Home
last modified time | relevance | path

Searched +full:sha3 +full:- +full:384 (Results 1 – 25 of 26) sorted by relevance

12

/linux-6.14.4/arch/s390/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
6 tristate "Hash functions: SHA-384 and SHA-512"
10 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
17 tristate "Hash functions: SHA-1"
21 SHA-1 secure hash algorithm (FIPS 180)
28 tristate "Hash functions: SHA-224 and SHA-256"
32 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
39 tristate "Hash functions: SHA3-224 and SHA3-256"
43 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)
50 tristate "Hash functions: SHA3-384 and SHA3-512"
[all …]
Dsha3_512_s390.c1 // SPDX-License-Identifier: GPL-2.0+
14 #include <crypto/sha3.h>
24 memset(sctx->state, 0, sizeof(sctx->state)); in sha3_512_init()
25 sctx->count = 0; in sha3_512_init()
26 sctx->func = CPACF_KIMD_SHA3_512; in sha3_512_init()
27 sctx->first_message_part = 1; in sha3_512_init()
37 octx->rsiz = sctx->count; in sha3_512_export()
38 octx->rsizw = sctx->count >> 32; in sha3_512_export()
40 memcpy(octx->st, sctx->state, sizeof(octx->st)); in sha3_512_export()
41 memcpy(octx->buf, sctx->buf, sizeof(octx->buf)); in sha3_512_export()
[all …]
/linux-6.14.4/arch/arm64/crypto/
Dsha3-ce-glue.c1 // SPDX-License-Identifier: GPL-2.0
3 * sha3-ce-glue.c - core SHA-3 transform using v8.2 Crypto Extensions
18 #include <crypto/sha3.h>
23 MODULE_DESCRIPTION("SHA3 secure hash using ARMv8 Crypto Extensions");
26 MODULE_ALIAS_CRYPTO("sha3-224");
27 MODULE_ALIAS_CRYPTO("sha3-256");
28 MODULE_ALIAS_CRYPTO("sha3-384");
29 MODULE_ALIAS_CRYPTO("sha3-512");
38 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update()
43 if ((sctx->partial + len) >= sctx->rsiz) { in sha3_update()
[all …]
Dsha3-ce-core.S1 /* SPDX-License-Identifier: GPL-2.0 */
3 * sha3-ce-core.S - core SHA-3 transform using v8.2 Crypto Extensions
46 ld1 { v0.1d- v3.1d}, [x0]
47 ld1 { v4.1d- v7.1d}, [x8], #32
48 ld1 { v8.1d-v11.1d}, [x8], #32
49 ld1 {v12.1d-v15.1d}, [x8], #32
50 ld1 {v16.1d-v19.1d}, [x8], #32
51 ld1 {v20.1d-v23.1d}, [x8], #32
59 ld1 {v25.8b-v28.8b}, [x1], #32
60 ld1 {v29.8b-v31.8b}, [x1], #24
[all …]
/linux-6.14.4/crypto/
Dsha3_generic.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * SHA-3, as specified in
8 * SHA-3 code by Jeff Garzik <[email protected]>
15 #include <crypto/sha3.h>
19 * On some 32-bit architectures (h8300), GCC ends up using
21 * in keccakf(). On the other hand, on 64-bit architectures with plenty
22 * of [64-bit wide] general purpose registers, not inlining it severely
23 * hurts performance. So let's use 64-bitness as a heuristic to decide
164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init()
166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init()
[all …]
Dhash_info.c1 // SPDX-License-Identifier: GPL-2.0-or-later
32 [HASH_ALGO_SHA3_256] = "sha3-256",
33 [HASH_ALGO_SHA3_384] = "sha3-384",
34 [HASH_ALGO_SHA3_512] = "sha3-512",
Dtcrypt.c1 // SPDX-License-Identifier: GPL-2.0-or-later
9 * Copyright (c) 2002 Jean-Francois Dive <[email protected]>
12 * Updated RFC4106 AES-GCM testing.
