/Linux-v6.6/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
D | ccp-ops.c | 1092 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1102 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1123 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1125 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1130 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1133 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1136 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1149 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1150 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1151 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
/Linux-v6.6/arch/arm64/crypto/ |
D | Kconfig | 132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS" 137 XCTR, and XTS modes 155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)" 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)" 214 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 234 tristate "Ciphers: SM4, modes: ECB/CBC/CFB/CTR/XTS (ARMv8 Crypto Extensions)" 245 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
D | aes-neonbs-glue.c | 15 #include <crypto/xts.h> 24 MODULE_ALIAS_CRYPTO("xts(aes)"); 427 .base.cra_name = "xts(aes)", 428 .base.cra_driver_name = "xts-aes-neonbs",
|
/Linux-v6.6/arch/arm/crypto/ |
D | Kconfig | 167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)" 180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 184 and for XTS mode encryption, CBC and XTS mode decryption speedup is 190 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)" 202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/Linux-v6.6/drivers/crypto/vmx/ |
D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
/Linux-v6.6/tools/testing/selftests/ptp/ |
D | testptp.c | 164 struct ptp_sys_offset_precise *xts; in main() local 585 xts = calloc(1, sizeof(*xts)); in main() 586 if (!xts) { in main() 591 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main() 597 xts->device.sec, xts->device.nsec); in main() 599 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main() 601 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main() 604 free(xts); in main()
|
/Linux-v6.6/arch/powerpc/crypto/ |
D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
D | aes-spe-glue.c | 21 #include <crypto/xts.h> 30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per 474 .base.cra_name = "xts(aes)", 475 .base.cra_driver_name = "xts-ppc-spe", 515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized"); 521 MODULE_ALIAS_CRYPTO("xts(aes)");
|
D | Kconfig | 76 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (SPE)" 81 Length-preserving ciphers: AES with ECB, CBC, CTR, and XTS modes
|
/Linux-v6.6/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 97 "BriefDescription": "KM XTS AES 128", 98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0" 104 "BriefDescription": "KM XTS AES 256", 105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0" 111 "BriefDescription": "KM XTS ENCRYPTED AES 128", 112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0" 118 "BriefDescription": "KM XTS ENCRYPTED AES 256", 119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0" 811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128", 812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0" [all …]
|
/Linux-v6.6/Documentation/crypto/ |
D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
/Linux-v6.6/crypto/ |
D | tcrypt.c | 1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test() 1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test() 1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test() 1555 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test() 1612 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test() 1850 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test() 1871 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1873 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1927 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 1929 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() [all …]
|
D | xts.c | 2 /* XTS: as defined in IEEE1619/D16 20 #include <crypto/xts.h> 387 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create() 411 "xts(%s)", ctx->name) >= CRYPTO_MAX_ALG_NAME) { in xts_create() 447 .name = "xts", 466 MODULE_DESCRIPTION("XTS block cipher mode"); 467 MODULE_ALIAS_CRYPTO("xts");
|
D | Kconfig | 609 AES-XTS. 613 bound. Unlike XTS, Adiantum is a true wide-block encryption 615 security than XTS, subject to the security bound. 773 tristate "XTS (XOR Encrypt XOR with ciphertext stealing)" 778 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 781 Use with aes-xts-plain, key size 256, 384 or 512 bits. This 897 the SoC in question has accelerated CBC but not XTS, making CBC
|
/Linux-v6.6/arch/s390/crypto/ |
D | Kconfig | 84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM" 91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes 102 key sizes and XTS mode is hardware accelerated for 256 and
|
D | aes_s390.c | 34 #include <crypto/xts.h> 410 /* Split the XTS key into the two subkeys */ in xts_aes_set_key() 430 u8 xts[16]; in xts_aes_crypt() member 456 memset(pcc_param.xts, 0, sizeof(pcc_param.xts)); in xts_aes_crypt() 462 memcpy(xts_param.init, pcc_param.xts, 16); in xts_aes_crypt() 495 pr_err("Allocating XTS fallback algorithm %s failed\n", in xts_fallback_init() 512 .base.cra_name = "xts(aes)", 513 .base.cra_driver_name = "xts-aes-s390",
|
D | paes_s390.c | 27 #include <crypto/xts.h> 505 u8 xts[16]; in xts_paes_crypt() member 526 memcpy(xts_param.init, pcc_param.xts, 16); in xts_paes_crypt() 559 .base.cra_name = "xts(paes)", 560 .base.cra_driver_name = "xts-paes-s390",
|
/Linux-v6.6/include/linux/ |
D | ccp.h | 193 /***** XTS-AES engine *****/ 195 * ccp_xts_aes_unit_size - XTS unit size 213 * struct ccp_xts_aes_engine - CCP XTS AES operation 215 * @unit_size: unit size of the XTS operation 216 * @key: key to be used for this XTS AES operation 218 * @iv: IV to be used for this XTS AES operation 223 * @final: indicates final XTS operation 595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 653 struct ccp_xts_aes_engine xts; member
|
/Linux-v6.6/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 26 aes-xts-plain64 27 serpent-xts-plain64 41 capi:xts(aes)-plain64 46 capi:authenc(hmac(sha256),xts(aes))-random
|
/Linux-v6.6/Documentation/devicetree/bindings/crypto/ |
D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
/Linux-v6.6/drivers/crypto/qce/ |
D | skcipher.c | 183 * AES XTS key1 = key2 not supported by crypto engine. in qce_skcipher_setkey() 285 * AES-XTS request with len <= 512 byte (not recommended to use CE) in qce_skcipher_crypt() 286 * AES-XTS request with len > QCE_SECTOR_SIZE and in qce_skcipher_crypt() 391 .name = "xts(aes)", 392 .drv_name = "xts-aes-qce",
|
/Linux-v6.6/block/ |
D | blk-crypto.c | 23 .name = "AES-256-XTS", 24 .cipher_str = "xts(aes)", 41 .name = "SM4-XTS", 42 .cipher_str = "xts(sm4)",
|
/Linux-v6.6/Documentation/filesystems/ |
D | fscrypt.rst | 183 policy and AES-256-XTS is used; such keys must be 64 bytes. 266 is greater than that of an AES-256-XTS key. 341 - AES-256-XTS for contents and AES-256-CTS-CBC for filenames 342 - AES-256-XTS for contents and AES-256-HCTR2 for filenames 345 - SM4-XTS for contents and SM4-CTS-CBC for filenames 349 contents encryption uses a block cipher in `XTS mode 350 <https://en.wikipedia.org/wiki/Disk_encryption_theory#XTS>`_ or 358 The (AES-256-XTS, AES-256-CTS-CBC) pair is the recommended default. 362 The (AES-256-XTS, AES-256-HCTR2) pair is also a good choice that 380 accelerator such as CAAM or CESA that does not support XTS. [all …]
|
/Linux-v6.6/fs/crypto/ |
D | hkdf.c | 24 * common case of deriving an AES-256-XTS key (512 bits), that can result in 40 * length HKDF_HASHLEN bytes. However, cipher modes other than AES-256-XTS take
|