Home
last modified time | relevance | path

Searched +full:sha +full:- +full:1 (Results 1 – 25 of 201) sorted by relevance

123456789

/Linux-v5.10/drivers/crypto/mediatek/
Dmtk-sha.c1 // SPDX-License-Identifier: GPL-2.0-only
9 * Some ideas are from atmel-sha.c and omap-sham.c drivers.
13 #include <crypto/sha.h>
14 #include "mtk-platform.h"
16 #define SHA_ALIGN_MSK (sizeof(u32) - 1)
20 #define SHA_OP_UPDATE 1
26 /* SHA command token */
33 /* SHA transform information */
46 /* SHA flags */
48 #define SHA_FLAGS_FINAL BIT(1)
[all …]
Dmtk-platform.h1 /* SPDX-License-Identifier: GPL-2.0-only */
17 #include <linux/dma-mapping.h>
20 #include "mtk-regs.h"
25 #define MTK_IRQ_RDR0 BIT(1)
33 * Ring 0/1 are used by AES encrypt and decrypt.
34 * Ring 2/3 are used by SHA.
48 * struct mtk_desc - DMA descriptor
53 * @tag: the user-defined field
72 #define MTK_DESC_SZ (MTK_DESC_OFF - 2)
81 * struct mtk_ring - Descriptor ring
[all …]
/Linux-v5.10/drivers/scsi/mvsas/
Dmv_init.c1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright 2009-2011 Marvell. <yuxiangl@marvell.com>
17 [chip_6320] = { 1, 2, 0x400, 17, 16, 6, 9, &mvs_64xx_dispatch, },
18 [chip_6440] = { 1, 4, 0x400, 17, 16, 6, 9, &mvs_64xx_dispatch, },
19 [chip_6485] = { 1, 8, 0x800, 33, 32, 6, 10, &mvs_64xx_dispatch, },
22 [chip_9445] = { 1, 4, 0x800, 17, 64, 8, 11, &mvs_94xx_dispatch, },
24 [chip_1300] = { 1, 4, 0x400, 17, 16, 6, 9, &mvs_64xx_dispatch, },
43 .can_queue = 1,
44 .this_id = -1,
55 .track_queue_depth = 1,
[all …]
Dmv_sas.c1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright 2009-2011 Marvell. <yuxiangl@marvell.com>
14 if (task->lldd_task) { in mvs_find_tag()
16 slot = task->lldd_task; in mvs_find_tag()
17 *tag = slot->slot_tag; in mvs_find_tag()
18 return 1; in mvs_find_tag()
25 void *bitmap = mvi->tags; in mvs_tag_clear()
36 void *bitmap = mvi->tags; in mvs_tag_set()
43 void *bitmap = mvi->tags; in mvs_tag_alloc()
45 index = find_first_zero_bit(bitmap, mvi->tags_num); in mvs_tag_alloc()
[all …]
/Linux-v5.10/drivers/crypto/ccp/
Dccp-crypto-sha.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * AMD Cryptographic Coprocessor (CCP) SHA crypto API support
20 #include <crypto/sha.h>
24 #include "ccp-crypto.h"
36 if (rctx->hash_rem) { in ccp_sha_complete()
38 unsigned int offset = rctx->nbytes - rctx->hash_rem; in ccp_sha_complete()
40 scatterwalk_map_and_copy(rctx->buf, rctx->src, in ccp_sha_complete()
41 offset, rctx->hash_rem, 0); in ccp_sha_complete()
42 rctx->buf_count = rctx->hash_rem; in ccp_sha_complete()
44 rctx->buf_count = 0; in ccp_sha_complete()
[all …]
Dccp-ops.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2013-2019 Advanced Micro Devices, Inc.