91 while (i-- > 0) in testmgr_alloc_buf()
94 return -ENOMEM; in testmgr_alloc_buf()
109 int np = (buflen + PAGE_SIZE - 1)/PAGE_SIZE; in sg_init_aead()
124 np--; in sg_init_aead()
134 struct crypto_wait *wait = req->base.data; in do_one_aead_op()
185 return -ENOMEM; in test_mb_aead_jiffies()
212 return -ENOMEM; in test_mb_aead_cycles()
[all …]
Drsassa-pkcs1.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * RSA Signature Scheme with Appendix - PKCS #1 v1.5 (RFC 8017 sec 8.2)
5 * https://www.rfc-editor.org/rfc/rfc8017#section-8.2
7 * Copyright (c) 2015 - 2024 Intel Corporation
21 * Full Hash Prefix for EMSA-PKCS1-v1_5 encoding method (RFC 9580 table 24)
27 * https://www.rfc-editor.org/rfc/rfc9580#table-24
107 #define _(X) { "sha3-" #X, hash_prefix_sha3_##X, sizeof(hash_prefix_sha3_##X) }
109 _(384),
119 for (p = hash_prefixes; p->name; p++) in rsassa_pkcs1_find_hash_prefix()
120 if (strcmp(name, p->name) == 0) in rsassa_pkcs1_find_hash_prefix()
[all …]
Dtestmgr.c1 // SPDX-License-Identifier: GPL-2.0-or-later
6 * Copyright (c) 2002 Jean-Francois Dive <[email protected]>
11 * Updated RFC4106 AES-GCM testing.
46 MODULE_PARM_DESC(notests, "disable crypto self-tests");
54 MODULE_PARM_DESC(noextratests, "disable expensive crypto self-tests");
98 * behavior when the two IV copies differ is implementation-defined.
185 while (i-- > 0) in __testmgr_alloc_buf()
188 return -ENOMEM; in __testmgr_alloc_buf()
231 /* likewise, but also export and re-import the intermediate state */
243 * Whether the crypto operation will occur in-place, and if so whether the
[all …]
/linux-6.14.4/drivers/crypto/xilinx/
Dzynqmp-sha.c1 // SPDX-License-Identifier: GPL-2.0
9 #include <crypto/sha3.h>
12 #include <linux/dma-mapping.h>
13 #include <linux/firmware/xlnx-zynqmp.h>
55 tfm_ctx->dev = drv_ctx->dev; in zynqmp_sha_init_tfm()
63 tfm_ctx->fbk_tfm = fallback_tfm; in zynqmp_sha_init_tfm()
64 hash->descsize += crypto_shash_descsize(tfm_ctx->fbk_tfm); in zynqmp_sha_init_tfm()
73 if (tfm_ctx->fbk_tfm) { in zynqmp_sha_exit_tfm()
74 crypto_free_shash(tfm_ctx->fbk_tfm); in zynqmp_sha_exit_tfm()
75 tfm_ctx->fbk_tfm = NULL; in zynqmp_sha_exit_tfm()
[all …]
/linux-6.14.4/Documentation/devicetree/bindings/crypto/
Dnvidia,tegra234-se-hash.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-hash.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 The Tegra Security HASH Engine accelerates the following HASH functions -
11 SHA1, SHA224, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
15 - Akhil R <[email protected]>
19 const: nvidia,tegra234-se-hash
30 dma-coherent: true
33 - compatible
[all …]
/linux-6.14.4/drivers/crypto/tegra/
Dtegra-se.h1 /* SPDX-License-Identifier: GPL-2.0-only
2 * SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
17 #include <crypto/sha3.h>
362 SE_ALG_CMAC, /* Cipher-based MAC (CMAC) mode */
368 SE_ALG_SHA1, /* Secure Hash Algorithm-1 (SHA1) mode */
369 SE_ALG_SHA224, /* Secure Hash Algorithm-224 (SHA224) mode */
370 SE_ALG_SHA256, /* Secure Hash Algorithm-256 (SHA256) mode */
371 SE_ALG_SHA384, /* Secure Hash Algorithm-384 (SHA384) mode */
372 SE_ALG_SHA512, /* Secure Hash Algorithm-512 (SHA512) mode */
373 SE_ALG_SHA3_224, /* Secure Hash Algorithm3-224 (SHA3-224) mode */
[all …]
Dtegra-se-hash.c1 // SPDX-License-Identifier: GPL-2.0-only
2 // SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
8 #include <linux/dma-mapping.h>
16 #include <crypto/sha3.h>
22 #include "tegra-se.h"
107 return -EINVAL; in tegra_sha_get_config()
