| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
| H A D | ccp-ops.c | 1105 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1115 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1136 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1138 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1143 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1146 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1149 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1162 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1163 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1164 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
| H A D | Makefile | 27 ccp-crypto-aes-xts.o \
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 97 "BriefDescription": "KM XTS AES 128", 98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0" 104 "BriefDescription": "KM XTS AES 256", 105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0" 111 "BriefDescription": "KM XTS ENCRYPTED AES 128", 112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0" 118 "BriefDescription": "KM XTS ENCRYPTED AES 256", 119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0" 811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128", 812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0" [all …]
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 97 "BriefDescription": "KM XTS AES 128", 98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0" 104 "BriefDescription": "KM XTS AES 256", 105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0" 111 "BriefDescription": "KM XTS ENCRYPTED AES 128", 112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0" 118 "BriefDescription": "KM XTS ENCRYPTED AES 256", 119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0" 811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128", 812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0" [all …]
|
| /linux/tools/testing/selftests/ptp/ |
| H A D | testptp.c | 168 struct ptp_sys_offset_precise *xts; in main() local 658 xts = calloc(1, sizeof(*xts)); in main() 659 if (!xts) { in main() 664 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main() 670 xts->device.sec, xts->device.nsec); in main() 672 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main() 674 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main() 677 free(xts); in main()
|
| /linux/crypto/ |
| H A D | tcrypt.c | 1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test() 1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test() 1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test() 1553 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test() 1610 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test() 1831 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test() 1854 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1856 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1906 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 1908 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() [all …]
|
| H A D | Kconfig | 605 AES-XTS. 609 bound. Unlike XTS, Adiantum is a true wide-block encryption 611 security than XTS, subject to the security bound. 738 tristate "XTS (XOR Encrypt XOR with ciphertext stealing)" 743 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 746 Use with aes-xts-plain, key size 256, 384 or 512 bits. This 855 the SoC in question has accelerated CBC but not XTS, making CBC
|
| /linux/Documentation/crypto/ |
| H A D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
| /linux/include/linux/ |
| H A D | ccp.h | 193 /***** XTS-AES engine *****/ 195 * ccp_xts_aes_unit_size - XTS unit size 213 * struct ccp_xts_aes_engine - CCP XTS AES operation 215 * @unit_size: unit size of the XTS operation 216 * @key: key to be used for this XTS AES operation 218 * @iv: IV to be used for this XTS AES operation 223 * @final: indicates final XTS operation 595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 653 struct ccp_xts_aes_engine xts; member
|
| /linux/drivers/crypto/ti/ |
| H A D | dthev2-aes.c | 111 ctx->skcipher_fb = crypto_alloc_sync_skcipher("xts(aes)", 0, in dthe_cipher_xts_init_tfm() 114 dev_err(dev_data->dev, "fallback driver xts(aes) couldn't be loaded\n"); in dthe_cipher_xts_init_tfm() 410 * - need to fallback to software as H/W doesn't support Ciphertext Stealing for XTS in dthe_aes_crypt() 429 * Except for XTS mode, where data length should be non-zero. in dthe_aes_crypt() 513 .cra_name = "xts(aes)", 514 .cra_driver_name = "xts-aes-dthev2", 527 }, /* XTS AES */
|
| H A D | dthev2-common.h | 32 * This is currently the keysize of XTS-AES-256 which is 512 bits (64 bytes) 82 * @skcipher_fb: Fallback crypto skcipher handle for AES-XTS mode
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 26 aes-xts-plain64 27 serpent-xts-plain64 41 capi:xts(aes)-plain64 46 capi:authenc(hmac(sha256),xts(aes))-random
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
| H A D | nvidia,tegra234-se-aes.yaml | 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
|
| /linux/arch/x86/crypto/ |
| H A D | aes-xts-avx-x86_64.S | 3 // AES-XTS for modern x86_64 CPUs 50 * This file implements AES-XTS for modern x86_64 CPUs. To handle the 79 * the XTS tweaks. This avoids a bottleneck. Currently there don't seem to be 83 * The AES-XTS implementations in this file support everything required by the 170 // V6-V9 hold XTS tweaks. Each 128-bit lane holds one tweak. 273 // Given a 128-bit XTS tweak in the xmm register \src, compute the next tweak 287 // Given the XTS tweak(s) in the vector \src, compute the next vector of 305 // Given the first XTS tweak at (TWEAK), compute the first set of tweaks and 497 // interleave the AES rounds with the XTS tweak computation, and (c) it 867 // Below are the actual AES-XTS encryption and decryption functions,
|
| /linux/drivers/crypto/qce/ |
| H A D | skcipher.c | 183 * AES XTS key1 = key2 not supported by crypto engine. in qce_skcipher_setkey() 285 * AES-XTS request with len <= 512 byte (not recommended to use CE) in qce_skcipher_crypt() 286 * AES-XTS request with len > QCE_SECTOR_SIZE and in qce_skcipher_crypt() 391 .name = "xts(aes)", 392 .drv_name = "xts-aes-qce",
|
| /linux/fs/crypto/ |
| H A D | hkdf.c | 23 * common case of deriving an AES-256-XTS key (512 bits), that can result in 38 * length HKDF_HASHLEN bytes. However, cipher modes other than AES-256-XTS take
|
| H A D | keysetup.c | 19 .friendly_name = "AES-256-XTS", 20 .cipher_str = "xts(aes)", 49 .friendly_name = "SM4-XTS", 50 .cipher_str = "xts(sm4)", 415 * required key size over @ci->ci_mode). This allows AES-256-XTS keys to be
|
| /linux/arch/arm64/crypto/ |
| H A D | aes-neonbs-glue.c | 15 #include <crypto/xts.h> 25 MODULE_ALIAS_CRYPTO("xts(aes)"); 447 .base.cra_name = "xts(aes)", 448 .base.cra_driver_name = "xts-aes-neonbs",
|
| H A D | sm4-ce-glue.c | 18 #include <crypto/xts.h> 473 .cra_name = "xts(sm4)", 474 .cra_driver_name = "xts-sm4-ce", 707 MODULE_DESCRIPTION("SM4 ECB/CBC/CTR/XTS using ARMv8 Crypto Extensions"); 714 MODULE_ALIAS_CRYPTO("xts(sm4)");
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 11 #include <crypto/xts.h> 342 .base.cra_name = "xts(aes)", 343 .base.cra_driver_name = "cavium-xts-aes",
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 12 #include <crypto/xts.h> 34 { "xts(aes)", CIPHER_AES_XTS }, 424 .cra_name = "xts(aes)",
|
| H A D | nitrox_req.h | 126 * @key: Encryption key or KEY1 for AES-XTS 127 * @iv: Encryption IV or Tweak for AES-XTS 139 * @ipad: IPAD or KEY2 for AES-XTS
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 52 * AES-XTS Tweak prefix
|