| /OK3568_Linux_fs/kernel/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
| H A D | ccp-ops.c | 1092 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1102 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1123 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1125 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1130 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1133 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1136 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1149 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1150 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1151 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | aes.h | 18 * The AES-XTS block mode is standardized by NIST SP 800-38E 103 * \brief The AES XTS context-type definition. 139 * \brief This function initializes the specified AES XTS context. 144 * \param ctx The AES XTS context to initialize. This must not be \c NULL. 149 * \brief This function releases and clears the specified AES XTS context. 151 * \param ctx The AES XTS context to clear. 196 * \brief This function prepares an XTS context for encryption and 199 * \param ctx The AES XTS context to which the key should be bound. 201 * \param key The encryption key. This is comprised of the XTS key1 202 * concatenated with the XTS key2. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | aes.h | 18 * The AES-XTS block mode is standardized by NIST SP 800-38E 103 * \brief The AES XTS context-type definition. 139 * \brief This function initializes the specified AES XTS context. 144 * \param ctx The AES XTS context to initialize. This must not be \c NULL. 149 * \brief This function releases and clears the specified AES XTS context. 151 * \param ctx The AES XTS context to clear. 196 * \brief This function prepares an XTS context for encryption and 199 * \param ctx The AES XTS context to which the key should be bound. 201 * \param key The encryption key. This is comprised of the XTS key1 202 * concatenated with the XTS key2. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | aes.h | 18 * The AES-XTS block mode is standardized by NIST SP 800-38E 103 * \brief The AES XTS context-type definition. 139 * \brief This function initializes the specified AES XTS context. 144 * \param ctx The AES XTS context to initialize. This must not be \c NULL. 149 * \brief This function releases and clears the specified AES XTS context. 151 * \param ctx The AES XTS context to clear. 196 * \brief This function prepares an XTS context for encryption and 199 * \param ctx The AES XTS context to which the key should be bound. 201 * \param key The encryption key. This is comprised of the XTS key1 202 * concatenated with the XTS key2. [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | aes.h | 18 * The AES-XTS block mode is standardized by NIST SP 800-38E 103 * \brief The AES XTS context-type definition. 139 * \brief This function initializes the specified AES XTS context. 144 * \param ctx The AES XTS context to initialize. This must not be \c NULL. 149 * \brief This function releases and clears the specified AES XTS context. 151 * \param ctx The AES XTS context to clear. 196 * \brief This function prepares an XTS context for encryption and 199 * \param ctx The AES XTS context to which the key should be bound. 201 * \param key The encryption key. This is comprised of the XTS key1 202 * concatenated with the XTS key2. [all …]
|
| /OK3568_Linux_fs/external/xserver/.gitlab-ci/ |
| H A D | Dockerfile | 26 git clone https://gitlab.freedesktop.org/xorg/test/xts && \ 27 cd xts && ./autogen.sh && xvfb-run make -j$(nproc) && \ 28 cd .. && rm -rf piglit/.git xts/.git && \ 29 echo '[xts]' > piglit/piglit.conf && echo 'path=/root/xts' >> piglit/piglit.conf && \
|
| /OK3568_Linux_fs/kernel/tools/crypto/ |
| H A D | gen_fips140_testvecs.py | 30 aes_xts_key = bytes('This is an AES-128-XTS key.\0\0\0\0\0', 'ascii') 95 # Unfortunately, pycryptodome doesn't support XTS, so for it we need to use 98 xts = cryptography.hazmat.primitives.ciphers.Cipher( 100 cryptography.hazmat.primitives.ciphers.modes.XTS(aes_iv)).encryptor() 101 ciphertext = xts.update(message) + xts.finalize()
|
| /OK3568_Linux_fs/kernel/arch/x86/crypto/ |
| H A D | serpent_avx2_glue.c | 15 #include <crypto/xts.h> 77 .fn_u = { .xts = serpent_xts_enc_16way } 80 .fn_u = { .xts = serpent_xts_enc_8way_avx } 83 .fn_u = { .xts = serpent_xts_enc } 125 .fn_u = { .xts = serpent_xts_dec_16way } 128 .fn_u = { .xts = serpent_xts_dec_8way_avx } 131 .fn_u = { .xts = serpent_xts_dec }
|
