Searched full:nist (Results 1 – 25 of 63) sorted by relevance
123
/linux-6.14.4/arch/arm64/crypto/ |
D | Kconfig | 13 GCM GHASH function (NIST SP800-38D) 162 - ECB (Electronic Codebook) mode (NIST SP800-38A) 163 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 164 - CTR (Counter) mode (NIST SP800-38A) 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 179 - ECB (Electronic Codebook) mode (NIST SP800-38A) 180 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 181 - CTR (Counter) mode (NIST SP800-38A) 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 210 - ECB (Electronic Codebook) mode (NIST SP800-38A) [all …]
|
/linux-6.14.4/arch/arm/crypto/ |
D | Kconfig | 25 GCM GHASH function (NIST SP800-38D) 176 - ECB (Electronic Codebook) mode (NIST SP800-38A) 177 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 178 - CTR (Counter) mode (NIST SP800-38A) 179 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 204 - ECB (Electronic Codebook) mode (NIST SP800-38A) 205 - CBC (Cipher Block Chaining) mode (NIST SP800-38A) 206 - CTR (Counter) mode (NIST SP800-38A) 207 - CTS (Cipher Text Stealing) mode (NIST SP800-38A) 208 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/linux-6.14.4/crypto/ |
D | ecdsa.c | 54 /* faster alternative for NIST p521, p384, p256 & p192 */ in _ecdsa_verify() 199 .cra_name = "ecdsa-nist-p521", 200 .cra_driver_name = "ecdsa-nist-p521-generic", 222 .cra_name = "ecdsa-nist-p384", 223 .cra_driver_name = "ecdsa-nist-p384-generic", 245 .cra_name = "ecdsa-nist-p256", 246 .cra_driver_name = "ecdsa-nist-p256-generic", 268 .cra_name = "ecdsa-nist-p192", 269 .cra_driver_name = "ecdsa-nist-p192-generic", 281 /* NIST p192 may not be available in FIPS mode */ in ecdsa_init() [all …]
|
D | ecdh.c | 148 .cra_name = "ecdh-nist-p192", 149 .cra_driver_name = "ecdh-nist-p192-generic", 173 .cra_name = "ecdh-nist-p256", 174 .cra_driver_name = "ecdh-nist-p256-generic", 198 .cra_name = "ecdh-nist-p384", 199 .cra_driver_name = "ecdh-nist-p384-generic", 212 /* NIST p192 will fail to register in FIPS mode */ in ecdh_init()
|
D | Kconfig | 643 CBC (Cipher Block Chaining) mode (NIST SP800-38A) 652 CTR (Counter) mode (NIST SP800-38A) 659 CBC-CS3 variant of CTS (Cipher Text Stealing) (NIST 670 ECB (Electronic Codebook) mode (NIST SP800-38A) 731 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 782 authenticated encryption mode (NIST SP800-38C) 793 (GCM Message Authentication Code) (NIST SP800-38D) 883 mode (NIST SP800-38B and IETF RFC4493) 890 GCM GHASH function (NIST SP800-38D) 1190 tristate "NIST SP800-90A DRBG (Deterministic Random Bit Generator)" [all …]
|
D | ecc_curve_defs.h | 5 /* NIST P-192: a = p - 3 */ 32 /* NIST P-256: a = p - 3 */ 59 /* NIST P-384 */ 92 /* NIST P-521 */
|
D | ecdsa-x962.c | 113 * NIST P192/256/384 may prepend a '0' to a coordinate to indicate in ecdsa_x962_max_size() 114 * a positive integer. NIST P521 never needs it. in ecdsa_x962_max_size() 116 if (strcmp(alg->base.cra_name, "ecdsa-nist-p521") != 0) in ecdsa_x962_max_size()
|
D | ghash-generic.c | 18 * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X 34 * (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
|
D | ansi_cprng.c | 4 * Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using 34 * See http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf
|
