Home
last modified time | relevance | path

Searched +full:sha +full:- +full:256 (Results 1 – 25 of 87) sorted by relevance

1234

/Linux-v6.6/arch/s390/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
18 tristate "Hash functions: SHA-384 and SHA-512"
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
29 tristate "Hash functions: SHA-1"
33 SHA-1 secure hash algorithm (FIPS 180)
40 tristate "Hash functions: SHA-224 and SHA-256"
44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
51 tristate "Hash functions: SHA3-224 and SHA3-256"
55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)
62 tristate "Hash functions: SHA3-384 and SHA3-512"
[all …]
/Linux-v6.6/arch/arm/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 - NEON (Advanced SIMD) extensions
25 GCM GHASH function (NIST SP800-38D)
28 - PMULL (Polynomial Multiply Long) instructions
29 - NEON (Advanced SIMD) extensions
30 - ARMv8 Crypto Extensions
45 - NEON (Advanced SIMD) extensions
55 - NEON (Advanced SIMD) extensions
78 - NEON (Advanced SIMD) extensions
83 much faster than the SHA-2 family and slightly faster than
[all …]
Dsha2-ce-glue.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * sha2-ce-glue.c - SHA-224/SHA-256 using ARMv8 Crypto Extensions
23 MODULE_DESCRIPTION("SHA-224/SHA-256 secure hash using ARMv8 Crypto Extensions");
36 (sctx->count % SHA256_BLOCK_SIZE) + len < SHA256_BLOCK_SIZE) in sha2_ce_update()
77 .cra_driver_name = "sha224-ce",
91 .cra_driver_name = "sha256-ce",
/Linux-v6.6/arch/arm64/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
13 GCM GHASH function (NIST SP800-38D)
16 - ARMv8 Crypto Extensions
26 - NEON (Advanced SIMD) extensions
37 - NEON (Advanced SIMD) extensions
40 tristate "Hash functions: SHA-1 (ARMv8 Crypto Extensions)"
45 SHA-1 secure hash algorithm (FIPS 180)
48 - ARMv8 Crypto Extensions
51 tristate "Hash functions: SHA-224 and SHA-256"
54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
[all …]
Dsha2-ce-glue.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * sha2-ce-glue.c - SHA-224/SHA-256 using ARMv8 Crypto Extensions
5 * Copyright (C) 2014 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org>
19 MODULE_DESCRIPTION("SHA-224/SHA-256 secure hash using ARMv8 Crypto Extensions");
46 src += (blocks - rem) * SHA256_BLOCK_SIZE; in __sha2_ce_transform()
61 sha256_block_data_order(sst->state, src, blocks); in __sha256_block_data_order()
73 sctx->finalize = 0; in sha256_ce_update()
83 bool finalize = !sctx->sst.count && !(len % SHA256_BLOCK_SIZE) && len; in sha256_ce_finup()
97 sctx->finalize = finalize; in sha256_ce_finup()
114 sctx->finalize = 0; in sha256_ce_final()
[all …]
Dsha2-ce-core.S1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * sha2-ce-core.S - core SHA-224/SHA-256 transform using v8 Crypto Extensions
12 .arch armv8-a+crypto
51 * The SHA-256 round constants
81 ld1 { v0.4s- v3.4s}, [x8], #64
82 ld1 { v4.4s- v7.4s}, [x8], #64
83 ld1 { v8.4s-v11.4s}, [x8], #64
84 ld1 {v12.4s-v15.4s}, [x8]
94 0: ld1 {v16.4s-v19.4s}, [x1], #64
/Linux-v6.6/arch/powerpc/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 - AltiVec extensions
26 - AltiVec extensions
48 tristate "Hash functions: SHA-1"
51 SHA-1 secure hash algorithm (FIPS 180)
56 tristate "Hash functions: SHA-1 (SPE)"
59 SHA-1 secure hash algorithm (FIPS 180)
62 - SPE (Signal Processing Engine) extensions
65 tristate "Hash functions: SHA-224 and SHA-256 (SPE)"
70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
[all …]
/Linux-v6.6/arch/mips/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
34 tristate "Hash functions: SHA-1 (OCTEON)"
39 SHA-1 secure hash algorithm (FIPS 180)
44 tristate "Hash functions: SHA-224 and SHA-256 (OCTEON)"
49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
54 tristate "Hash functions: SHA-384 and SHA-512 (OCTEON)"
59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
69 Length-preserving ciphers: ChaCha20, XChaCha20, and XChaCha12
/Linux-v6.6/arch/sparc/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
12 Block cipher: DES (FIPS 46-2) cipher algorithm
13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
14 Length-preserving ciphers: DES with ECB and CBC modes
15 Length-preserving ciphers: Tripe DES EDE with ECB and CBC modes
40 tristate "Hash functions: SHA-1"
45 SHA-1 secure hash algorithm (FIPS 180)
50 tristate "Hash functions: SHA-224 and SHA-256"
55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
60 tristate "Hash functions: SHA-384 and SHA-512"
[all …]
Dsha256_glue.c1 // SPDX-License-Identifier: GPL-2.0-only
6 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
35 sctx->count += len; in __sha256_sparc64_update()
37 done = SHA256_BLOCK_SIZE - partial; in __sha256_sparc64_update()
38 memcpy(sctx->buf + partial, data, done); in __sha256_sparc64_update()
39 sha256_sparc64_transform(sctx->state, sctx->buf, 1); in __sha256_sparc64_update()
41 if (len - done >= SHA256_BLOCK_SIZE) { in __sha256_sparc64_update()
42 const unsigned int rounds = (len - done) / SHA256_BLOCK_SIZE; in __sha256_sparc64_update()
44 sha256_sparc64_transform(sctx->state, data + done, rounds); in __sha256_sparc64_update()
48 memcpy(sctx->buf, data + done, len - done); in __sha256_sparc64_update()
[all …]
/Linux-v6.6/drivers/crypto/aspeed/
DKconfig32 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and so on.