119 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback_tfm); in tegra_sha_fallback_init()
120 rctx->fallback_req.base.flags = req->base.flags & in tegra_sha_fallback_init()
123 return crypto_ahash_init(&rctx->fallback_req); in tegra_sha_fallback_init()
132 ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback_tfm); in tegra_sha_fallback_update()
[all …]
/linux-6.14.4/kernel/module/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
64 bool "Debug duplicate modules with auto-loading"
66 Module autoloading allows in-kernel code to request modules through
75 requests are non-fatal virtual memory is a limited resource and each
80 module requests to help identify if module auto-loading may be the
93 non-wait request_module() call is synchronous and waits until modprobe
94 completes. Subsequent auto-loading requests for the same module do
102 abuse was due to module auto-loading. These issues are currently only
105 module auto-loading is not the culprit. There may very well still be
106 many duplicate module auto-loading requests which could be optimized
[all …]
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/linux-6.14.4/crypto/asymmetric_keys/
Dmscode_parser.c1 // SPDX-License-Identifier: GPL-2.0-or-later
25 content_data -= asn1hdrlen; in mscode_parse()
48 return -EBADMSG; in mscode_note_content_type()
59 return -EBADMSG; in mscode_note_content_type()
79 ctx->digest_algo = "sha1"; in mscode_note_digest_algo()
82 ctx->digest_algo = "sha256"; in mscode_note_digest_algo()
85 ctx->digest_algo = "sha384"; in mscode_note_digest_algo()
88 ctx->digest_algo = "sha512"; in mscode_note_digest_algo()
91 ctx->digest_algo = "sha3-256"; in mscode_note_digest_algo()
94 ctx->digest_algo = "sha3-384"; in mscode_note_digest_algo()
[all …]
Dx509_cert_parser.c1 // SPDX-License-Identifier: GPL-2.0-or-later
47 public_key_free(cert->pub); in x509_free_certificate()
48 public_key_signature_free(cert->sig); in x509_free_certificate()
49 kfree(cert->issuer); in x509_free_certificate()
50 kfree(cert->subject); in x509_free_certificate()
51 kfree(cert->id); in x509_free_certificate()
52 kfree(cert->skid); in x509_free_certificate()
70 return ERR_PTR(-ENOMEM); in x509_cert_parse()
71 cert->pub = kzalloc(sizeof(struct public_key), GFP_KERNEL); in x509_cert_parse()
72 if (!cert->pub) in x509_cert_parse()
[all …]
Dpublic_key.c1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /* In-software asymmetric public-key crypto subtype
4 * See Documentation/crypto/asymmetric-keys.rst
14 #include <keys/asymmetric-subtype.h>
23 MODULE_DESCRIPTION("In-software asymmetric public-key subtype");
33 struct public_key *key = asymmetric_key->payload.data[asym_crypto]; in public_key_describe()
36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe()
45 kfree_sensitive(key->key); in public_key_free()
46 kfree(key->params); in public_key_free()
77 return -EINVAL; in software_key_determine_akcipher()
[all …]
Dpkcs7_parser.c1 // SPDX-License-Identifier: GPL-2.0-or-later
48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info()
54 * pkcs7_free_message - Free a PKCS#7 message
63 while (pkcs7->certs) { in pkcs7_free_message()
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
68 while (pkcs7->crl) { in pkcs7_free_message()
69 cert = pkcs7->crl; in pkcs7_free_message()
70 pkcs7->crl = cert->next; in pkcs7_free_message()
73 while (pkcs7->signed_infos) { in pkcs7_free_message()
[all …]
/linux-6.14.4/Documentation/admin-guide/
Dmodule-signing.rst2 ------------------------------
6 .. - Overview.
