Home
last modified time | relevance | path

Searched full:xts (Results 1 – 25 of 177) sorted by relevance

12345678

/OK3568_Linux_fs/kernel/drivers/crypto/ccp/
H A Dccp-crypto-aes-xts.c3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support
16 #include <crypto/xts.h>
29 .name = "xts(aes)",
30 .drv_name = "xts-aes-ccp",
170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt()
171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt()
173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt()
174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt()
175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt()
176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt()
[all …]
H A Dccp-ops.c1092 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local
1102 switch (xts->unit_size) { in ccp_run_xts_aes_cmd()
1123 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd()
1125 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd()
1130 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd()
1133 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd()
1136 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd()
1149 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd()
1150 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd()
1151 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Daes.h18 * The AES-XTS block mode is standardized by NIST SP 800-38E
103 * \brief The AES XTS context-type definition.
139 * \brief This function initializes the specified AES XTS context.
144 * \param ctx The AES XTS context to initialize. This must not be \c NULL.
149 * \brief This function releases and clears the specified AES XTS context.
151 * \param ctx The AES XTS context to clear.
196 * \brief This function prepares an XTS context for encryption and
199 * \param ctx The AES XTS context to which the key should be bound.
201 * \param key The encryption key. This is comprised of the XTS key1
202 * concatenated with the XTS key2.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Daes.h18 * The AES-XTS block mode is standardized by NIST SP 800-38E
103 * \brief The AES XTS context-type definition.
139 * \brief This function initializes the specified AES XTS context.
144 * \param ctx The AES XTS context to initialize. This must not be \c NULL.
149 * \brief This function releases and clears the specified AES XTS context.
151 * \param ctx The AES XTS context to clear.
196 * \brief This function prepares an XTS context for encryption and
199 * \param ctx The AES XTS context to which the key should be bound.
201 * \param key The encryption key. This is comprised of the XTS key1
202 * concatenated with the XTS key2.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Daes.h18 * The AES-XTS block mode is standardized by NIST SP 800-38E
103 * \brief The AES XTS context-type definition.
139 * \brief This function initializes the specified AES XTS context.
144 * \param ctx The AES XTS context to initialize. This must not be \c NULL.
149 * \brief This function releases and clears the specified AES XTS context.
151 * \param ctx The AES XTS context to clear.
196 * \brief This function prepares an XTS context for encryption and
199 * \param ctx The AES XTS context to which the key should be bound.
201 * \param key The encryption key. This is comprised of the XTS key1
202 * concatenated with the XTS key2.
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Daes.h18 * The AES-XTS block mode is standardized by NIST SP 800-38E
103 * \brief The AES XTS context-type definition.
139 * \brief This function initializes the specified AES XTS context.
144 * \param ctx The AES XTS context to initialize. This must not be \c NULL.
149 * \brief This function releases and clears the specified AES XTS context.
151 * \param ctx The AES XTS context to clear.
196 * \brief This function prepares an XTS context for encryption and
199 * \param ctx The AES XTS context to which the key should be bound.
201 * \param key The encryption key. This is comprised of the XTS key1
202 * concatenated with the XTS key2.
[all …]
/OK3568_Linux_fs/external/xserver/.gitlab-ci/
H A DDockerfile26 git clone https://gitlab.freedesktop.org/xorg/test/xts && \
27 cd xts && ./autogen.sh && xvfb-run make -j$(nproc) && \
28 cd .. && rm -rf piglit/.git xts/.git && \
29 echo '[xts]' > piglit/piglit.conf && echo 'path=/root/xts' >> piglit/piglit.conf && \
/OK3568_Linux_fs/kernel/tools/crypto/
H A Dgen_fips140_testvecs.py30 aes_xts_key = bytes('This is an AES-128-XTS key.\0\0\0\0\0', 'ascii')
95 # Unfortunately, pycryptodome doesn't support XTS, so for it we need to use
98 xts = cryptography.hazmat.primitives.ciphers.Cipher(
100 cryptography.hazmat.primitives.ciphers.modes.XTS(aes_iv)).encryptor()
101 ciphertext = xts.update(message) + xts.finalize()
/OK3568_Linux_fs/kernel/arch/x86/crypto/
H A Dserpent_avx2_glue.c15 #include <crypto/xts.h>
77 .fn_u = { .xts = serpent_xts_enc_16way }
80 .fn_u = { .xts = serpent_xts_enc_8way_avx }
83 .fn_u = { .xts = serpent_xts_enc }
125 .fn_u = { .xts = serpent_xts_dec_16way }
128 .fn_u = { .xts = serpent_xts_dec_8way_avx }
131 .fn_u = { .xts = serpent_xts_dec }
H A Dcamellia_aesni_avx2_glue.c12 #include <crypto/xts.h>
78 .fn_u = { .xts = camellia_xts_enc_32way }
