Home
last modified time | relevance | path

Searched full:xts (Results 1 – 25 of 109) sorted by relevance

12345

/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpciph_aes_common.txt999 Title = AES XTS test vectors from IEEE Std 1619-2007
1002 Cipher = aes-128-xts
1012 Cipher = aes-128-xts
1022 Cipher = aes-128-xts
1029 Cipher = aes-128-xts
1035 Cipher = aes-128-xts
1041 Cipher = aes-128-xts
1047 Cipher = aes-128-xts
1053 Cipher = aes-128-xts
1059 Cipher = aes-128-xts
[all …]
/freebsd/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_aes_xts.c48 * FIPS 140-2 IG A.9 XTS-AES Key Generation Requirements states
51 * BEFORE using the keys in the XTS-AES algorithm to process
140 if (in->xts.key1 != NULL) { in aes_xts_dupctx()
141 if (in->xts.key1 != &in->ks1) in aes_xts_dupctx()
144 if (in->xts.key2 != NULL) { in aes_xts_dupctx()
145 if (in->xts.key2 != &in->ks2) in aes_xts_dupctx()
163 || ctx->xts.key1 == NULL in aes_xts_cipher()
164 || ctx->xts.key2 == NULL in aes_xts_cipher()
183 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher()
184 else if (CRYPTO_xts128_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, in aes_xts_cipher()
[all …]
H A Dcipher_aes_xts_hw.c26 xctx->xts.block1 = (block128_f)fn_block_enc; \
29 xctx->xts.block1 = (block128_f)fn_block_dec; \
32 xctx->xts.block2 = (block128_f)fn_block_enc; \
33 xctx->xts.key1 = &xctx->ks1; \
34 xctx->xts.key2 = &xctx->ks2; \
96 dctx->xts.key1 = &dctx->ks1.ks; in cipher_hw_aes_xts_copyctx()
97 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_aes_xts_copyctx()
H A Dcipher_aes_xts.h31 XTS128_CONTEXT xts; member
/freebsd/crypto/openssl/doc/man3/
H A DEVP_aes_128_gcm.pod146 AES XTS mode (XTS-AES) is standardized in IEEE Std. 1619-2007 and described in NIST
147 SP 800-38E. The XTS (XEX-based tweaked-codebook mode with ciphertext stealing)
151 XTS-AES provides confidentiality but not authentication of data. It also
153 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to
154 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input
157 The XTS implementation in OpenSSL does not support streaming. That is there must
162 the XTS "tweak" value.
H A DOPENSSL_s390xcap.pod105 # 50 1<<13 KM-XTS-AES-128
106 # 52 1<<11 KM-XTS-AES-256
182 Disables the KM-XTS-AES and the KIMD-SHAKE function codes:
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_aes_128_gcm.3232 \&\s-1AES XTS\s0 mode (XTS-AES) is standardized in \s-1IEEE\s0 Std. 1619\-2007 and described in \s-…
233 SP 800\-38E.\s0 The \s-1XTS\s0 (XEX-based tweaked-codebook mode with ciphertext stealing)
239 In particular, \s-1XTS\-AES\-128\s0 (\fBEVP_aes_128_xts\fR) takes input of a 256\-bit key to
240 achieve \s-1AES\s0 128\-bit security, and \s-1XTS\-AES\-256\s0 (\fBEVP_aes_256_xts\fR) takes input
243 The \s-1XTS\s0 implementation in OpenSSL does not support streaming. That is there must
248 the \s-1XTS\s0 \*(L"tweak\*(R" value.
H A DOPENSSL_s390xcap.3236 \& # 50 1<<13 KM\-XTS\-AES\-128
237 \& # 52 1<<11 KM\-XTS\-AES\-256
316 Disables the KM-XTS-AES and the KIMD-SHAKE function codes:
/freebsd/tests/sys/geom/class/eli/
H A Dconf.sh40 for cipher in aes-xts:128 aes-xts:256 \
64 for cipher in aes-xts:128 aes-xts:256 \
H A Dinit_test.sh309 for spec in aes:0:AES-XTS:128 aes:128:AES-XTS:128 aes:256:AES-XTS:256 \
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/
H A Dlac_session.h258 /**< Cached AES XTS Forward key
259 * For CPM2.0 AES XTS key convertion need to be done in SW.
264 /**< AES XTS Reverse key
