Home
last modified time | relevance | path

Searched full:xts (Results 1 – 25 of 91) sorted by relevance

1234

/Linux-v6.1/drivers/crypto/ccp/
Dccp-crypto-aes-xts.c3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support
16 #include <crypto/xts.h>
29 .name = "xts(aes)",
30 .drv_name = "xts-aes-ccp",
170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt()
171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt()
173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt()
174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt()
175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt()
176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt()
[all …]
Dccp-ops.c1092 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local
1102 switch (xts->unit_size) { in ccp_run_xts_aes_cmd()
1123 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd()
1125 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd()
1130 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd()
1133 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd()
1136 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd()
1149 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd()
1150 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd()
1151 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd()
[all …]
DMakefile19 ccp-crypto-aes-xts.o \
/Linux-v6.1/arch/arm64/crypto/
DKconfig121 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS"
126 XCTR, and XTS modes
144 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
154 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
161 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)"
171 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
191 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)"
203 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
Daes-neonbs-glue.c15 #include <crypto/xts.h>
24 MODULE_ALIAS_CRYPTO("xts(aes)");
427 .base.cra_name = "xts(aes)",
428 .base.cra_driver_name = "xts-aes-neonbs",
/Linux-v6.1/arch/arm/crypto/
DKconfig165 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)"
178 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
182 and for XTS mode encryption, CBC and XTS mode decryption speedup is
188 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)"
200 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/Linux-v6.1/drivers/crypto/vmx/
Daes_xts.c3 * AES XTS routines supporting VMX In-core instructions on Power 8
15 #include <crypto/xts.h>
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init()
147 .base.cra_name = "xts(aes)",
/Linux-v6.1/arch/powerpc/crypto/
Daes-spe-regs.h14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */
15 #define rKT r9 /* pointer to tweak key (XTS mode) */
34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
Daes-spe-glue.c21 #include <crypto/xts.h>
30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per
474 .base.cra_name = "xts(aes)",
475 .base.cra_driver_name = "xts-ppc-spe",
515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized");
521 MODULE_ALIAS_CRYPTO("xts(aes)");
DKconfig76 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (SPE)"
81 Length-preserving ciphers: AES with ECB, CBC, CTR, and XTS modes
/Linux-v6.1/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json97 "BriefDescription": "KM XTS AES 128",
98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0"
104 "BriefDescription": "KM XTS AES 256",
105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0"
111 "BriefDescription": "KM XTS ENCRYPTED AES 128",
112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0"
118 "BriefDescription": "KM XTS ENCRYPTED AES 256",
119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0"
811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128",
812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0"
[all …]
/Linux-v6.1/Documentation/crypto/
Dapi-samples.rst7 This code encrypts some data with AES-256-XTS. For sake of example,
21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */
22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */
33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0);
35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
/Linux-v6.1/arch/s390/crypto/
DKconfig84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM"
91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes
102 key sizes and XTS mode is hardware accelerated for 256 and
Daes_s390.c34 #include <crypto/xts.h>
414 /* Split the XTS key into the two subkeys */ in xts_aes_set_key()
434 u8 xts[16]; in xts_aes_crypt() member
460 memset(pcc_param.xts, 0, sizeof(pcc_param.xts)); in xts_aes_crypt()
466 memcpy(xts_param.init, pcc_param.xts, 16); in xts_aes_crypt()
499 pr_err("Allocating XTS fallback algorithm %s failed\n", in xts_fallback_init()
516 .base.cra_name = "xts(aes)",
517 .base.cra_driver_name = "xts-aes-s390",
Dpaes_s390.c27 #include <crypto/xts.h>
500 u8 xts[16]; in xts_paes_crypt() member
521 memcpy(xts_param.init, pcc_param.xts, 16); in xts_paes_crypt()
554 .base.cra_name = "xts(paes)",
555 .base.cra_driver_name = "xts-paes-s390",
/Linux-v6.1/crypto/
Dtcrypt.c1516 ret += tcrypt_test("xts(twofish)"); in do_test()
1524 ret += tcrypt_test("xts(serpent)"); in do_test()
1531 ret += tcrypt_test("xts(aes)"); in do_test()
1562 ret += tcrypt_test("xts(cast6)"); in do_test()
1619 ret += tcrypt_test("xts(camellia)"); in do_test()
1869 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1871 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test()
1925 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test()
1927 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test()
1974 test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0, in do_test()
[all …]
Dxts.c2 /* XTS: as defined in IEEE1619/D16
20 #include <crypto/xts.h>
387 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create()
411 "xts(%s)", ctx->name) >= CRYPTO_MAX_ALG_NAME) { in xts_create()
447 .name = "xts",
466 MODULE_DESCRIPTION("XTS block cipher mode");
467 MODULE_ALIAS_CRYPTO("xts");
DKconfig604 AES-XTS.
608 bound. Unlike XTS, Adiantum is a true wide-block encryption
610 security than XTS, subject to the security bound.
768 tristate "XTS (XOR Encrypt XOR with ciphertext stealing)"
773 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
776 Use with aes-xts-plain, key size 256, 384 or 512 bits. This
892 the SoC in question has accelerated CBC but not XTS, making CBC
/Linux-v6.1/include/linux/
Dccp.h193 /***** XTS-AES engine *****/
195 * ccp_xts_aes_unit_size - XTS unit size
213 * struct ccp_xts_aes_engine - CCP XTS AES operation
215 * @unit_size: unit size of the XTS operation
216 * @key: key to be used for this XTS AES operation
218 * @iv: IV to be used for this XTS AES operation
223 * @final: indicates final XTS operation
595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation
653 struct ccp_xts_aes_engine xts; member
/Linux-v6.1/Documentation/admin-guide/device-mapper/
Ddm-crypt.rst26 aes-xts-plain64
27 serpent-xts-plain64
41 capi:xts(aes)-plain64
46 capi:authenc(hmac(sha256),xts(aes))-random
/Linux-v6.1/Documentation/devicetree/bindings/crypto/
Dsamsung-slimsss.yaml15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
/Linux-v6.1/drivers/crypto/qce/
Dskcipher.c183 * AES XTS key1 = key2 not supported by crypto engine. in qce_skcipher_setkey()
285 * AES-XTS request with len <= 512 byte (not recommended to use CE) in qce_skcipher_crypt()
286 * AES-XTS request with len > QCE_SECTOR_SIZE and in qce_skcipher_crypt()
391 .name = "xts(aes)",
392 .drv_name = "xts-aes-qce",
/Linux-v6.1/fs/crypto/
Dhkdf.c24 * common case of deriving an AES-256-XTS key (512 bits), that can result in
40 * length HKDF_HASHLEN bytes. However, cipher modes other than AES-256-XTS take
/Linux-v6.1/drivers/crypto/cavium/cpt/
Dcptvf_algs.c11 #include <crypto/xts.h>
350 .base.cra_name = "xts(aes)",
351 .base.cra_driver_name = "cavium-xts-aes",
/Linux-v6.1/drivers/crypto/cavium/nitrox/
Dnitrox_skcipher.c12 #include <crypto/xts.h>
34 { "xts(aes)", CIPHER_AES_XTS },
445 .cra_name = "xts(aes)",

1234