| /kernel/linux/linux-6.6/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
| D | ccp-ops.c | 1095 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1105 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1126 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1128 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1136 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1139 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1152 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1153 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1154 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
| D | ccp-ops.c | 1095 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1105 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1126 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1128 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1136 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1139 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1152 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1153 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1154 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
| /kernel/linux/linux-6.6/arch/arm64/crypto/ |
| D | Kconfig | 132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS" 137 XCTR, and XTS modes 155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)" 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)" 214 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 234 tristate "Ciphers: SM4, modes: ECB/CBC/CFB/CTR/XTS (ARMv8 Crypto Extensions)" 245 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
| /kernel/linux/linux-5.10/arch/x86/crypto/ |
| D | serpent_avx2_glue.c | 15 #include <crypto/xts.h> 77 .fn_u = { .xts = serpent_xts_enc_16way } 80 .fn_u = { .xts = serpent_xts_enc_8way_avx } 83 .fn_u = { .xts = serpent_xts_enc } 125 .fn_u = { .xts = serpent_xts_dec_16way } 128 .fn_u = { .xts = serpent_xts_dec_8way_avx } 131 .fn_u = { .xts = serpent_xts_dec }
|
| D | camellia_aesni_avx2_glue.c | 12 #include <crypto/xts.h> 78 .fn_u = { .xts = camellia_xts_enc_32way } 81 .fn_u = { .xts = camellia_xts_enc_16way } 84 .fn_u = { .xts = camellia_xts_enc } 132 .fn_u = { .xts = camellia_xts_dec_32way } 135 .fn_u = { .xts = camellia_xts_dec_16way } 138 .fn_u = { .xts = camellia_xts_dec }
|
| D | cast6_avx_glue.c | 18 #include <crypto/xts.h> 96 .fn_u = { .xts = cast6_xts_enc_8way } 99 .fn_u = { .xts = cast6_xts_enc } 135 .fn_u = { .xts = cast6_xts_dec_8way } 138 .fn_u = { .xts = cast6_xts_dec } 182 /* first half of xts-key is for crypt */ in xts_cast6_setkey() 187 /* second half of xts-key is for tweak */ in xts_cast6_setkey()
|
| D | serpent_avx_glue.c | 18 #include <crypto/xts.h> 89 /* first half of xts-key is for crypt */ in xts_serpent_setkey() 94 /* second half of xts-key is for tweak */ in xts_serpent_setkey() 131 .fn_u = { .xts = serpent_xts_enc_8way_avx } 134 .fn_u = { .xts = serpent_xts_enc } 170 .fn_u = { .xts = serpent_xts_dec_8way_avx } 173 .fn_u = { .xts = serpent_xts_dec }
|
| D | twofish_avx_glue.c | 18 #include <crypto/xts.h> 73 /* first half of xts-key is for crypt */ in xts_twofish_setkey() 78 /* second half of xts-key is for tweak */ in xts_twofish_setkey() 120 .fn_u = { .xts = twofish_xts_enc_8way } 123 .fn_u = { .xts = twofish_xts_enc } 165 .fn_u = { .xts = twofish_xts_dec_8way } 168 .fn_u = { .xts = twofish_xts_dec }
|
| D | camellia_aesni_avx_glue.c | 12 #include <crypto/xts.h> 92 .fn_u = { .xts = camellia_xts_enc_16way } 95 .fn_u = { .xts = camellia_xts_enc } 137 .fn_u = { .xts = camellia_xts_dec_16way } 140 .fn_u = { .xts = camellia_xts_dec } 185 /* first half of xts-key is for crypt */ in xts_camellia_setkey() 190 /* second half of xts-key is for tweak */ in xts_camellia_setkey()
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| D | Kconfig | 167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)" 180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 184 and for XTS mode encryption, CBC and XTS mode decryption speedup is 190 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)" 202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
| /kernel/linux/linux-5.10/drivers/crypto/vmx/ |
| D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
| /kernel/linux/linux-6.6/drivers/crypto/vmx/ |
| D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
| /kernel/linux/linux-6.6/tools/testing/selftests/ptp/ |
| D | testptp.c | 164 struct ptp_sys_offset_precise *xts; in main() local 585 xts = calloc(1, sizeof(*xts)); in main() 586 if (!xts) { in main() 591 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main() 597 xts->device.sec, xts->device.nsec); in main() 599 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main() 601 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main() 604 free(xts); in main()
|
| /kernel/linux/linux-6.6/arch/powerpc/crypto/ |
| D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
| /kernel/linux/linux-5.10/arch/powerpc/crypto/ |
| D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
| /kernel/linux/linux-5.10/arch/arm/crypto/ |
| D | Kconfig | 91 CTR and XTS modes 94 and for XTS mode encryption, CBC and XTS mode decryption speedup is 106 Use an implementation of AES in CBC, CTR and XTS modes that uses
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/s390/cf_z16/ |
| D | pai_crypto.json | 97 "BriefDescription": "KM XTS AES 128", 98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0" 104 "BriefDescription": "KM XTS AES 256", 105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0" 111 "BriefDescription": "KM XTS ENCRYPTED AES 128", 112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0" 118 "BriefDescription": "KM XTS ENCRYPTED AES 256", 119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0" 811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128", 812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0" [all …]
|
| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
| /kernel/linux/linux-5.10/arch/arm64/crypto/ |
| D | Kconfig | 88 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions" 96 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions" 122 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
| /kernel/linux/linux-6.6/arch/s390/crypto/ |
| D | Kconfig | 84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM" 91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes 102 key sizes and XTS mode is hardware accelerated for 256 and
|
| /kernel/linux/linux-6.6/crypto/ |
| D | tcrypt.c | 1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test() 1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test() 1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test() 1555 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test() 1612 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test() 1850 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test() 1871 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1873 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1927 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 1929 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | xts.c | 2 /* XTS: as defined in IEEE1619/D16 19 #include <crypto/xts.h> 386 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create() 410 "xts(%s)", ctx->name) >= CRYPTO_MAX_ALG_NAME) { in xts_create() 446 .name = "xts", 465 MODULE_DESCRIPTION("XTS block cipher mode"); 466 MODULE_ALIAS_CRYPTO("xts");
|