47 Supports AES/DES symmetric-key encryption and decryption
58 Supports 256 bits to 4096 bits RSA encryption/decryption
/Linux-v6.6/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json3 "Unit": "PAI-CRYPTO",
10 "Unit": "PAI-CRYPTO",
14 "PublicDescription": "KM-DEA function ending with CC=0"
17 "Unit": "PAI-CRYPTO",
21 "PublicDescription": "KM-TDEA-128 function ending with CC=0"
24 "Unit": "PAI-CRYPTO",
28 "PublicDescription": "KM-TDEA-192 function ending with CC=0"
31 "Unit": "PAI-CRYPTO",
35 "PublicDescription": "KM-Encrypted-DEA function ending with CC=0"
38 "Unit": "PAI-CRYPTO",
[all …]
/Linux-v6.6/Documentation/devicetree/bindings/crypto/
Dsamsung-slimsss.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Krzysztof Kozlowski <krzk@kernel.org>
14 -- Feeder (FeedCtrl)
15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC
21 - const: samsung,exynos5433-slim-sss
29 clock-names:
[all …]
Dsamsung-sss.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/crypto/samsung-sss.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Krzysztof Kozlowski <krzk@kernel.org>
14 -- Feeder (FeedCtrl)
15 -- Advanced Encryption Standard (AES)
16 -- Data Encryption Standard (DES)/3DES
17 -- Public Key Accelerator (PKA)
18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG
[all …]
/Linux-v6.6/Documentation/ABI/testing/
Ddebugfs-pfo-nx-crypto1 What: /sys/kernel/debug/nx-crypto/*
7 These debugfs interfaces are built by the nx-crypto driver, built in
18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not
19 recorded here (the hcall will retry until -EBUSY goes away).
36 The total number of bytes hashed by the hardware using SHA-256.
39 The total number of SHA-256 operations submitted to the hardware.
42 The total number of bytes hashed by the hardware using SHA-512.
45 The total number of SHA-512 operations submitted to the hardware.
/Linux-v6.6/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
170 bool "Disable run-time self tests"
173 Disable run-time self tests that normally take place at
177 bool "Enable extra run-time crypto self tests"
180 Enable extra run-time self tests of registered crypto algorithms,
246 menu "Public-key cryptography"
249 tristate "RSA (Rivest-Shamir-Adleman)"
255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
258 tristate "DH (Diffie-Hellman)"
262 DH (Diffie-Hellman) key exchange algorithm
[all …]
/Linux-v6.6/arch/x86/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 - ADX (large integer arithmetic)
17 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTR, XTS, GCM (AES-NI)"
27 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTR, XTS
29 Architecture: x86 (32-bit and 64-bit) using:
30 - AES-NI (AES new instructions)
40 Length-preserving ciphers: Blowfish with ECB and CBC modes
51 Length-preserving ciphers: Camellia with ECB and CBC modes
56 tristate "Ciphers: Camellia with modes: ECB, CBC (AES-NI/AVX)"
63 Length-preserving ciphers: Camellia with ECB and CBC modes
[all …]
Dsha256_ni_asm.S2 * Intel SHA Extensions optimized implementation of a SHA-256 update function
80 * Intel SHA Extensions optimized implementation of a SHA-256 update function
90 * The non-indented lines are instructions related to the message schedule.
109 * DCBA, HGFE -> ABEF, CDGH
128 /* Rounds 0-3 */
137 /* Rounds 4-7 */
147 /* Rounds 8-11 */
157 /* Rounds 12-15 */
171 /* Rounds 16-19 */
183 /* Rounds 20-23 */
[all …]
/Linux-v6.6/drivers/crypto/ccp/
Dccp-ops.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2013-2019 Advanced Micro Devices, Inc.
