Home
last modified time | relevance | path

Searched full:xts (Results 1 – 25 of 105) sorted by relevance

12345

/linux-6.12.1/drivers/crypto/ccp/
Dccp-crypto-aes-xts.c3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support
16 #include <crypto/xts.h>
29 .name = "xts(aes)",
30 .drv_name = "xts-aes-ccp",
170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt()
171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt()
173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt()
174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt()
175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt()
176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt()
[all …]
Dccp-ops.c1095 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local
1105 switch (xts->unit_size) { in ccp_run_xts_aes_cmd()
1126 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd()
1128 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd()
1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd()
1136 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd()
1139 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd()
1152 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd()
1153 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd()
1154 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd()
[all …]
/linux-6.12.1/arch/arm64/crypto/
DKconfig132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS"
137 XCTR, and XTS modes
155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)"
182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)"
214 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
234 tristate "Ciphers: SM4, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
244 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
Daes-neonbs-glue.c15 #include <crypto/xts.h>
25 MODULE_ALIAS_CRYPTO("xts(aes)");
439 .base.cra_name = "xts(aes)",
440 .base.cra_driver_name = "xts-aes-neonbs",
/linux-6.12.1/arch/arm/crypto/
DKconfig167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)"
179 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
183 and for XTS mode encryption, CBC and XTS mode decryption speedup is
191 encryption (not CBC decryption), the encryption of XTS tweaks, XTS
196 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)"
208 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/linux-6.12.1/arch/riscv/crypto/
DKconfig6 tristate "Ciphers: AES, modes: ECB, CBC, CTS, CTR, XTS"
13 Length-preserving ciphers: AES with ECB, CBC, CTS, CTR, XTS
17 - Zvbb vector extension (XTS)
19 - Zvkg vector crypto extension (XTS)
Daes-riscv64-glue.c4 * cipher and the ECB, CBC, CBC-CTS, CTR, and XTS modes.
22 #include <crypto/xts.h>
82 * special code just for "cipher", as e.g. XTS also uses a in riscv64_aes_setkey()
337 /* AES-XTS */
558 .cra_name = "xts(aes)",
559 .cra_driver_name = "xts-aes-riscv64-zvkned-zvbb-zvkg",
629 MODULE_DESCRIPTION("AES-ECB/CBC/CTS/CTR/XTS (RISC-V accelerated)");
637 MODULE_ALIAS_CRYPTO("xts(aes)");
/linux-6.12.1/arch/powerpc/crypto/
Daes_xts.c3 * AES XTS routines supporting VMX In-core instructions on Power 8
15 #include <crypto/xts.h>
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init()
147 .base.cra_name = "xts(aes)",
Daes-spe-regs.h14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */
15 #define rKT r9 /* pointer to tweak key (XTS mode) */
34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
Daes-spe-glue.c21 #include <crypto/xts.h>
30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per
474 .base.cra_name = "xts(aes)",
475 .base.cra_driver_name = "xts-ppc-spe",
515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized");
521 MODULE_ALIAS_CRYPTO("xts(aes)");
DKconfig87 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (SPE)"
92 Length-preserving ciphers: AES with ECB, CBC, CTR, and XTS modes
/linux-6.12.1/tools/testing/selftests/ptp/
Dtestptp.c165 struct ptp_sys_offset_precise *xts; in main() local
590 xts = calloc(1, sizeof(*xts)); in main()
591 if (!xts) { in main()
596 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main()
602 xts->device.sec, xts->device.nsec); in main()
604 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main()
606 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main()
609 free(xts); in main()
/linux-6.12.1/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json97 "BriefDescription": "KM XTS AES 128",
98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0"
104 "BriefDescription": "KM XTS AES 256",
105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0"
111 "BriefDescription": "KM XTS ENCRYPTED AES 128",
112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0"
