| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_sm4_xts.c | 11 /* Dispatch functions for SM4 XTS mode */ 106 if (in->xts.key1 != NULL) { in sm4_xts_dupctx() 107 if (in->xts.key1 != &in->ks1) in sm4_xts_dupctx() 110 if (in->xts.key2 != NULL) { in sm4_xts_dupctx() 111 if (in->xts.key2 != &in->ks2) in sm4_xts_dupctx() 127 || ctx->xts.key1 == NULL in sm4_xts_cipher() 128 || ctx->xts.key2 == NULL in sm4_xts_cipher() 147 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher() 149 else if (CRYPTO_xts128_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, in sm4_xts_cipher() 154 (*ctx->stream_gb)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher() [all …]
|
| H A D | cipher_aes_xts.c | 48 * FIPS 140-2 IG A.9 XTS-AES Key Generation Requirements states 51 * BEFORE using the keys in the XTS-AES algorithm to process 161 if (in->xts.key1 != NULL) { in aes_xts_dupctx() 162 if (in->xts.key1 != &in->ks1) in aes_xts_dupctx() 165 if (in->xts.key2 != NULL) { in aes_xts_dupctx() 166 if (in->xts.key2 != &in->ks2) in aes_xts_dupctx() 187 || ctx->xts.key1 == NULL in aes_xts_cipher() 188 || ctx->xts.key2 == NULL in aes_xts_cipher() 207 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher() 208 else if (CRYPTO_xts128_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, in aes_xts_cipher() [all …]
|
| H A D | cipher_sm4_xts.h | 30 * XTS standard to use with SM4-XTS algorithm 33 * 0 for XTS mode specified by GB/T 17964-2021 34 * 1 for XTS mode specified by IEEE Std 1619-2007 38 XTS128_CONTEXT xts; member 40 /* Stream function for XTS mode specified by GB/T 17964-2021 */ 42 /* Stream function for XTS mode specified by IEEE Std 1619-2007 */
|
| H A D | cipher_sm4_xts_hw.c | 19 xctx->xts.block1 = (block128_f)fn_block_enc; \ 22 xctx->xts.block1 = (block128_f)fn_block_dec; \ 25 xctx->xts.block2 = (block128_f)fn_block_enc; \ 26 xctx->xts.key1 = &xctx->ks1; \ 27 xctx->xts.key2 = &xctx->ks2; \ 81 dctx->xts.key1 = &dctx->ks1.ks; in cipher_hw_sm4_xts_copyctx() 82 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_sm4_xts_copyctx()
|
| H A D | cipher_aes_xts_hw.c | 26 xctx->xts.block1 = (block128_f)fn_block_enc; \ 29 xctx->xts.block1 = (block128_f)fn_block_dec; \ 32 xctx->xts.block2 = (block128_f)fn_block_enc; \ 33 xctx->xts.key1 = &xctx->ks1; \ 34 xctx->xts.key2 = &xctx->ks2; \ 96 dctx->xts.key1 = &dctx->ks1.ks; in cipher_hw_aes_xts_copyctx() 97 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_aes_xts_copyctx()
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpciph_aes_common.txt | 1051 Title = AES XTS test vectors from IEEE Std 1619-2007 1054 Cipher = aes-128-xts 1064 Cipher = aes-128-xts 1074 Cipher = aes-128-xts 1081 Cipher = aes-128-xts 1087 Cipher = aes-128-xts 1093 Cipher = aes-128-xts 1099 Cipher = aes-128-xts 1105 Cipher = aes-128-xts 1111 Cipher = aes-128-xts [all …]
|
| H A D | evpciph_sm4.txt | 72 Title = SM4 XTS test vectors from GB/T 17964-2021 74 Cipher = SM4-XTS 80 Cipher = SM4-XTS 87 Title = SM4 XTS test vectors, while the XTS mode is standardized in IEEE Std 1619-2007 89 Cipher = SM4-XTS 96 Cipher = SM4-XTS
|
| H A D | evpkdf_krb5.txt | 133 #Erroneous key size for the cipher as XTS has double key size 135 Ctrl.cipher = cipher:AES-256-XTS
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_aes_128_gcm.pod | 146 AES XTS mode (XTS-AES) is standardized in IEEE Std. 1619-2007 and described in NIST 147 SP 800-38E. The XTS (XEX-based tweaked-codebook mode with ciphertext stealing) 151 XTS-AES provides confidentiality but not authentication of data. It also 153 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to 154 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input 157 The XTS implementation in OpenSSL does not support streaming. That is there must 162 the XTS "tweak" value.
|
| H A D | OPENSSL_s390xcap.pod | 111 # 50 1<<13 KM-XTS-AES-128 112 # 52 1<<11 KM-XTS-AES-256 114 # 82 1<<45 KM-XTS-AES-128-MSA10 115 # 84 1<<43 KM-XTS-AES-256-MSA10 194 Disables the KM-XTS-AES and the KIMD-SHAKE function codes:
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_aes_128_gcm.3 | 156 AES XTS mode (XTS-AES) is standardized in IEEE Std. 1619\-2007 and described in NIST 157 SP 800\-38E. The XTS (XEX-based tweaked-codebook mode with ciphertext stealing) 163 In particular, XTS\-AES\-128 (\fBEVP_aes_128_xts\fR) takes input of a 256\-bit key to 164 achieve AES 128\-bit security, and XTS\-AES\-256 (\fBEVP_aes_256_xts\fR) takes input 167 The XTS implementation in OpenSSL does not support streaming. That is there must 172 the XTS "tweak" value.