11 #include <linux/dma-mapping.h>
19 #include "ccp-dev.h"
21 /* SHA initial context values */
56 #define CCP_NEW_JOBID(ccp) ((ccp->vdata->version == CCP_VERSION(3, 0)) ? \
61 return atomic_inc_return(&ccp->current_id) & CCP_JOBID_MASK; in ccp_gen_jobid()
66 if (wa->dma_count) in ccp_sg_free()
67 dma_unmap_sg(wa->dma_dev, wa->dma_sg_head, wa->nents, wa->dma_dir); in ccp_sg_free()
69 wa->dma_count = 0; in ccp_sg_free()
[all …]
/Linux-v6.6/fs/crypto/
Dhkdf.c1 // SPDX-License-Identifier: GPL-2.0
3 * Implementation of HKDF ("HMAC-based Extract-and-Expand Key Derivation
19 * SHA-512 because it is well-established, secure, and reasonably efficient.
21 * HKDF-SHA256 was also considered, as its 256-bit security strength would be
22 * sufficient here. A 512-bit security strength is "nice to have", though.
23 * Also, on 64-bit CPUs, SHA-512 is usually just as fast as SHA-256. In the
24 * common case of deriving an AES-256-XTS key (512 bits), that can result in
25 * HKDF-SHA512 being much faster than HKDF-SHA256, as the longer digest size of
26 * SHA-512 causes HKDF-Expand to only need to do one iteration rather than two.
34 * 1. HKDF-Extract: extract a pseudorandom key of length HKDF_HASHLEN bytes from
[all …]
/Linux-v6.6/include/linux/
Dccp.h1 /* SPDX-License-Identifier: GPL-2.0-only */
27 * ccp_present - check if a CCP device is present
29 * Returns zero if a CCP device is present, -ENODEV otherwise.
34 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1))
39 * ccp_version - get the version of the CCP
46 * ccp_enqueue_cmd - queue an operation for processing by the CCP
55 * result in a return code of -EBUSY.
61 * will be -EINPROGRESS. Any other "err" value during callback is
65 * the return code is -EINPROGRESS or
66 * the return code is -EBUSY and CCP_CMD_MAY_BACKLOG flag is set
[all …]
/Linux-v6.6/fs/verity/
Dfsverity_private.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * fs-verity: read-only file-based authenticity protection
11 #define pr_fmt(fmt) "fs-verity: " fmt
17 * it's enough for over U64_MAX bytes of data using SHA-256 and 4K blocks.
21 /* A hash algorithm supported by fs-verity */
25 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */
26 unsigned int block_size; /* block size in bytes, e.g. 64 for SHA-256 */
38 unsigned int digest_size; /* same as hash_alg->digest_size */
52 * to root level ('num_levels - 1')
58 * fsverity_info - cached verity metadata for an inode
[all …]
DKconfig1 # SPDX-License-Identifier: GPL-2.0
4 bool "FS Verity (read-only file-based authenticity protection)"
7 # SHA-256 is implied as it's intended to be the default hash algorithm.
12 # be omitted even if SHA-256 is being used.
15 This option enables fs-verity. fs-verity is the dm-verity
21 against the Merkle tree. The file is also made read-only.
30 fs-verity is especially useful on large files where not all
31 the contents may actually be needed. Also, fs-verity verifies
33 protection against malicious disks vs. an ahead-of-time hash.
42 This option adds support for in-kernel verification of
[all …]
/Linux-v6.6/Documentation/admin-guide/
Dmodule-signing.rst2 ------------------------------
6 .. - Overview.
7 .. - Configuring module signing.
8 .. - Generating signing keys.
9 .. - Public keys in the kernel.
10 .. - Manually signing modules.
11 .. - Signed modules and stripping.
12 .. - Loading signed modules.
13 .. - Non-valid signatures and unsigned modules.
14 .. - Administering/protecting the private key.
[all …]
/Linux-v6.6/arch/mips/cavium-octeon/crypto/
Docteon-sha256.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * SHA-224 and SHA-256 Secure Hash Algorithm.
11 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
27 #include "octeon-crypto.h"
30 * We pass everything as 64-bit. OCTEON can handle misaligned data.
35 u64 *hash = (u64 *)sctx->state; in octeon_sha256_store_hash()
45 u64 *hash = (u64 *)sctx->state; in octeon_sha256_read_hash()
74 partial = sctx->count % SHA256_BLOCK_SIZE; in __octeon_sha256_update()
75 sctx->count += len; in __octeon_sha256_update()
81 done = -partial; in __octeon_sha256_update()
[all …]

1234