/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_common.txt | 999 Title = AES XTS test vectors from IEEE Std 1619-2007 1002 Cipher = aes-128-xts 1012 Cipher = aes-128-xts 1022 Cipher = aes-128-xts 1029 Cipher = aes-128-xts 1035 Cipher = aes-128-xts 1041 Cipher = aes-128-xts 1047 Cipher = aes-128-xts 1053 Cipher = aes-128-xts 1059 Cipher = aes-128-xts [all …]
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_xts.c | 48 * FIPS 140-2 IG A.9 XTS-AES Key Generation Requirements states 51 * BEFORE using the keys in the XTS-AES algorithm to process 140 if (in->xts.key1 != NULL) { in aes_xts_dupctx() 141 if (in->xts.key1 != &in->ks1) in aes_xts_dupctx() 144 if (in->xts.key2 != NULL) { in aes_xts_dupctx() 145 if (in->xts.key2 != &in->ks2) in aes_xts_dupctx() 163 || ctx->xts.key1 == NULL in aes_xts_cipher() 164 || ctx->xts.key2 == NULL in aes_xts_cipher() 183 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher() 184 else if (CRYPTO_xts128_encrypt(&ctx->xts, ctx->base.iv, in, out, inl, in aes_xts_cipher() [all …]
|
H A D | cipher_aes_xts_hw.c | 26 xctx->xts.block1 = (block128_f)fn_block_enc; \ 29 xctx->xts.block1 = (block128_f)fn_block_dec; \ 32 xctx->xts.block2 = (block128_f)fn_block_enc; \ 33 xctx->xts.key1 = &xctx->ks1; \ 34 xctx->xts.key2 = &xctx->ks2; \ 96 dctx->xts.key1 = &dctx->ks1.ks; in cipher_hw_aes_xts_copyctx() 97 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_aes_xts_copyctx()
|
H A D | cipher_aes_xts.h | 31 XTS128_CONTEXT xts; member
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_aes_128_gcm.pod | 146 AES XTS mode (XTS-AES) is standardized in IEEE Std. 1619-2007 and described in NIST 147 SP 800-38E. The XTS (XEX-based tweaked-codebook mode with ciphertext stealing) 151 XTS-AES provides confidentiality but not authentication of data. It also 153 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to 154 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input 157 The XTS implementation in OpenSSL does not support streaming. That is there must 162 the XTS "tweak" value.
|
H A D | OPENSSL_s390xcap.pod | 105 # 50 1<<13 KM-XTS-AES-128 106 # 52 1<<11 KM-XTS-AES-256 182 Disables the KM-XTS-AES and the KIMD-SHAKE function codes:
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_aes_128_gcm.3 | 232 \&\s-1AES XTS\s0 mode (XTS-AES) is standardized in \s-1IEEE\s0 Std. 1619\-2007 and described in \s-… 233 SP 800\-38E.\s0 The \s-1XTS\s0 (XEX-based tweaked-codebook mode with ciphertext stealing) 239 In particular, \s-1XTS\-AES\-128\s0 (\fBEVP_aes_128_xts\fR) takes input of a 256\-bit key to 240 achieve \s-1AES\s0 128\-bit security, and \s-1XTS\-AES\-256\s0 (\fBEVP_aes_256_xts\fR) takes input 243 The \s-1XTS\s0 implementation in OpenSSL does not support streaming. That is there must 248 the \s-1XTS\s0 \*(L"tweak\*(R" value.