| H A D | camellia_aesni_avx2_glue.c | 12 #include <crypto/xts.h> 78 .fn_u = { .xts = camellia_xts_enc_32way } 81 .fn_u = { .xts = camellia_xts_enc_16way } 84 .fn_u = { .xts = camellia_xts_enc } 132 .fn_u = { .xts = camellia_xts_dec_32way } 135 .fn_u = { .xts = camellia_xts_dec_16way } 138 .fn_u = { .xts = camellia_xts_dec }
|
| H A D | cast6_avx_glue.c | 18 #include <crypto/xts.h> 96 .fn_u = { .xts = cast6_xts_enc_8way } 99 .fn_u = { .xts = cast6_xts_enc } 135 .fn_u = { .xts = cast6_xts_dec_8way } 138 .fn_u = { .xts = cast6_xts_dec } 182 /* first half of xts-key is for crypt */ in xts_cast6_setkey() 187 /* second half of xts-key is for tweak */ in xts_cast6_setkey()
|
| H A D | camellia_aesni_avx_glue.c | 12 #include <crypto/xts.h> 92 .fn_u = { .xts = camellia_xts_enc_16way } 95 .fn_u = { .xts = camellia_xts_enc } 137 .fn_u = { .xts = camellia_xts_dec_16way } 140 .fn_u = { .xts = camellia_xts_dec } 185 /* first half of xts-key is for crypt */ in xts_camellia_setkey() 190 /* second half of xts-key is for tweak */ in xts_camellia_setkey()
|
| H A D | twofish_avx_glue.c | 18 #include <crypto/xts.h> 73 /* first half of xts-key is for crypt */ in xts_twofish_setkey() 78 /* second half of xts-key is for tweak */ in xts_twofish_setkey() 120 .fn_u = { .xts = twofish_xts_enc_8way } 123 .fn_u = { .xts = twofish_xts_enc } 165 .fn_u = { .xts = twofish_xts_dec_8way } 168 .fn_u = { .xts = twofish_xts_dec }
|
| H A D | serpent_avx_glue.c | 18 #include <crypto/xts.h> 89 /* first half of xts-key is for crypt */ in xts_serpent_setkey() 94 /* second half of xts-key is for tweak */ in xts_serpent_setkey() 131 .fn_u = { .xts = serpent_xts_enc_8way_avx } 134 .fn_u = { .xts = serpent_xts_enc } 170 .fn_u = { .xts = serpent_xts_dec_8way_avx } 173 .fn_u = { .xts = serpent_xts_dec }
|
| /OK3568_Linux_fs/kernel/drivers/crypto/vmx/ |
| H A D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/ |
| H A D | cryptsetup_2.4.3.bb | 39 luks-adjust-xts-keysize \ 65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt… 102 kernel-module-xts \
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
| /OK3568_Linux_fs/kernel/arch/powerpc/crypto/ |
| H A D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
| /OK3568_Linux_fs/kernel/arch/arm/crypto/ |
| H A D | Kconfig | 110 CTR and XTS modes 113 and for XTS mode encryption, CBC and XTS mode decryption speedup is 125 Use an implementation of AES in CBC, CTR and XTS modes that uses
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | ccp.h | 192 /***** XTS-AES engine *****/ 194 * ccp_xts_aes_unit_size - XTS unit size 212 * struct ccp_xts_aes_engine - CCP XTS AES operation 214 * @unit_size: unit size of the XTS operation 215 * @key: key to be used for this XTS AES operation 217 * @iv: IV to be used for this XTS AES operation 222 * @final: indicates final XTS operation 594 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 652 struct ccp_xts_aes_engine xts; member
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | xts.c | 2 /* XTS: as defined in IEEE1619/D16 20 #include <crypto/xts.h> 387 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create() 411 "xts(%s)", ctx->name) >= CRYPTO_MAX_ALG_NAME) { in xts_create() 447 .name = "xts", 466 MODULE_DESCRIPTION("XTS block cipher mode"); 467 MODULE_ALIAS_CRYPTO("xts");
|
| H A D | tcrypt.c | 1718 ret += tcrypt_test("xts(twofish)"); in do_test() 1726 ret += tcrypt_test("xts(serpent)"); in do_test() 1733 ret += tcrypt_test("xts(aes)"); in do_test() 1763 ret += tcrypt_test("xts(cast6)"); in do_test() 1836 ret += tcrypt_test("xts(camellia)"); in do_test() 2066 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2068 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 2122 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 2124 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() 2171 test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0, in do_test() [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm64/crypto/ |
| H A D | Kconfig | 88 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions" 94 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions" 118 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 26 aes-xts-plain64 27 serpent-xts-plain64 41 capi:xts(aes)-plain64 46 capi:authenc(hmac(sha256),xts(aes))-random
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/ |
| H A D | rk_crypto_v2_skcipher.c | 159 /* crypto v2 not support xts with AES-192 */ in is_force_fallback() 249 /* XTS data should >= chunksize */ in rk_cipher_crypt() 257 /* XTS can't pause when use hardware crypto */ in rk_cipher_crypt() 273 /* The key length of XTS is twice the normal length */ in rk_cipher_crypt() 623 RK_CIPHER_ALGO_XTS_INIT(SM4, xts(sm4), xts-sm4-rk); 644 RK_CIPHER_ALGO_XTS_INIT(AES, xts(aes), xts-aes-rk);
|