Home
last modified time | relevance | path

Searched full:xts (Results 1 – 25 of 127) sorted by relevance

123456

/openbmc/qemu/tests/qemu-iotests/
H A D149.out1 # ================= dm-crypt aes-256-xts-plain64-sha1 =================
3 truncate TEST_DIR/luks-aes-256-xts-plain64-sha1.img --size 4194304MB
5 …type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key-file - --iter-ti…
7 sudo cryptsetup -q -v luksOpen TEST_DIR/luks-aes-256-xts-plain64-sha1.img qiotest-145-aes-256-xts-p…
9 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
10 … 100M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
15 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
16 …5728M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
21 sudo cryptsetup -q -v luksClose qiotest-145-aes-256-xts-plain64-sha1
23 …4 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/luks-aes-256-xts-plain64-sha1.img
[all …]
H A D149163 if config.mode == "xts":
427 LUKSConfig("aes-256-xts-plain64-sha1",
428 "aes", 256, "xts", "plain64", None, "sha1"),
432 LUKSConfig("twofish-256-xts-plain64-sha1",
433 "twofish", 256, "xts", "plain64", None, "sha1"),
434 LUKSConfig("serpent-256-xts-plain64-sha1",
435 "serpent", 256, "xts", "plain64", None, "sha1"),
436 # Should really be xts, but kernel doesn't support xts+cast5
440 LUKSConfig("cast6-256-xts-plain64-sha1",
441 "cast6", 256, "xts", "plain64", None, "sha1"),
[all …]
/openbmc/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes-xts.c3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support
16 #include <crypto/xts.h>
29 .name = "xts(aes)",
30 .drv_name = "xts-aes-ccp",
170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt()
171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt()
173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt()
174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt()
175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt()
176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt()
[all …]
H A Dccp-ops.c1095 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local
1105 switch (xts->unit_size) { in ccp_run_xts_aes_cmd()
1126 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd()
1128 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd()
1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd()
1136 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd()
1139 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd()
1152 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd()
1153 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd()
1154 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd()
[all …]
/openbmc/linux/arch/arm64/crypto/
H A DKconfig132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS"
137 XCTR, and XTS modes
155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)"
165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)"
182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)"
214 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
234 tristate "Ciphers: SM4, modes: ECB/CBC/CFB/CTR/XTS (ARMv8 Crypto Extensions)"
245 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/openbmc/linux/arch/arm/crypto/
H A DKconfig167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)"
180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
184 and for XTS mode encryption, CBC and XTS mode decryption speedup is
190 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)"
202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/openbmc/linux/drivers/crypto/vmx/
H A Daes_xts.c3 * AES XTS routines supporting VMX In-core instructions on Power 8
15 #include <crypto/xts.h>
31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init()
147 .base.cra_name = "xts(aes)",
/openbmc/linux/tools/testing/selftests/ptp/
H A Dtestptp.c164 struct ptp_sys_offset_precise *xts; in main() local
585 xts = calloc(1, sizeof(*xts)); in main()
586 if (!xts) { in main()
591 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main()
597 xts->device.sec, xts->device.nsec); in main()
599 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main()
601 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main()
604 free(xts); in main()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/
H A Dcryptsetup_2.7.5.bb39 luks-adjust-xts-keysize \
65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt…
114 kernel-module-xts \
/openbmc/linux/arch/powerpc/crypto/
H A Daes-spe-regs.h14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */
15 #define rKT r9 /* pointer to tweak key (XTS mode) */
34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
H A Daes-spe-glue.c21 #include <crypto/xts.h>
30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per
474 .base.cra_name = "xts(aes)",
475 .base.cra_driver_name = "xts-ppc-spe",
515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized");
521 MODULE_ALIAS_CRYPTO("xts(aes)");
/openbmc/linux/tools/perf/pmu-events/arch/s390/cf_z16/
H A Dpai_crypto.json97 "BriefDescription": "KM XTS AES 128",
98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0"
104 "BriefDescription": "KM XTS AES 256",
105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0"
111 "BriefDescription": "KM XTS ENCRYPTED AES 128",
