 21 #define SHA3_256_SIGNATURE_SIZE 32 /* 32 bytes in a SHA3 256 message digest */
|
/linux-6.14.4/kernel/module/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 64 bool "Debug duplicate modules with auto-loading" 66 Module autoloading allows in-kernel code to request modules through 75 requests are non-fatal virtual memory is a limited resource and each 80 module requests to help identify if module auto-loading may be the 93 non-wait request_module() call is synchronous and waits until modprobe 94 completes. Subsequent auto-loading requests for the same module do 102 abuse was due to module auto-loading. These issues are currently only 105 module auto-loading is not the culprit. There may very well still be 106 many duplicate module auto-loading requests which could be optimized [all …]
|
/linux-6.14.4/crypto/asymmetric_keys/ |
D | mscode_parser.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 25 content_data -= asn1hdrlen; in mscode_parse() 48 return -EBADMSG; in mscode_note_content_type() 59 return -EBADMSG; in mscode_note_content_type() 79 ctx->digest_algo = "sha1"; in mscode_note_digest_algo() 82 ctx->digest_algo = "sha256"; in mscode_note_digest_algo() 85 ctx->digest_algo = "sha384"; in mscode_note_digest_algo() 88 ctx->digest_algo = "sha512"; in mscode_note_digest_algo() 91 ctx->digest_algo = "sha3-256"; in mscode_note_digest_algo() 94 ctx->digest_algo = "sha3-384"; in mscode_note_digest_algo() [all …]
|
D | x509_cert_parser.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 47 public_key_free(cert->pub); in x509_free_certificate() 48 public_key_signature_free(cert->sig); in x509_free_certificate() 49 kfree(cert->issuer); in x509_free_certificate() 50 kfree(cert->subject); in x509_free_certificate() 51 kfree(cert->id); in x509_free_certificate() 52 kfree(cert->skid); in x509_free_certificate() 70 return ERR_PTR(-ENOMEM); in x509_cert_parse() 71 cert->pub = kzalloc(sizeof(struct public_key), GFP_KERNEL); in x509_cert_parse() 72 if (!cert->pub) in x509_cert_parse() [all …]
|
D | public_key.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* In-software asymmetric public-key crypto subtype 4 * See Documentation/crypto/asymmetric-keys.rst 14 #include <keys/asymmetric-subtype.h> 23 MODULE_DESCRIPTION("In-software asymmetric public-key subtype"); 33 struct public_key *key = asymmetric_key->payload.data[asym_crypto]; in public_key_describe() 36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe() 45 kfree_sensitive(key->key); in public_key_free() 46 kfree(key->params); in public_key_free() 77 return -EINVAL; in software_key_determine_akcipher() [all …]
|
D | pkcs7_parser.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info() 54 * pkcs7_free_message - Free a PKCS#7 message 63 while (pkcs7->certs) { in pkcs7_free_message() 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 68 while (pkcs7->crl) { in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 73 while (pkcs7->signed_infos) { in pkcs7_free_message() [all …]
|
/linux-6.14.4/tools/testing/selftests/arm64/fp/ |
D | kernel-test.c | 1 // SPDX-License-Identifier: GPL-2.0-only 49 "crct10dif-arm64", 50 "sha1-ce", 51 "sha224-arm64", 52 "sha224-arm64-neon", 53 "sha224-ce", 54 "sha256-arm64", 55 "sha256-arm64-neon", 56 "sha256-ce", 57 "sha384-ce", [all …]
|
/linux-6.14.4/Documentation/admin-guide/ |
D | module-signing.rst | 2 ------------------------------ 6 .. - Overview. 7 .. - Configuring module signing. 8 .. - Generating signing keys. 9 .. - Public keys in the kernel. 10 .. - Manually signing modules. 11 .. - Signed modules and stripping. 12 .. - Loading signed modules. 13 .. - Non-valid signatures and unsigned modules. 14 .. - Administering/protecting the private key. [all …]
|
/linux-6.14.4/drivers/crypto/stm32/ |
D | stm32-hash.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved 15 #include <crypto/sha3.h> 18 #include <linux/dma-mapping.h> 231 return readl_relaxed(hdev->io_base + offset); in stm32_hash_read() 237 writel_relaxed(value, hdev->io_base + offset); in stm32_hash_write() 241 * stm32_hash_wait_busy - wait until hash processor is available. It return an 250 if (!hdev->pdata->has_sr) in stm32_hash_wait_busy() 251 return readl_relaxed_poll_timeout(hdev->io_base + HASH_STR, status, in stm32_hash_wait_busy() 254 return readl_relaxed_poll_timeout(hdev->io_base + HASH_SR, status, in stm32_hash_wait_busy() [all …]
|
/linux-6.14.4/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Antoine Tenart <antoine.tenart@free-electrons.com> 13 #include <crypto/sha3.h> 18 #include <linux/dma-mapping.h> 72 return req->len - req->processed; in safexcel_queued_len() 80 (struct safexcel_token *)cdesc->control_data.token; in safexcel_hash_token() 90 token[1].packet_length = 16 - input_length; in safexcel_hash_token() 112 struct safexcel_crypto_priv *priv = ctx->base.priv; in safexcel_context_control() 115 cdesc->control_data.control0 = ctx->alg; in safexcel_context_control() 116 cdesc->control_data.control1 = 0; in safexcel_context_control() [all …]
|
/linux-6.14.4/drivers/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 39 called padlock-aes. 53 called padlock-sha. 61 Say 'Y' here to use the AMD Geode LX processor on-board AES 65 will be called geode-aes. 87 - A pkey base and API kernel module (pkey.ko) which offers the 89 and the sysfs API and the in-kernel API to the crypto cipher 91 - A pkey pckmo kernel module (pkey-pckmo.ko) which is automatically 94 - A pkey CCA kernel module (pkey-cca.ko) which is automatically 96 - A pkey EP11 kernel module (pkey-ep11.ko) which is automatically [all …]
|
/linux-6.14.4/drivers/crypto/bcm/ |
D | cipher.c | 1 // SPDX-License-Identifier: GPL-2.0-only 34 #include <crypto/sha3.h> 81 /* A type 3 BCM header, expected to precede the SPU header for SPU-M. 83 * 0x60 - ring 0 84 * 0x68 - ring 1 85 * 0x70 - ring 2 86 * 0x78 - ring 3 100 * select_channel() - Select a SPU channel to handle a crypto request. Selects 113 * spu_skcipher_rx_sg_create() - Build up the scatterlist of buffers used to 122 * a 4-byte boundary [all …]
|
D | spu2.c | 1 // SPDX-License-Identifier: GPL-2.0-only 51 "SHA512", "SHA512/224", "SHA512/256", "SHA3-224", "SHA3-256", 52 "SHA3-384", "SHA3-512" 55 static char *spu2_hash_mode_names[] = { "CMAC", "CBC-MAC", "XCBC-MAC", "HMAC", 120 return -EINVAL; in spu2_cipher_mode_xlate() 126 * spu2_cipher_xlate() - Convert a cipher {alg/mode/type} triple to a SPU2 156 err = -EINVAL; in spu2_cipher_xlate() 177 err = -EINVAL; in spu2_cipher_xlate() 182 err = -EINVAL; in spu2_cipher_xlate() 216 return -EINVAL; in spu2_hash_mode_xlate() [all …]
|