D | sha3_generic.c | 6 * https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
|
D | kdf_sp800108.c | 98 * http://csrc.nist.gov/groups/STM/cavp/documents/KBKDF800-108/CounterMode.zip
|
/linux-6.14.4/Documentation/devicetree/bindings/riscv/ |
D | extensions.yaml | 359 The standard Zkn NIST algorithm suite extensions as ratified in 365 The standard Zknd for NIST suite: AES decryption instructions as 371 The standard Zkne for NIST suite: AES encryption instructions as 377 The standard Zknh for NIST suite: hash function instructions as 554 The standard Zvkn extension for NIST algorithm suite instructions, as 560 The standard Zvknc extension for NIST algorithm suite with carryless 572 The standard Zvkng extension for NIST algorithm suite with GCM 578 The standard Zvknha extension for NIST suite: vector SHA-2 secure, 584 The standard Zvknhb extension for NIST suite: vector SHA-2 secure,
|
/linux-6.14.4/Documentation/devicetree/bindings/crypto/ |
D | intel,keembay-ocs-ecc.yaml | 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
|
/linux-6.14.4/drivers/crypto/intel/keembay/ |
D | keembay-ocs-ecc.c | 509 * The maximum security strength identified by NIST SP800-57pt1r4 for in kmb_ecc_gen_privkey() 832 .cra_name = "ecdh-nist-p256", 833 .cra_driver_name = "ecdh-nist-p256-keembay-ocs", 849 .cra_name = "ecdh-nist-p384", 850 .cra_driver_name = "ecdh-nist-p384-keembay-ocs", 1004 MODULE_ALIAS_CRYPTO("ecdh-nist-p256"); 1005 MODULE_ALIAS_CRYPTO("ecdh-nist-p384"); 1006 MODULE_ALIAS_CRYPTO("ecdh-nist-p256-keembay-ocs"); 1007 MODULE_ALIAS_CRYPTO("ecdh-nist-p384-keembay-ocs");
|
/linux-6.14.4/fs/udf/ |
D | udftime.c | 19 * For more NIST information (especially dealing with leap seconds), see: 20 * http://www.boulder.nist.gov/timefreq/pubs/bulletin/leapsecond.htm
|
/linux-6.14.4/drivers/crypto/ |
D | atmel-ecc.c | 107 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_set_secret() 290 * The device only supports NIST P256 ECC keys. The public key size will in atmel_ecdh_max_size() 306 .cra_name = "ecdh-nist-p256",
|
/linux-6.14.4/arch/riscv/crypto/ |
D | Kconfig | 37 GCM GHASH function (NIST SP 800-38D)
|
/linux-6.14.4/arch/s390/crypto/ |
D | Kconfig | 65 GCM GHASH hash function (NIST SP800-38D)
|
/linux-6.14.4/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 513 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data() 516 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data() 519 ctx->cert->pub->pkey_algo = "ecdsa-nist-p384"; in x509_extract_key_data() 522 ctx->cert->pub->pkey_algo = "ecdsa-nist-p521"; in x509_extract_key_data()
|
/linux-6.14.4/arch/powerpc/crypto/ |
D | Kconfig | 85 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
|
/linux-6.14.4/net/sunrpc/ |
D | Kconfig | 59 (NIST Special Publication 800-38B). These include
|
/linux-6.14.4/security/integrity/ |
D | digsig_asymmetric.c | 115 /* edcsa-nist-p192 etc. */ in asymmetric_verify()
|
/linux-6.14.4/Documentation/admin-guide/ |
D | module-signing.rst | 31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA 150 (``MODULE_SIG_KEY_TYPE_ECDSA``) to generate either RSA 4k or NIST
|
/linux-6.14.4/include/linux/sunrpc/ |
D | gss_krb5.h | 140 #define ENCTYPE_DES3_CBC_SHA 0x0005 /* DES-3 cbc mode with NIST-SHA */
|
/linux-6.14.4/certs/ |
D | Kconfig | 35 Use an elliptic curve key (NIST P384) for module signing. Use
|
123