11 #include <linux/dma-mapping.h>
19 #include "ccp-dev.h"
21 /* SHA initial context values */
56 #define CCP_NEW_JOBID(ccp) ((ccp->vdata->version == CCP_VERSION(3, 0)) ? \
61 return atomic_inc_return(&ccp->current_id) & CCP_JOBID_MASK; in ccp_gen_jobid()
66 if (wa->dma_count) in ccp_sg_free()
67 dma_unmap_sg(wa->dma_dev, wa->dma_sg_head, wa->nents, wa->dma_dir); in ccp_sg_free()
69 wa->dma_count = 0; in ccp_sg_free()
[all …]
/Linux-v5.10/arch/arm/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 tristate "SHA1 digest algorithm (ARM-asm)"
17 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
27 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
37 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)"
46 SHA-256 secure hash standard (DFIPS 180-2) implemented
50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)"
54 SHA-256 secure hash standard (DFIPS 180-2) implemented
58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
[all …]
/Linux-v5.10/drivers/scsi/pm8001/
Dpm8001_ctl.c2 * PMC-Sierra 8001/8081/8088/8089 SAS/SATA based host adapters driver
4 * Copyright (c) 2008-2009 USI Co., Ltd.
10 * 1. Redistributions of source code must retain the above copyright
18 * 3. Neither the names of the above-listed copyright holders nor the names
48 * pm8001_ctl_mpi_interface_rev_show - MPI interface revision number
53 * A sysfs 'read-only' shost attribute.
59 struct sas_ha_struct *sha = SHOST_TO_SAS_HA(shost); in pm8001_ctl_mpi_interface_rev_show() local
60 struct pm8001_hba_info *pm8001_ha = sha->lldd_ha; in pm8001_ctl_mpi_interface_rev_show()
62 if (pm8001_ha->chip_id == chip_8001) { in pm8001_ctl_mpi_interface_rev_show()
64 pm8001_ha->main_cfg_tbl.pm8001_tbl.interface_rev); in pm8001_ctl_mpi_interface_rev_show()
[all …]
Dpm8001_init.c2 * PMC-Sierra PM8001/8081/8088/8089 SAS/SATA based host adapters driver
4 * Copyright (c) 2008-2009 USI Co., Ltd.
10 * 1. Redistributions of source code must retain the above copyright
18 * 3. Neither the names of the above-listed copyright holders nor the names
53 " 1: Link rate 1.5G\n"
68 [chip_8009] = {1, 8, &pm8001_80xx_dispatch,},
70 [chip_8019] = {1, 16, &pm8001_80xx_dispatch,},
98 .can_queue = 1,
99 .this_id = -1,
110 .track_queue_depth = 1,
[all …]
/Linux-v5.10/arch/arm64/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
57 tristate "GHASH/AES-GCM using ARMv8 Crypto Extensions"
121 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/Linux-v5.10/net/netfilter/
Dnf_conntrack_proto_sctp.c1 // SPDX-License-Identifier: GPL-2.0-only
6 * Copyright (c) 2004-2012 Patrick McHardy <kaber@trash.net>
31 closely. They're more complex. --RR
33 And so for me for SCTP :D -Kiran */
65 #define SCTP_FLAG_HEARTBEAT_VTAG_FAILED 1
76 #define sHA SCTP_CONNTRACK_HEARTBEAT_ACKED macro
85 point. Please note the subtleties. -Kiran
87 NONE - Nothing so far.
88 COOKIE WAIT - We have seen an INIT chunk in the original direction, or also
90 COOKIE ECHOED - We have seen a COOKIE_ECHO chunk in the original direction.
[all …]
/Linux-v5.10/Documentation/devicetree/bindings/crypto/
Dsamsung-slimsss.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Krzysztof Kozlowski <krzk@kernel.org>
11 - Kamil Konieczny <k.konieczny@partner.samsung.com>
15 -- Feeder (FeedCtrl)
16 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
17 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC
22 - const: samsung,exynos5433-slim-sss
[all …]
Dsamsung-sss.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Krzysztof Kozlowski <krzk@kernel.org>
11 - Kamil Konieczny <k.konieczny@partner.samsung.com>
15 -- Feeder (FeedCtrl)
16 -- Advanced Encryption Standard (AES)
17 -- Data Encryption Standard (DES)/3DES
18 -- Public Key Accelerator (PKA)
[all …]
/Linux-v5.10/include/linux/
Dccp.h1 /* SPDX-License-Identifier: GPL-2.0-only */
18 #include <crypto/sha.h>
26 * ccp_present - check if a CCP device is present
28 * Returns zero if a CCP device is present, -ENODEV otherwise.
