Home
last modified time | relevance | path

Searched full:nist (Results 1 – 25 of 55) sorted by relevance

123

/Linux-v6.1/arch/arm64/crypto/
DKconfig13 GCM GHASH function (NIST SP800-38D)
151 - ECB (Electronic Codebook) mode (NIST SP800-38A)
152 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
153 - CTR (Counter) mode (NIST SP800-38A)
154 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
168 - ECB (Electronic Codebook) mode (NIST SP800-38A)
169 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
170 - CTR (Counter) mode (NIST SP800-38A)
171 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
199 - ECB (Electronic Codebook) mode (NIST SP800-38A)
[all …]
/Linux-v6.1/arch/arm/crypto/
DKconfig23 GCM GHASH function (NIST SP800-38D)
175 - ECB (Electronic Codebook) mode (NIST SP800-38A)
176 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
177 - CTR (Counter) mode (NIST SP800-38A)
178 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
196 - ECB (Electronic Codebook) mode (NIST SP800-38A)
197 - CBC (Cipher Block Chaining) mode (NIST SP800-38A)
198 - CTR (Counter) mode (NIST SP800-38A)
199 - CTS (Cipher Text Stealing) mode (NIST SP800-38A)
200 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/Linux-v6.1/crypto/
Decdh.c143 .cra_name = "ecdh-nist-p192",
144 .cra_driver_name = "ecdh-nist-p192-generic",
168 .cra_name = "ecdh-nist-p256",
169 .cra_driver_name = "ecdh-nist-p256-generic",
193 .cra_name = "ecdh-nist-p384",
194 .cra_driver_name = "ecdh-nist-p384-generic",
207 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
DKconfig654 CBC (Cipher Block Chaining) mode (NIST SP800-38A)
663 CFB (Cipher Feedback) mode (NIST SP800-38A)
672 CTR (Counter) mode (NIST SP800-38A)
679 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST
690 ECB (Electronic Codebook) mode (NIST SP800-38A)
712 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F
737 OFB (Output Feedback) mode (NIST SP800-38A)
773 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
824 authenticated encryption mode (NIST SP800-38C)
835 (GCM Message Authentication Code) (NIST SP800-38D)
[all …]
Decdsa.c125 /* faster alternative for NIST p384, p256 & p192 */ in _ecdsa_verify()
282 .cra_name = "ecdsa-nist-p384",
283 .cra_driver_name = "ecdsa-nist-p384-generic",
304 .cra_name = "ecdsa-nist-p256",
305 .cra_driver_name = "ecdsa-nist-p256-generic",
326 .cra_name = "ecdsa-nist-p192",
327 .cra_driver_name = "ecdsa-nist-p192-generic",
339 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init()
Decc_curve_defs.h5 /* NIST P-192: a = p - 3 */
31 /* NIST P-256: a = p - 3 */
57 /* NIST P-384 */
Dghash-generic.c18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
Dkeywrap.c2 * Key Wrapping: RFC3394 / NIST SP800-38F
318 MODULE_DESCRIPTION("Key Wrapping (RFC3394 / NIST SP800-38F)");
Dansi_cprng.c4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using
34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
Dsha3_generic.c6 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
Dkdf_sp800108.c98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
Dccm.c140 * NIST Special Publication 800-38C in format_input()
154 * RFC 3610 and NIST Special Publication 800-38C in format_adata()
263 /* Note: rfc 3610 and NIST 800-38C require counter of in crypto_ccm_init_crypt()
/Linux-v6.1/Documentation/devicetree/bindings/crypto/
Dintel,keembay-ocs-ecc.yaml16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
/Linux-v6.1/drivers/crypto/keembay/
Dkeembay-ocs-ecc.c514 * The maximum security strength identified by NIST SP800-57pt1r4 for in kmb_ecc_gen_privkey()
841 .cra_name = "ecdh-nist-p256",
842 .cra_driver_name = "ecdh-nist-p256-keembay-ocs",
857 .cra_name = "ecdh-nist-p384",
858 .cra_driver_name = "ecdh-nist-p384-keembay-ocs",
1013 MODULE_ALIAS_CRYPTO("ecdh-nist-p256");
1014 MODULE_ALIAS_CRYPTO("ecdh-nist-p384");
1015 MODULE_ALIAS_CRYPTO("ecdh-nist-p256-keembay-ocs");
1016 MODULE_ALIAS_CRYPTO("ecdh-nist-p384-keembay-ocs");
Docs-aes.c1050 * Note: B0 format is documented in NIST Special Publication 800-38C
1051 * https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf
1122 * Note: adata len encoding is documented in NIST Special Publication 800-38C
1123 * https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf
1333 * Note: rfc 3610 and NIST 800-38C require counter of zero to encrypt in ocs_aes_ccm_op()
/Linux-v6.1/fs/udf/
Dudftime.c33 * For more NIST information (especially dealing with leap seconds), see:
34 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
/Linux-v6.1/drivers/crypto/
Datmel-ecc.c107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret()
290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size()
306 .cra_name = "ecdh-nist-p256",
/Linux-v6.1/arch/s390/crypto/
DKconfig77 GCM GHASH hash function (NIST SP800-38D)
/Linux-v6.1/certs/
DKconfig34 Use an elliptic curve key (NIST P384) for module signing. Consider
/Linux-v6.1/security/integrity/
Ddigsig_asymmetric.c115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
/Linux-v6.1/crypto/asymmetric_keys/
Dx509_cert_parser.c523 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data()
526 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data()
529 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data()
/Linux-v6.1/drivers/crypto/hisilicon/hpre/
Dhpre_crypto.c42 /* due to nist p521 */
2023 .cra_name = "ecdh-nist-p192",
2024 .cra_driver_name = "hpre-ecdh-nist-p192",
2038 .cra_name = "ecdh-nist-p256",
2039 .cra_driver_name = "hpre-ecdh-nist-p256",
2053 .cra_name = "ecdh-nist-p384",
2054 .cra_driver_name = "hpre-ecdh-nist-p384",
/Linux-v6.1/lib/crypto/
Dsha256.c4 * http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf
/Linux-v6.1/include/crypto/
Ddrbg.h2 * DRBG based on NIST SP800-90A
/Linux-v6.1/include/linux/sunrpc/
Dgss_krb5.h190 #define ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */

123