|
| H A D | OPENSSL_s390xcap.3 | 165 \& # 50 1<<13 KM\-XTS\-AES\-128 166 \& # 52 1<<11 KM\-XTS\-AES\-256 168 \& # 82 1<<45 KM\-XTS\-AES\-128\-MSA10 169 \& # 84 1<<43 KM\-XTS\-AES\-256\-MSA10 251 Disables the KM-XTS-AES and the KIMD-SHAKE function codes:
|
| /freebsd/tests/sys/geom/class/eli/ |
| H A D | conf.sh | 40 for cipher in aes-xts:128 aes-xts:256 \ 64 for cipher in aes-xts:128 aes-xts:256 \
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_CIPHER-AES.7 | 85 .IP """AES\-128\-XTS"" and ""AES\-256\-XTS""" 4 86 .IX Item """AES-128-XTS"" and ""AES-256-XTS""" 117 The AES-XTS implementations allow streaming to be performed, but each
|
| H A D | EVP_CIPHER-SM4.7 | 86 .IP """SM4\-XTS""" 4 87 .IX Item """SM4-XTS""" 95 The SM4\-XTS implementation allows streaming to be performed, but each
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_session.h | 258 /**< Cached AES XTS Forward key 259 * For CPM2.0 AES XTS key conversions need to be done in SW. 264 /**< AES XTS Reverse key 265 * For CPM2.0 AES XTS key conversions need to be done in SW. 269 /**< For AES XTS session need to store Key2 value in order to generate 444 /**< Cached AES XTS Forward key 445 * For CPM2.0 AES XTS key conversions need to be done in SW. 450 /**< AES XTS Reverse key 451 * For CPM2.0 AES XTS key conversions need to be done in SW. 455 /**< For AES XTS session need to store Key2 value in order to generate [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_CIPHER-AES.pod | 32 =item "AES-128-XTS" and "AES-256-XTS" 72 The AES-XTS implementations allow streaming to be performed, but each
|
| H A D | EVP_CIPHER-SM4.pod | 31 =item "SM4-XTS" 42 The SM4-XTS implementation allows streaming to be performed, but each
|
| /freebsd/sys/contrib/device-tree/Bindings/crypto/ |
| H A D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_aes.c | 67 XTS128_CONTEXT xts; member 301 xctx->xts.block1 = (block128_f) aesni_encrypt; in aesni_xts_init_key() 305 xctx->xts.block1 = (block128_f) aesni_decrypt; in aesni_xts_init_key() 310 xctx->xts.block2 = (block128_f) aesni_encrypt; in aesni_xts_init_key() 312 xctx->xts.key1 = &xctx->ks1; in aesni_xts_init_key() 316 xctx->xts.key2 = &xctx->ks2; in aesni_xts_init_key() 666 xctx->xts.block1 = (block128_f) aes_t4_encrypt; in aes_t4_xts_init_key() 679 xctx->xts.block1 = (block128_f) aes_t4_decrypt; in aes_t4_xts_init_key() 693 xctx->xts.block2 = (block128_f) aes_t4_encrypt; in aes_t4_xts_init_key() 695 xctx->xts.key1 = &xctx->ks1; in aes_t4_xts_init_key() [all …]
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
| H A D | lac_sym_cipher.c | 72 /* Perform IV check for CTR, CBC, XTS, F8 MODE. */ in LacCipher_PerformIvCheck() 255 "Invalid AES XTS cipher key length"); in LacCipher_SessionSetupDataCheck() 393 * XTS Mode allow for ciphers which are not multiples of in LacCipher_PerformParamCheck() 408 " size for last XTS partial or XTS " in LacCipher_PerformParamCheck()
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | aes-riscv64-zvbb-zvkg-zvkned.pl | 152 # Prepare the x^n multiplier in v20. The `n` is the aes-xts block number 180 # prepare xts enc last block's input(v24) and iv(v28) 224 # prepare xts dec second to last block's input(v24) and iv(v29) and 485 # xts last block 534 # xts last block 615 ## xts second to last block 630 ## xts last block 679 ## xts second to last block 694 ## xts last block
|
| /freebsd/share/man/man4/ |
| H A D | ccr.4 | 51 The driver accelerates AES-CBC, AES-CCM, AES-CTR, AES-GCM, AES-XTS, 61 The driver also supports chaining one of AES-CBC, AES-CTR, or AES-XTS with
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/X86/MCTargetDesc/ |
| H A D | X86WinCOFFStreamer.cpp | 62 X86TargetStreamer *XTS = in emitCVFPOData() local 64 XTS->emitFPOData(ProcSym, Loc); in emitCVFPOData()
|
| /freebsd/crypto/openssl/crypto/aes/ |
| H A D | build.info | 13 aesni-xts-avx512.s 149 GENERATE[aesni-xts-avx512.s]=asm/aesni-xts-avx512.pl
|