118 "BriefDescription": "KM XTS ENCRYPTED AES 256",
119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0"
811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128",
812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0"
[all …]
/linux-6.12.1/Documentation/crypto/
Dapi-samples.rst7 This code encrypts some data with AES-256-XTS. For sake of example,
21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */
22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */
33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0);
35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
/linux-6.12.1/crypto/
Dtcrypt.c1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test()
1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test()
1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test()
1553 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test()
1610 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test()
1847 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test()
1870 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1872 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test()
1922 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test()
1924 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test()
[all …]
Dxts.c2 /* XTS: as defined in IEEE1619/D16
20 #include <crypto/xts.h>
389 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create()
413 "xts(%s)", name) >= CRYPTO_MAX_ALG_NAME) { in xts_create()
454 .name = "xts",
473 MODULE_DESCRIPTION("XTS block cipher mode");
474 MODULE_ALIAS_CRYPTO("xts");
/linux-6.12.1/arch/s390/crypto/
DKconfig84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM"
91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes
102 key sizes and XTS mode is hardware accelerated for 256 and
Daes_s390.c34 #include <crypto/xts.h>
415 /* Split the XTS key into the two subkeys */ in xts_aes_set_key()
435 u8 xts[16]; in xts_aes_crypt() member
461 memset(pcc_param.xts, 0, sizeof(pcc_param.xts)); in xts_aes_crypt()
467 memcpy(xts_param.init, pcc_param.xts, 16); in xts_aes_crypt()
500 pr_err("Allocating XTS fallback algorithm %s failed\n", in xts_fallback_init()
517 .base.cra_name = "xts(aes)",
518 .base.cra_driver_name = "xts-aes-s390",
619 .base.cra_name = "xts(aes)",
620 .base.cra_driver_name = "full-xts-aes-s390",
[all …]
Dpaes_s390.c27 #include <crypto/xts.h>
504 u8 xts[16]; in xts_paes_crypt() member
525 memcpy(xts_param.init, pcc_param.xts, 16); in xts_paes_crypt()
558 .base.cra_name = "xts(paes)",
559 .base.cra_driver_name = "xts-paes-s390",
808 MODULE_ALIAS_CRYPTO("xts(paes)");
/linux-6.12.1/include/linux/
Dccp.h193 /***** XTS-AES engine *****/
195 * ccp_xts_aes_unit_size - XTS unit size
213 * struct ccp_xts_aes_engine - CCP XTS AES operation
215 * @unit_size: unit size of the XTS operation
216 * @key: key to be used for this XTS AES operation
218 * @iv: IV to be used for this XTS AES operation
223 * @final: indicates final XTS operation
595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation
653 struct ccp_xts_aes_engine xts; member
/linux-6.12.1/Documentation/devicetree/bindings/crypto/
Dsamsung-slimsss.yaml15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
/linux-6.12.1/Documentation/admin-guide/device-mapper/
Ddm-crypt.rst26 aes-xts-plain64
27 serpent-xts-plain64
41 capi:xts(aes)-plain64
46 capi:authenc(hmac(sha256),xts(aes))-random
/linux-6.12.1/drivers/crypto/qce/
Dskcipher.c183 * AES XTS key1 = key2 not supported by crypto engine. in qce_skcipher_setkey()
285 * AES-XTS request with len <= 512 byte (not recommended to use CE) in qce_skcipher_crypt()
286 * AES-XTS request with len > QCE_SECTOR_SIZE and in qce_skcipher_crypt()
391 .name = "xts(aes)",
392 .drv_name = "xts-aes-qce",
/linux-6.12.1/arch/x86/crypto/
Daes-xts-avx-x86_64.S3 * AES-XTS for modern x86_64 CPUs
11 * This file implements AES-XTS for modern x86_64 CPUs. To handle the
47 * the XTS tweaks. This avoids a bottleneck. Currently there don't seem to be
51 * The AES-XTS implementations in this file support everything required by the
153 // V6-V9 hold XTS tweaks. Each 128-bit lane holds one tweak.
256 // Given a 128-bit XTS tweak in the xmm register \src, compute the next tweak
266 // Given the XTS tweak(s) in the vector \src, compute the next vector of
284 // Given the first XTS tweak at (TWEAK), compute the first set of tweaks and
796 // Below are the actual AES-XTS encryption and decryption functions,
/linux-6.12.1/block/
Dblk-crypto.c23 .name = "AES-256-XTS",
24 .cipher_str = "xts(aes)",
41 .name = "SM4-XTS",
42 .cipher_str = "xts(sm4)",

12345