265 * For CPM2.0 AES XTS key convertion need to be done in SW.
269 /**< For AES XTS session need to store Key2 value in order to generate
444 /**< Cached AES XTS Forward key
445 * For CPM2.0 AES XTS key convertion need to be done in SW.
450 /**< AES XTS Reverse key
451 * For CPM2.0 AES XTS key convertion need to be done in SW.
455 /**< For AES XTS session need to store Key2 value in order to generate
[all …]
H A Dlac_sym_cipher_defs.h74 /* The max key length for AES XTS 32 is bytes*/
181 /* Macro to check if the Algorithm Mode is XTS */
/freebsd/crypto/openssl/doc/man7/
H A DEVP_CIPHER-AES.pod32 =item "AES-128-XTS" and "AES-256-XTS"
70 The AES-XTS implementations allow streaming to be performed, but each
/freebsd/crypto/openssl/crypto/evp/
H A De_aes.c67 XTS128_CONTEXT xts; member
288 xctx->xts.block1 = (block128_f) aesni_encrypt; in aesni_xts_init_key()
292 xctx->xts.block1 = (block128_f) aesni_decrypt; in aesni_xts_init_key()
297 xctx->xts.block2 = (block128_f) aesni_encrypt; in aesni_xts_init_key()
299 xctx->xts.key1 = &xctx->ks1; in aesni_xts_init_key()
303 xctx->xts.key2 = &xctx->ks2; in aesni_xts_init_key()
625 xctx->xts.block1 = (block128_f) aes_t4_encrypt; in aes_t4_xts_init_key()
638 xctx->xts.block1 = (block128_f) aes_t4_decrypt; in aes_t4_xts_init_key()
652 xctx->xts.block2 = (block128_f) aes_t4_encrypt; in aes_t4_xts_init_key()
654 xctx->xts.key1 = &xctx->ks1; in aes_t4_xts_init_key()
[all …]
H A Devp_err.c193 "xts data unit is too large"},
195 "xts duplicated keys"},
/freebsd/sys/contrib/device-tree/Bindings/crypto/
H A Dsamsung-slimsss.yaml15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
H A Dnvidia,tegra234-se-aes.yaml11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/
H A Dlac_sym_cipher.c72 /* Perform IV check for CTR, CBC, XTS, F8 MODE. */ in LacCipher_PerformIvCheck()
256 "Invalid AES XTS cipher key length"); in LacCipher_SessionSetupDataCheck()
394 * XTS Mode allow for ciphers which are not multiples of in LacCipher_PerformParamCheck()
409 " size for last XTS partial or XTS " in LacCipher_PerformParamCheck()
/freebsd/share/man/man4/
H A Dccr.451 The driver accelerates AES-CBC, AES-CCM, AES-CTR, AES-GCM, AES-XTS,
61 The driver also supports chaining one of AES-CBC, AES-CTR, or AES-XTS with
/freebsd/contrib/llvm-project/llvm/lib/Target/X86/MCTargetDesc/
H A DX86WinCOFFStreamer.cpp62 X86TargetStreamer *XTS = in emitCVFPOData() local
64 XTS->emitFPOData(ProcSym, Loc); in emitCVFPOData()
/freebsd/sys/opencrypto/
H A Dxform_aes_xts.c19 * AES XTS implementation in 2008 by Damien Miller
64 .name = "AES-XTS",
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_CIPHER-AES.7169 .IX Item "AES-128-XTS and AES-256-XTS"
/freebsd/tools/boot/
H A Drootgen.sh294 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p2
328 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p2
363 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3
403 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3
452 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3
497 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3
/freebsd/sys/crypto/aesni/
H A Daesni.c110 "AES-CBC,AES-CCM,AES-GCM,AES-ICM,AES-XTS,SHA1,SHA256"); in aesni_probe()
113 "AES-CBC,AES-CCM,AES-GCM,AES-ICM,AES-XTS"); in aesni_probe()
203 CRYPTDEB("invalid XTS key length"); in aesni_cipher_supported()
590 /* CBC & XTS can only handle full blocks for now */ in aesni_cipher_process()
/freebsd/lib/geom/eli/
H A Dgeli.8170 .Nm AES-XTS ,
297 .Nm AES-XTS ,
303 .Nm AES-XTS .
346 .It Nm AES-XTS
1204 .Nm XTS ,

12345