33 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1))
38 * ccp_version - get the version of the CCP
45 * ccp_enqueue_cmd - queue an operation for processing by the CCP
54 * result in a return code of -EBUSY.
60 * will be -EINPROGRESS. Any other "err" value during callback is
64 * the return code is -EINPROGRESS or
[all …]
/Linux-v5.10/Documentation/admin-guide/
Dmodule-signing.rst2 ------------------------------
6 .. - Overview.
7 .. - Configuring module signing.
8 .. - Generating signing keys.
9 .. - Public keys in the kernel.
10 .. - Manually signing modules.
11 .. - Signed modules and stripping.
12 .. - Loading signed modules.
13 .. - Non-valid signatures and unsigned modules.
14 .. - Administering/protecting the private key.
[all …]
/Linux-v5.10/include/crypto/
Dsha.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * Common values for SHA algorithms
117 * An implementation of SHA-1's compression function. Don't use in new code!
118 * You shouldn't be using SHA-1, and even if you *have* to use SHA-1, this isn't
119 * the correct way to hash something with SHA-1 (use crypto_shash instead).
127 * Stand-alone implementation of the SHA256 algorithm. It is designed to
131 * amounts of data as those APIs may be hw-accelerated.
138 sctx->state[0] = SHA256_H0; in sha256_init()
139 sctx->state[1] = SHA256_H1; in sha256_init()
140 sctx->state[2] = SHA256_H2; in sha256_init()
[all …]
/Linux-v5.10/arch/s390/purgatory/
Dhead.S1 /* SPDX-License-Identifier: GPL-2.0 */
11 #include <asm/asm-offsets.h>
24 * sha digest. So if the crash kernel got corrupted the old kernel can try
25 * to trigger a stand-alone dumper. And once to actually load the crash kernel.
34 #define bufsz purgatory_end-stack
66 lg %r4,kernel_entry-\base(%r13)
67 lg %r5,load_psw_mask-\base(%r13)
81 lhi %r1,1
92 larl %r15,purgatory_end-STACK_FRAME_OVERHEAD
96 * checksum verification only (%r2 = 0 -> verification only).
[all …]
/Linux-v5.10/arch/sparc/crypto/
Dsha512_glue.c1 // SPDX-License-Identifier: GPL-2.0-only
6 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
18 #include <crypto/sha.h>
31 sctx->state[0] = SHA512_H0; in sha512_sparc64_init()
32 sctx->state[1] = SHA512_H1; in sha512_sparc64_init()
33 sctx->state[2] = SHA512_H2; in sha512_sparc64_init()
34 sctx->state[3] = SHA512_H3; in sha512_sparc64_init()
35 sctx->state[4] = SHA512_H4; in sha512_sparc64_init()
36 sctx->state[5] = SHA512_H5; in sha512_sparc64_init()
37 sctx->state[6] = SHA512_H6; in sha512_sparc64_init()
[all …]
Dsha256_glue.c1 // SPDX-License-Identifier: GPL-2.0-only
6 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
19 #include <crypto/sha.h>
32 sctx->state[0] = SHA224_H0; in sha224_sparc64_init()
33 sctx->state[1] = SHA224_H1; in sha224_sparc64_init()
34 sctx->state[2] = SHA224_H2; in sha224_sparc64_init()
35 sctx->state[3] = SHA224_H3; in sha224_sparc64_init()
36 sctx->state[4] = SHA224_H4; in sha224_sparc64_init()
37 sctx->state[5] = SHA224_H5; in sha224_sparc64_init()
38 sctx->state[6] = SHA224_H6; in sha224_sparc64_init()
[all …]
/Linux-v5.10/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
140 bool "Disable run-time self tests"
143 Disable run-time self tests that normally take place at
147 bool "Enable extra run-time crypto self tests"
150 Enable extra run-time self tests of registered crypto algorithms,
221 comment "Public-key cryptography"
233 tristate "Diffie-Hellman algorithm"
237 Generic implementation of the Diffie-Hellman algorithm.
251 tristate "EC-RDSA (GOST 34.10) algorithm"
258 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
[all …]
/Linux-v5.10/arch/mips/cavium-octeon/crypto/
Docteon-sha256.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * SHA-224 and SHA-256 Secure Hash Algorithm.
