/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
D | ccp-ops.c | 1095 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1105 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1126 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1128 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1136 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1139 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1152 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1153 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1154 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
/linux-6.12.1/arch/arm64/crypto/ |
D | Kconfig | 132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS" 137 XCTR, and XTS modes 155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)" 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)" 214 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 234 tristate "Ciphers: SM4, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 244 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
D | aes-neonbs-glue.c | 15 #include <crypto/xts.h> 25 MODULE_ALIAS_CRYPTO("xts(aes)"); 439 .base.cra_name = "xts(aes)", 440 .base.cra_driver_name = "xts-aes-neonbs",
|
/linux-6.12.1/arch/arm/crypto/ |
D | Kconfig | 167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)" 179 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 183 and for XTS mode encryption, CBC and XTS mode decryption speedup is 191 encryption (not CBC decryption), the encryption of XTS tweaks, XTS 196 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)" 208 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/linux-6.12.1/arch/riscv/crypto/ |
D | Kconfig | 6 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTS" 13 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTS 17 - Zvbb vector extension (XTS) 19 - Zvkg vector crypto extension (XTS)
|
D | aes-riscv64-glue.c | 4 * cipher and the ECB, CBC, CBC-CTS, CTR, and XTS modes. 22 #include <crypto/xts.h> 82 * special code just for "cipher", as e.g. XTS also uses a in riscv64_aes_setkey() 337 /* AES-XTS */ 558 .cra_name = "xts(aes)", 559 .cra_driver_name = "xts-aes-riscv64-zvkned-zvbb-zvkg", 629 MODULE_DESCRIPTION("AES-ECB/CBC/CTS/CTR/XTS (RISC-V accelerated)"); 637 MODULE_ALIAS_CRYPTO("xts(aes)");
|
/linux-6.12.1/arch/powerpc/crypto/ |
D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
D | aes-spe-glue.c | 21 #include <crypto/xts.h> 30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per 474 .base.cra_name = "xts(aes)", 475 .base.cra_driver_name = "xts-ppc-spe", 515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized"); 521 MODULE_ALIAS_CRYPTO("xts(aes)");
|
D | Kconfig | 87 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (SPE)" 92 Length-preserving ciphers: AES with ECB, CBC, CTR, and XTS modes
|
/linux-6.12.1/tools/testing/selftests/ptp/ |
D | testptp.c | 165 struct ptp_sys_offset_precise *xts; in main() local 590 xts = calloc(1, sizeof(*xts)); in main() 591 if (!xts) { in main() 596 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main() 602 xts->device.sec, xts->device.nsec); in main() 604 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main() 606 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main() 609 free(xts); in main()
|
/linux-6.12.1/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 97 "BriefDescription": "KM XTS AES 128", 98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0" 104 "BriefDescription": "KM XTS AES 256", 105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0" 111 "BriefDescription": "KM XTS ENCRYPTED AES 128", 112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0" 118 "BriefDescription": "KM XTS ENCRYPTED AES 256", 119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0" 811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128", 812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0" [all …]
|
/linux-6.12.1/Documentation/crypto/ |
D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
/linux-6.12.1/crypto/ |
D | tcrypt.c | 1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test() 1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test() 1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test() 1553 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test() 1610 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test() 1847 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test() 1870 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1872 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1922 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 1924 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() [all …]
|
D | xts.c | 2 /* XTS: as defined in IEEE1619/D16 20 #include <crypto/xts.h> 389 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create() 413 "xts(%s)", name) >= CRYPTO_MAX_ALG_NAME) { in xts_create() 454 .name = "xts", 473 MODULE_DESCRIPTION("XTS block cipher mode"); 474 MODULE_ALIAS_CRYPTO("xts");
|
/linux-6.12.1/arch/s390/crypto/ |
D | Kconfig | 84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM" 91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes 102 key sizes and XTS mode is hardware accelerated for 256 and
|
D | aes_s390.c | 34 #include <crypto/xts.h> 415 /* Split the XTS key into the two subkeys */ in xts_aes_set_key() 435 u8 xts[16]; in xts_aes_crypt() member 461 memset(pcc_param.xts, 0, sizeof(pcc_param.xts)); in xts_aes_crypt() 467 memcpy(xts_param.init, pcc_param.xts, 16); in xts_aes_crypt() 500 pr_err("Allocating XTS fallback algorithm %s failed\n", in xts_fallback_init() 517 .base.cra_name = "xts(aes)", 518 .base.cra_driver_name = "xts-aes-s390", 619 .base.cra_name = "xts(aes)", 620 .base.cra_driver_name = "full-xts-aes-s390", [all …]
|
D | paes_s390.c | 27 #include <crypto/xts.h> 504 u8 xts[16]; in xts_paes_crypt() member 525 memcpy(xts_param.init, pcc_param.xts, 16); in xts_paes_crypt() 558 .base.cra_name = "xts(paes)", 559 .base.cra_driver_name = "xts-paes-s390", 808 MODULE_ALIAS_CRYPTO("xts(paes)");
|
/linux-6.12.1/include/linux/ |
D | ccp.h | 193 /***** XTS-AES engine *****/ 195 * ccp_xts_aes_unit_size - XTS unit size 213 * struct ccp_xts_aes_engine - CCP XTS AES operation 215 * @unit_size: unit size of the XTS operation 216 * @key: key to be used for this XTS AES operation 218 * @iv: IV to be used for this XTS AES operation 223 * @final: indicates final XTS operation 595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 653 struct ccp_xts_aes_engine xts; member
|
/linux-6.12.1/Documentation/devicetree/bindings/crypto/ |
D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
/linux-6.12.1/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 26 aes-xts-plain64 27 serpent-xts-plain64 41 capi:xts(aes)-plain64 46 capi:authenc(hmac(sha256),xts(aes))-random
|
/linux-6.12.1/drivers/crypto/qce/ |
D | skcipher.c | 183 * AES XTS key1 = key2 not supported by crypto engine. in qce_skcipher_setkey() 285 * AES-XTS request with len <= 512 byte (not recommended to use CE) in qce_skcipher_crypt() 286 * AES-XTS request with len > QCE_SECTOR_SIZE and in qce_skcipher_crypt() 391 .name = "xts(aes)", 392 .drv_name = "xts-aes-qce",
|
/linux-6.12.1/arch/x86/crypto/ |
D | aes-xts-avx-x86_64.S | 3 * AES-XTS for modern x86_64 CPUs 11 * This file implements AES-XTS for modern x86_64 CPUs. To handle the 47 * the XTS tweaks. This avoids a bottleneck. Currently there don't seem to be 51 * The AES-XTS implementations in this file support everything required by the 153 // V6-V9 hold XTS tweaks. Each 128-bit lane holds one tweak. 256 // Given a 128-bit XTS tweak in the xmm register \src, compute the next tweak 266 // Given the XTS tweak(s) in the vector \src, compute the next vector of 284 // Given the first XTS tweak at (TWEAK), compute the first set of tweaks and 796 // Below are the actual AES-XTS encryption and decryption functions,
|
/linux-6.12.1/block/ |
D | blk-crypto.c | 23 .name = "AES-256-XTS", 24 .cipher_str = "xts(aes)", 41 .name = "SM4-XTS", 42 .cipher_str = "xts(sm4)",
|