112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0"
118 "BriefDescription": "KM XTS ENCRYPTED AES 256",
119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0"
811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128",
812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0"
[all …]
/openbmc/linux/Documentation/crypto/
H A Dapi-samples.rst7 This code encrypts some data with AES-256-XTS. For sake of example,
21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */
22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */
33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0);
35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
/openbmc/linux/arch/s390/crypto/
H A DKconfig84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM"
91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes
102 key sizes and XTS mode is hardware accelerated for 256 and
/openbmc/qemu/target/s390x/
H A Dcpu_features_def.h.inc232 DEF_FEAT(KM_XTS_AES_128, "km-xts-aes-128", KM, 50, "KM XTS-AES-128")
233 DEF_FEAT(KM_XTS_AES_256, "km-xts-aes-256", KM, 52, "KM XTS-AES-256")
234 DEF_FEAT(KM_XTS_EAES_128, "km-xts-eaes-128", KM, 58, "KM XTS-Encrypted-AES-128")
235 DEF_FEAT(KM_XTS_EAES_256, "km-xts-eaes-256", KM, 60, "KM XTS-Encrypted-AES-256")
328 DEF_FEAT(PCC_XTS_AES_128, "pcc-xts-aes-128", PCC, 50, "PCC Compute-XTS-Parameter-Using-AES-128")
329 DEF_FEAT(PCC_XTS_AES_256, "pcc-xts-aes-256", PCC, 52, "PCC Compute-XTS-Parameter-Using-AES-256")
330 DEF_FEAT(PCC_XTS_EAES_128, "pcc-xts-eaes-128", PCC, 58, "PCC Compute-XTS-Parameter-Using-Encrypted-…
331 DEF_FEAT(PCC_XTS_EAES_256, "pcc-xts-eaes-256", PCC, 60, "PCC Compute-XTS-Parameter-Using-Encrypted-…
/openbmc/linux/crypto/
H A Dtcrypt.c1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test()
1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test()
1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test()
1555 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test()
1612 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test()
1850 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test()
1871 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1873 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test()
1927 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test()
1929 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test()
[all …]
H A Dxts.c2 /* XTS: as defined in IEEE1619/D16
20 #include <crypto/xts.h>
389 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create()
413 "xts(%s)", name) >= CRYPTO_MAX_ALG_NAME) { in xts_create()
454 .name = "xts",
473 MODULE_DESCRIPTION("XTS block cipher mode");
474 MODULE_ALIAS_CRYPTO("xts");
/openbmc/qemu/tests/unit/
H A Dtest-crypto-block.c441 return "XTS cipher key length should be a multiple of 2"; in luks_bad_cipher_xts_size()
468 memcpy(hdr->cipher_mode, "xts:plain64", 12); in luks_bad_ivgen_separator()
470 return "Unexpected cipher mode string format 'xts:plain64'"; in luks_bad_ivgen_separator()
475 memcpy(hdr->cipher_mode, "xts-", 5); in luks_bad_ivgen_name_empty()
482 memcpy(hdr->cipher_mode, "xts-plain65", 12); in luks_bad_ivgen_name_unknown()
489 memcpy(hdr->cipher_mode, "xts-plain65:", 13); in luks_bad_ivgen_hash_empty()
496 memcpy(hdr->cipher_mode, "xts-plain65:sha257", 19); in luks_bad_ivgen_hash_unknown()
602 g_test_add_data_func("/crypto/block/luks/bad/cipher-xts-size", in main()
H A Dtest-crypto-cipher.c400 .path = "/crypto/cipher/aes-xts-128-1",
417 .path = "/crypto/cipher/aes-xts-128-2",
433 /* #5 from xts.7, 32 byte key, 32 byte PTX */
434 .path = "/crypto/cipher/aes-xts-128-3",
451 .path = "/crypto/cipher/aes-xts-128-4",
528 * which is incompatible with XTS
530 .path = "/crypto/cipher/cast5-xts-128",
H A Dtest-crypto-xts.c2 * QEMU Crypto XTS cipher mode
20 * LibTomCrypt crytographic library http://libtom.org. The XTS code
28 #include "crypto/xts.h"
44 "/crypto/xts/t-1-key-32-ptx-32",
64 "/crypto/xts/t-2-key-32-ptx-32",
82 /* #5 from xts.7, 32 byte key, 32 byte PTX */
84 "/crypto/xts/t-5-key-32-ptx-32",
104 "/crypto/xts/t-4-key-32-ptx-512",
248 "/crypto/xts/t-7-key-32-ptx-17",
264 "/crypto/xts/t-15-key-32-ptx-25",
[all …]
/openbmc/linux/include/linux/
H A Dccp.h193 /***** XTS-AES engine *****/
195 * ccp_xts_aes_unit_size - XTS unit size
213 * struct ccp_xts_aes_engine - CCP XTS AES operation
215 * @unit_size: unit size of the XTS operation
216 * @key: key to be used for this XTS AES operation
218 * @iv: IV to be used for this XTS AES operation
223 * @final: indicates final XTS operation
595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation
653 struct ccp_xts_aes_engine xts; member
/openbmc/linux/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst26 aes-xts-plain64
27 serpent-xts-plain64
41 capi:xts(aes)-plain64
46 capi:authenc(hmac(sha256),xts(aes))-random
/openbmc/linux/Documentation/devicetree/bindings/crypto/
H A Dsamsung-slimsss.yaml15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
/openbmc/qemu/crypto/
H A Dmeson.build36 if xts == 'private' variable
37 crypto_ss.add(files('xts.c'))
/openbmc/qemu/include/crypto/
H A Dxts.h2 * QEMU Crypto XTS cipher mode
20 * LibTomCrypt crytographic library http://libtom.org. The XTS code

123456