11 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
18 #include <crypto/sha.h>
26 #include "octeon-crypto.h"
29 * We pass everything as 64-bit. OCTEON can handle misaligned data.
34 u64 *hash = (u64 *)sctx->state; in octeon_sha256_store_hash()
37 write_octeon_64bit_hash_dword(hash[1], 1); in octeon_sha256_store_hash()
44 u64 *hash = (u64 *)sctx->state; in octeon_sha256_read_hash()
47 hash[1] = read_octeon_64bit_hash_dword(1); in octeon_sha256_read_hash()
[all …]
Docteon-sha512.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * SHA-512 and SHA-384 Secure Hash Algorithm.
11 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
17 #include <crypto/sha.h>
25 #include "octeon-crypto.h"
28 * We pass everything as 64-bit. OCTEON can handle misaligned data.
33 write_octeon_64bit_hash_sha512(sctx->state[0], 0); in octeon_sha512_store_hash()
34 write_octeon_64bit_hash_sha512(sctx->state[1], 1); in octeon_sha512_store_hash()
35 write_octeon_64bit_hash_sha512(sctx->state[2], 2); in octeon_sha512_store_hash()
36 write_octeon_64bit_hash_sha512(sctx->state[3], 3); in octeon_sha512_store_hash()
[all …]
/Linux-v5.10/net/bridge/
Dbr_arp_nd_proxy.c1 // SPDX-License-Identifier: GPL-2.0-or-later
32 list_for_each_entry(p, &br->port_list, list) { in br_recalculate_neigh_suppress_enabled()
33 if (p->flags & BR_NEIGH_SUPPRESS) { in br_recalculate_neigh_suppress_enabled()
55 dev->name, &dest_ip, dest_hw, &src_ip, src_hw); in br_arp_send()
84 skb->ip_summed = CHECKSUM_UNNECESSARY; in br_arp_send()
85 skb->pkt_type = PACKET_HOST; in br_arp_send()
94 __be32 ip = *(__be32 *)priv->data; in br_chk_addr_ip()
104 return 1; in br_chk_addr_ip()
128 struct net_device *dev = br->dev; in br_do_proxy_suppress_arp()
132 u8 *arpptr, *sha; in br_do_proxy_suppress_arp() local
[all …]
/Linux-v5.10/drivers/scsi/hisi_sas/
Dhisi_sas_v3_hw.c1 // SPDX-License-Identifier: GPL-2.0-or-later
125 #define SAS_ECC_INTR_DQE_ECC_MB_OFF 1
228 #define RX_BCAST_CHG_OFF 1
238 #define CT3_OFF 1
253 #define CHL_INT0_SL_RX_BCST_ACK_OFF 1
383 #define CMD_HDR_ADDR_MODE_SEL_MSK (1 << CMD_HDR_ADDR_MODE_SEL_OFF)
466 #define RX_DATA_LEN_UNDERFLOW_MSK (1 << RX_DATA_LEN_UNDERFLOW_OFF)
472 #define DIR_TO_INI 1
483 #define T10_INSRT_EN_MSK (1 << T10_INSRT_EN_OFF)
484 #define T10_RMV_EN_OFF 1
[all …]
/Linux-v5.10/fs/verity/
Dfsverity_private.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * fs-verity: read-only file-based authenticity protection
15 #define pr_fmt(fmt) "fs-verity: " fmt
17 #include <crypto/sha.h>
25 * it's enough for over U64_MAX bytes of data using SHA-256 and 4K blocks.
30 * Largest digest size among all hash algorithms supported by fs-verity.
35 /* A hash algorithm supported by fs-verity */
39 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */
40 unsigned int block_size; /* block size in bytes, e.g. 64 for SHA-256 */
48 unsigned int digest_size; /* same as hash_alg->digest_size */
[all …]

123456789