81 .fn_u = { .xts = camellia_xts_enc_16way }
84 .fn_u = { .xts = camellia_xts_enc }
132 .fn_u = { .xts = camellia_xts_dec_32way }
135 .fn_u = { .xts = camellia_xts_dec_16way }
138 .fn_u = { .xts = camellia_xts_dec }
H A Dcast6_avx_glue.c18 #include <crypto/xts.h>
96 .fn_u = { .xts = cast6_xts_enc_8way }
99 .fn_u = { .xts = cast6_xts_enc }
135 .fn_u = { .xts = cast6_xts_dec_8way }
138 .fn_u = { .xts = cast6_xts_dec }
182 /* first half of xts-key is for crypt */ in xts_cast6_setkey()
187 /* second half of xts-key is for tweak */ in xts_cast6_setkey()
H A Dcamellia_aesni_avx_glue.c12 #include <crypto/xts.h>
92 .fn_u = { .xts = camellia_xts_enc_16way }
95 .fn_u = { .xts = camellia_xts_enc }
137 .fn_u = { .xts = camellia_xts_dec_16way }
140 .fn_u = { .xts = camellia_xts_dec }
185 /* first half of xts-key is for crypt */ in xts_camellia_setkey()
190 /* second half of xts-key is for tweak */ in xts_camellia_setkey()
H A Dtwofish_avx_glue.c18 #include <crypto/xts.h>
73 /* first half of xts-key is for crypt */ in xts_twofish_setkey()
78 /* second half of xts-key is for tweak */ in xts_twofish_setkey()
120 .fn_u = { .xts = twofish_xts_enc_8way }
123 .fn_u = { .xts = twofish_xts_enc }
165 .fn_u = { .xts = twofish_xts_dec_8way }
168 .fn_u = { .xts = twofish_xts_dec }
H A Dserpent_avx_glue.c18 #include <crypto/xts.h>
89 /* first half of xts-key is for crypt */ in xts_serpent_setkey()
94 /* second half of xts-key is for tweak */ in xts_serpent_setkey()
131 .fn_u = { .xts = serpent_xts_enc_8way_avx }
134 .fn_u = { .xts = serpent_xts_enc }
170 .fn_u = { .xts = serpent_xts_dec_8way_avx }
173 .fn_u = { .xts = serpent_xts_dec }
/OK3568_Linux_fs/kernel/drivers/crypto/vmx/
H A Daes_xts.c3 * AES XTS routines supporting VMX In-core instructions on Power 8
15 #include <crypto/xts.h>
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init()
147 .base.cra_name = "xts(aes)",
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/
H A Dcryptsetup_2.4.3.bb39 luks-adjust-xts-keysize \
65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt…
102 kernel-module-xts \
/OK3568_Linux_fs/kernel/Documentation/crypto/
H A Dapi-samples.rst7 This code encrypts some data with AES-256-XTS. For sake of example,
21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */
22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */
33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0);
35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
/OK3568_Linux_fs/kernel/arch/powerpc/crypto/
H A Daes-spe-regs.h14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */
15 #define rKT r9 /* pointer to tweak key (XTS mode) */
34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
/OK3568_Linux_fs/kernel/arch/arm/crypto/
H A DKconfig110 CTR and XTS modes
113 and for XTS mode encryption, CBC and XTS mode decryption speedup is
125 Use an implementation of AES in CBC, CTR and XTS modes that uses
/OK3568_Linux_fs/kernel/include/linux/
H A Dccp.h192 /***** XTS-AES engine *****/
194 * ccp_xts_aes_unit_size - XTS unit size
212 * struct ccp_xts_aes_engine - CCP XTS AES operation
214 * @unit_size: unit size of the XTS operation
215 * @key: key to be used for this XTS AES operation
217 * @iv: IV to be used for this XTS AES operation
222 * @final: indicates final XTS operation
594 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation
652 struct ccp_xts_aes_engine xts; member
/OK3568_Linux_fs/kernel/crypto/
H A Dxts.c2 /* XTS: as defined in IEEE1619/D16
20 #include <crypto/xts.h>
387 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create()
411 "xts(%s)", ctx->name) >= CRYPTO_MAX_ALG_NAME) { in xts_create()
447 .name = "xts",
466 MODULE_DESCRIPTION("XTS block cipher mode");
467 MODULE_ALIAS_CRYPTO("xts");
H A Dtcrypt.c1718 ret += tcrypt_test("xts(twofish)"); in do_test()
1726 ret += tcrypt_test("xts(serpent)"); in do_test()
1733 ret += tcrypt_test("xts(aes)"); in do_test()
1763 ret += tcrypt_test("xts(cast6)"); in do_test()
1836 ret += tcrypt_test("xts(camellia)"); in do_test()
2066 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test()
2068 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test()
2122 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test()
2124 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test()
2171 test_cipher_speed("xts(camellia)", ENCRYPT, sec, NULL, 0, in do_test()
[all …]
/OK3568_Linux_fs/kernel/arch/arm64/crypto/
H A DKconfig88 tristate "AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions"
94 tristate "AES in ECB/CBC/CTR/XTS modes using NEON instructions"
118 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst26 aes-xts-plain64
27 serpent-xts-plain64
41 capi:xts(aes)-plain64
46 capi:authenc(hmac(sha256),xts(aes))-random
/OK3568_Linux_fs/kernel/drivers/crypto/rockchip/
H A Drk_crypto_v2_skcipher.c159 /* crypto v2 not support xts with AES-192 */ in is_force_fallback()
249 /* XTS data should >= chunksize */ in rk_cipher_crypt()
257 /* XTS can't pause when use hardware crypto */ in rk_cipher_crypt()
273 /* The key length of XTS is twice the normal length */ in rk_cipher_crypt()
623 RK_CIPHER_ALGO_XTS_INIT(SM4, xts(sm4), xts-sm4-rk);
644 RK_CIPHER_ALGO_XTS_INIT(AES, xts(aes), xts-aes-rk);

12345678