7 .. - Configuring module signing.
8 .. - Generating signing keys.
9 .. - Public keys in the kernel.
10 .. - Manually signing modules.
11 .. - Signed modules and stripping.
12 .. - Loading signed modules.
13 .. - Non-valid signatures and unsigned modules.
14 .. - Administering/protecting the private key.
[all …]
/linux-6.14.4/tools/testing/selftests/arm64/fp/
Dkernel-test.c1 // SPDX-License-Identifier: GPL-2.0-only
49 "crct10dif-arm64",
50 "sha1-ce",
51 "sha224-arm64",
52 "sha224-arm64-neon",
53 "sha224-ce",
54 "sha256-arm64",
55 "sha256-arm64-neon",
56 "sha256-ce",
57 "sha384-ce",
[all …]
/linux-6.14.4/drivers/crypto/stm32/
Dstm32-hash.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved
15 #include <crypto/sha3.h>
18 #include <linux/dma-mapping.h>
231 return readl_relaxed(hdev->io_base + offset); in stm32_hash_read()
237 writel_relaxed(value, hdev->io_base + offset); in stm32_hash_write()
241 * stm32_hash_wait_busy - wait until hash processor is available. It return an
250 if (!hdev->pdata->has_sr) in stm32_hash_wait_busy()
251 return readl_relaxed_poll_timeout(hdev->io_base + HASH_STR, status, in stm32_hash_wait_busy()
254 return readl_relaxed_poll_timeout(hdev->io_base + HASH_SR, status, in stm32_hash_wait_busy()
[all …]
/linux-6.14.4/drivers/crypto/inside-secure/
Dsafexcel_hash.c1 // SPDX-License-Identifier: GPL-2.0
5 * Antoine Tenart <antoine.tenart@free-electrons.com>
13 #include <crypto/sha3.h>
18 #include <linux/dma-mapping.h>
72 return req->len - req->processed; in safexcel_queued_len()
80 (struct safexcel_token *)cdesc->control_data.token; in safexcel_hash_token()
90 token[1].packet_length = 16 - input_length; in safexcel_hash_token()
112 struct safexcel_crypto_priv *priv = ctx->base.priv; in safexcel_context_control()
115 cdesc->control_data.control0 = ctx->alg; in safexcel_context_control()
116 cdesc->control_data.control1 = 0; in safexcel_context_control()
[all …]
/linux-6.14.4/drivers/crypto/bcm/
Dcipher.c1 // SPDX-License-Identifier: GPL-2.0-only
34 #include <crypto/sha3.h>
81 /* A type 3 BCM header, expected to precede the SPU header for SPU-M.
83 * 0x60 - ring 0
84 * 0x68 - ring 1
85 * 0x70 - ring 2
86 * 0x78 - ring 3
100 * select_channel() - Select a SPU channel to handle a crypto request. Selects
113 * spu_skcipher_rx_sg_create() - Build up the scatterlist of buffers used to
122 * a 4-byte boundary
[all …]
Dspu2.c1 // SPDX-License-Identifier: GPL-2.0-only
51 "SHA512", "SHA512/224", "SHA512/256", "SHA3-224", "SHA3-256",
52 "SHA3-384", "SHA3-512"
55 static char *spu2_hash_mode_names[] = { "CMAC", "CBC-MAC", "XCBC-MAC", "HMAC",
120 return -EINVAL; in spu2_cipher_mode_xlate()
126 * spu2_cipher_xlate() - Convert a cipher {alg/mode/type} triple to a SPU2
156 err = -EINVAL; in spu2_cipher_xlate()
177 err = -EINVAL; in spu2_cipher_xlate()
182 err = -EINVAL; in spu2_cipher_xlate()
216 return -EINVAL; in spu2_hash_mode_xlate()
[all …]

12