| /Linux-v5.15/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
| D | ccp-ops.c | 1092 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1102 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1123 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1125 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1130 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1133 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1136 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1149 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1150 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1151 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
| D | Makefile | 19 ccp-crypto-aes-xts.o \
|
| D | ccp-debugfs.c | 137 oboff += OSCNPRINTF(" XTS AES: %ld\n", in ccp5_debugfs_stats_read() 211 oboff += OSCNPRINTF(" XTS AES: %ld\n", in ccp5_debugfs_queue_read()
|
| /Linux-v5.15/drivers/crypto/vmx/ |
| D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
| /Linux-v5.15/arch/powerpc/crypto/ |
| D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
| D | aes-spe-glue.c | 21 #include <crypto/xts.h> 30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per 474 .base.cra_name = "xts(aes)", 475 .base.cra_driver_name = "xts-ppc-spe", 515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized"); 521 MODULE_ALIAS_CRYPTO("xts(aes)");
|
| /Linux-v5.15/Documentation/crypto/ |
| D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
| /Linux-v5.15/arch/arm/crypto/ |
| D | Kconfig | 108 CTR and XTS modes 111 and for XTS mode encryption, CBC and XTS mode decryption speedup is 123 Use an implementation of AES in CBC, CTR and XTS modes that uses
|
| /Linux-v5.15/arch/arm64/crypto/ |
| D | Kconfig | 87 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions" 95 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions" 121 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
| /Linux-v5.15/crypto/ |
| D | xts.c | 2 /* XTS: as defined in IEEE1619/D16 20 #include <crypto/xts.h> 387 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create() 411 "xts(%s)", ctx->name) >= CRYPTO_MAX_ALG_NAME) { in xts_create() 447 .name = "xts", 466 MODULE_DESCRIPTION("XTS block cipher mode"); 467 MODULE_ALIAS_CRYPTO("xts");
|
| D | tcrypt.c | 1734 ret += tcrypt_test("xts(twofish)"); in do_test() 1742 ret += tcrypt_test("xts(serpent)"); in do_test() 1749 ret += tcrypt_test("xts(aes)"); in do_test() 1779 ret += tcrypt_test("xts(cast6)"); in do_test() 1836 ret += tcrypt_test("xts(camellia)"); in do_test() 2076 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2078 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 2132 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 2134 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() 2181 test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0, in do_test() [all …]
|
| D | Kconfig | 456 tristate "XTS support" 461 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 508 AES-XTS. 512 bound. Unlike XTS, Adiantum is a true wide-block encryption 514 security than XTS, subject to the security bound. 542 the SoC in question has accelerated CBC but not XTS, making CBC 1113 ECB, CBC, LRW, XTS. The 64 bit version has additional 1149 for popular block cipher modes ECB, CBC, CTR and XTS is supported.
|
| /Linux-v5.15/include/linux/ |
| D | ccp.h | 193 /***** XTS-AES engine *****/ 195 * ccp_xts_aes_unit_size - XTS unit size 213 * struct ccp_xts_aes_engine - CCP XTS AES operation 215 * @unit_size: unit size of the XTS operation 216 * @key: key to be used for this XTS AES operation 218 * @iv: IV to be used for this XTS AES operation 223 * @final: indicates final XTS operation 595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 653 struct ccp_xts_aes_engine xts; member
|
| /Linux-v5.15/Documentation/admin-guide/device-mapper/ |
| D | dm-crypt.rst | 26 aes-xts-plain64 27 serpent-xts-plain64 41 capi:xts(aes)-plain64 46 capi:authenc(hmac(sha256),xts(aes))-random
|
| /Linux-v5.15/Documentation/devicetree/bindings/crypto/ |
| D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
| /Linux-v5.15/arch/s390/crypto/ |
| D | aes_s390.c | 34 #include <crypto/xts.h> 414 /* Split the XTS key into the two subkeys */ in xts_aes_set_key() 434 u8 xts[16]; in xts_aes_crypt() member 460 memset(pcc_param.xts, 0, sizeof(pcc_param.xts)); in xts_aes_crypt() 466 memcpy(xts_param.init, pcc_param.xts, 16); in xts_aes_crypt() 499 pr_err("Allocating XTS fallback algorithm %s failed\n", in xts_fallback_init() 516 .base.cra_name = "xts(aes)", 517 .base.cra_driver_name = "xts-aes-s390",
|
| D | paes_s390.c | 27 #include <crypto/xts.h> 500 u8 xts[16]; in xts_paes_crypt() member 521 memcpy(xts_param.init, pcc_param.xts, 16); in xts_paes_crypt() 554 .base.cra_name = "xts(paes)", 555 .base.cra_driver_name = "xts-paes-s390",
|
| /Linux-v5.15/drivers/crypto/qce/ |
| D | skcipher.c | 183 * AES XTS key1 = key2 not supported by crypto engine. in qce_skcipher_setkey() 285 * AES-XTS request with len <= 512 byte (not recommended to use CE) in qce_skcipher_crypt() 286 * AES-XTS request with len > QCE_SECTOR_SIZE and in qce_skcipher_crypt() 391 .name = "xts(aes)", 392 .drv_name = "xts-aes-qce",
|
| /Linux-v5.15/fs/crypto/ |
| D | hkdf.c | 20 * a 64-byte digest, deriving an AES-256-XTS key preserves all 64 bytes of 35 * length HKDF_HASHLEN bytes. However, cipher modes other than AES-256-XTS take
|
| /Linux-v5.15/drivers/crypto/hisilicon/ |
| D | Kconfig | 36 CBC, and XTS cipher mode, and AEAD algorithms.
|
| /Linux-v5.15/drivers/crypto/cavium/cpt/ |
| D | cptvf_algs.c | 11 #include <crypto/xts.h> 350 .base.cra_name = "xts(aes)", 351 .base.cra_driver_name = "cavium-xts-aes",
|
| /Linux-v5.15/drivers/crypto/cavium/nitrox/ |
| D | nitrox_skcipher.c | 12 #include <crypto/xts.h> 34 { "xts(aes)", CIPHER_AES_XTS }, 445 .cra_name = "xts(aes)",
|
| D | nitrox_req.h | 126 * @key: Encryption key or KEY1 for AES-XTS 127 * @iv: Encryption IV or Tweak for AES-XTS 139 * @ipad: IPAD or KEY2 for AES-XTS
|
| /Linux-v5.15/drivers/crypto/bcm/ |
| D | spu.c | 248 /* XTS has two keys */ in spum_dump_msg_hdr() 337 /* In XTS on SPU-M, we'll need to insert tweak before input data */ in spum_ns2_ctx_max_payload() 366 /* In XTS on SPU-M, we'll need to insert tweak before input data */ in spum_nsp_ctx_max_payload() 942 * In XTS mode, API puts "i" parameter (block tweak) in IV. For in spum_cipher_req_finish() 981 /* XTS mode, data_size needs to include tweak parameter */ in spum_cipher_req_finish() 998 /* XTS mode, data_size needs to include tweak parameter */ in spum_cipher_req_finish() 1075 * spum_xts_tweak_in_payload() - Indicate that SPUM DOES place the XTS tweak
|