|
H A D | OPENSSL_s390xcap.3 | 236 \& # 50 1<<13 KM\-XTS\-AES\-128 237 \& # 52 1<<11 KM\-XTS\-AES\-256 316 Disables the KM-XTS-AES and the KIMD-SHAKE function codes:
|
/freebsd/tests/sys/geom/class/eli/ |
H A D | conf.sh | 40 for cipher in aes-xts:128 aes-xts:256 \ 64 for cipher in aes-xts:128 aes-xts:256 \
|
H A D | init_test.sh | 309 for spec in aes:0:AES-XTS:128 aes:128:AES-XTS:128 aes:256:AES-XTS:256 \
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
H A D | lac_session.h | 258 /**< Cached AES XTS Forward key 259 * For CPM2.0 AES XTS key convertion need to be done in SW. 264 /**< AES XTS Reverse key 265 * For CPM2.0 AES XTS key convertion need to be done in SW. 269 /**< For AES XTS session need to store Key2 value in order to generate 444 /**< Cached AES XTS Forward key 445 * For CPM2.0 AES XTS key convertion need to be done in SW. 450 /**< AES XTS Reverse key 451 * For CPM2.0 AES XTS key convertion need to be done in SW. 455 /**< For AES XTS session need to store Key2 value in order to generate [all …]
|
H A D | lac_sym_cipher_defs.h | 74 /* The max key length for AES XTS 32 is bytes*/ 181 /* Macro to check if the Algorithm Mode is XTS */
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_CIPHER-AES.pod | 32 =item "AES-128-XTS" and "AES-256-XTS" 70 The AES-XTS implementations allow streaming to be performed, but each
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 67 XTS128_CONTEXT xts; member 288 xctx->xts.block1 = (block128_f) aesni_encrypt; in aesni_xts_init_key() 292 xctx->xts.block1 = (block128_f) aesni_decrypt; in aesni_xts_init_key() 297 xctx->xts.block2 = (block128_f) aesni_encrypt; in aesni_xts_init_key() 299 xctx->xts.key1 = &xctx->ks1; in aesni_xts_init_key() 303 xctx->xts.key2 = &xctx->ks2; in aesni_xts_init_key() 625 xctx->xts.block1 = (block128_f) aes_t4_encrypt; in aes_t4_xts_init_key() 638 xctx->xts.block1 = (block128_f) aes_t4_decrypt; in aes_t4_xts_init_key() 652 xctx->xts.block2 = (block128_f) aes_t4_encrypt; in aes_t4_xts_init_key() 654 xctx->xts.key1 = &xctx->ks1; in aes_t4_xts_init_key() [all …]
|
H A D | evp_err.c | 193 "xts data unit is too large"}, 195 "xts duplicated keys"},
|
/freebsd/sys/contrib/device-tree/Bindings/crypto/ |
H A D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
H A D | nvidia,tegra234-se-aes.yaml | 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
H A D | lac_sym_cipher.c | 72 /* Perform IV check for CTR, CBC, XTS, F8 MODE. */ in LacCipher_PerformIvCheck() 256 "Invalid AES XTS cipher key length"); in LacCipher_SessionSetupDataCheck() 394 * XTS Mode allow for ciphers which are not multiples of in LacCipher_PerformParamCheck() 409 " size for last XTS partial or XTS " in LacCipher_PerformParamCheck()
|
/freebsd/share/man/man4/ |
H A D | ccr.4 | 51 The driver accelerates AES-CBC, AES-CCM, AES-CTR, AES-GCM, AES-XTS, 61 The driver also supports chaining one of AES-CBC, AES-CTR, or AES-XTS with
|
/freebsd/contrib/llvm-project/llvm/lib/Target/X86/MCTargetDesc/ |
H A D | X86WinCOFFStreamer.cpp | 62 X86TargetStreamer *XTS = in emitCVFPOData() local 64 XTS->emitFPOData(ProcSym, Loc); in emitCVFPOData()
|
/freebsd/sys/opencrypto/ |
H A D | xform_aes_xts.c | 19 * AES XTS implementation in 2008 by Damien Miller 64 .name = "AES-XTS",
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_CIPHER-AES.7 | 169 .IX Item "AES-128-XTS and AES-256-XTS"
|
/freebsd/tools/boot/ |
H A D | rootgen.sh | 294 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p2 328 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p2 363 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3 403 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3 452 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3 497 echo ${passphrase} | geli init -bg -e AES-XTS -i ${iterations} -J - -l 256 -s 4096 ${md}p3
|
/freebsd/sys/crypto/aesni/ |
H A D | aesni.c | 110 "AES-CBC,AES-CCM,AES-GCM,AES-ICM,AES-XTS,SHA1,SHA256"); in aesni_probe() 113 "AES-CBC,AES-CCM,AES-GCM,AES-ICM,AES-XTS"); in aesni_probe() 203 CRYPTDEB("invalid XTS key length"); in aesni_cipher_supported() 590 /* CBC & XTS can only handle full blocks for now */ in aesni_cipher_process()
|
/freebsd/lib/geom/eli/ |
H A D | geli.8 | 170 .Nm AES-XTS , 297 .Nm AES-XTS , 303 .Nm AES-XTS . 346 .It Nm AES-XTS 1204 .Nm XTS ,
|