/openbmc/qemu/tests/qemu-iotests/ |
H A D | 149.out | 1 # ================= dm-crypt aes-256-xts-plain64-sha1 ================= 3 truncate TEST_DIR/luks-aes-256-xts-plain64-sha1.img --size 4194304MB 5 …type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key-file - --iter-ti… 7 sudo cryptsetup -q -v luksOpen TEST_DIR/luks-aes-256-xts-plain64-sha1.img qiotest-145-aes-256-xts-p… 9 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 10 … 100M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 15 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 16 …5728M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 21 sudo cryptsetup -q -v luksClose qiotest-145-aes-256-xts-plain64-sha1 23 …4 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/luks-aes-256-xts-plain64-sha1.img [all …]
|
H A D | 149 | 163 if config.mode == "xts": 427 LUKSConfig("aes-256-xts-plain64-sha1", 428 "aes", 256, "xts", "plain64", None, "sha1"), 432 LUKSConfig("twofish-256-xts-plain64-sha1", 433 "twofish", 256, "xts", "plain64", None, "sha1"), 434 LUKSConfig("serpent-256-xts-plain64-sha1", 435 "serpent", 256, "xts", "plain64", None, "sha1"), 436 # Should really be xts, but kernel doesn't support xts+cast5 440 LUKSConfig("cast6-256-xts-plain64-sha1", 441 "cast6", 256, "xts", "plain64", None, "sha1"), [all …]
|
/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-xts.c | 3 * AMD Cryptographic Coprocessor (CCP) AES XTS crypto API support 16 #include <crypto/xts.h> 29 .name = "xts(aes)", 30 .drv_name = "xts-aes-ccp", 170 rctx->cmd.u.xts.type = CCP_AES_TYPE_128; in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 173 rctx->cmd.u.xts.unit_size = unit_size; in ccp_aes_xts_crypt() 174 rctx->cmd.u.xts.key = &ctx->u.aes.key_sg; in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() 176 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt() [all …]
|
H A D | ccp-ops.c | 1095 struct ccp_xts_aes_engine *xts = &cmd->u.xts; in ccp_run_xts_aes_cmd() local 1105 switch (xts->unit_size) { in ccp_run_xts_aes_cmd() 1126 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1128 else if (xts->key_len == AES_KEYSIZE_256) in ccp_run_xts_aes_cmd() 1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) in ccp_run_xts_aes_cmd() 1136 if (xts->iv_len != AES_BLOCK_SIZE) in ccp_run_xts_aes_cmd() 1139 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1152 op.u.xts.type = aestype; in ccp_run_xts_aes_cmd() 1153 op.u.xts.action = xts->action; in ccp_run_xts_aes_cmd() 1154 op.u.xts.unit_size = xts->unit_size; in ccp_run_xts_aes_cmd() [all …]
|
/openbmc/linux/arch/arm64/crypto/ |
H A D | Kconfig | 132 tristate "Ciphers: AES, modes: ECB, CBC, CTR, CTS, XCTR, XTS" 137 XCTR, and XTS modes 155 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (ARMv8 Crypto Extensions)" 165 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 172 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (NEON)" 182 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 202 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XCTR/XTS modes (bit-sliced NEON)" 214 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 234 tristate "Ciphers: SM4, modes: ECB/CBC/CFB/CTR/XTS (ARMv8 Crypto Extensions)" 245 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/openbmc/linux/arch/arm/crypto/ |
H A D | Kconfig | 167 tristate "Ciphers: AES, modes: ECB/CBC/CTR/XTS (bit-sliced NEON)" 180 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 184 and for XTS mode encryption, CBC and XTS mode decryption speedup is 190 tristate "Ciphers: AES, modes: ECB/CBC/CTS/CTR/XTS (ARMv8 Crypto Extensions)" 202 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
/openbmc/linux/drivers/crypto/vmx/ |
H A D | aes_xts.c | 3 * AES XTS routines supporting VMX In-core instructions on Power 8 15 #include <crypto/xts.h> 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init() 35 pr_err("Failed to allocate xts(aes) fallback: %ld\n", in p8_aes_xts_init() 147 .base.cra_name = "xts(aes)",
|
/openbmc/linux/tools/testing/selftests/ptp/ |
H A D | testptp.c | 164 struct ptp_sys_offset_precise *xts; in main() local 585 xts = calloc(1, sizeof(*xts)); in main() 586 if (!xts) { in main() 591 if (ioctl(fd, PTP_SYS_OFFSET_PRECISE, xts)) { in main() 597 xts->device.sec, xts->device.nsec); in main() 599 xts->sys_realtime.sec, xts->sys_realtime.nsec); in main() 601 xts->sys_monoraw.sec, xts->sys_monoraw.nsec); in main() 604 free(xts); in main()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/ |
H A D | cryptsetup_2.7.5.bb | 39 luks-adjust-xts-keysize \ 65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt… 114 kernel-module-xts \
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | aes-spe-regs.h | 14 #define rIP r8 /* potiner to IV (CBC/CTR/XTS modes) */ 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
H A D | aes-spe-glue.c | 21 #include <crypto/xts.h> 30 * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per 474 .base.cra_name = "xts(aes)", 475 .base.cra_driver_name = "xts-ppc-spe", 515 MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized"); 521 MODULE_ALIAS_CRYPTO("xts(aes)");
|
/openbmc/linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
H A D | pai_crypto.json | 97 "BriefDescription": "KM XTS AES 128", 98 "PublicDescription": "KM-XTS-AES-128 function ending with CC=0" 104 "BriefDescription": "KM XTS AES 256", 105 "PublicDescription": "KM-XTS-AES-256 function ending with CC=0" 111 "BriefDescription": "KM XTS ENCRYPTED AES 128", 112 "PublicDescription": "KM-XTS-Encrypted-AES-128 function ending with CC=0" 118 "BriefDescription": "KM XTS ENCRYPTED AES 256", 119 "PublicDescription": "KM-XTS-Encrypted-AES-256 function ending with CC=0" 811 "BriefDescription": "PCC COMPUTE XTS PARAMETER USING AES 128", 812 "PublicDescription": "PCC-Compute-XTS-Parameter-Using-AES-128 function ending with CC=0" [all …]
|
/openbmc/linux/Documentation/crypto/ |
H A D | api-samples.rst | 7 This code encrypts some data with AES-256-XTS. For sake of example, 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
/openbmc/linux/arch/s390/crypto/ |
H A D | Kconfig | 84 tristate "Ciphers: AES, modes: ECB, CBC, CTR, XTS, GCM" 91 Length-preserving ciphers: AES with ECB, CBC, XTS, and CTR modes 102 key sizes and XTS mode is hardware accelerated for 256 and
|
/openbmc/qemu/target/s390x/ |
H A D | cpu_features_def.h.inc | 232 DEF_FEAT(KM_XTS_AES_128, "km-xts-aes-128", KM, 50, "KM XTS-AES-128") 233 DEF_FEAT(KM_XTS_AES_256, "km-xts-aes-256", KM, 52, "KM XTS-AES-256") 234 DEF_FEAT(KM_XTS_EAES_128, "km-xts-eaes-128", KM, 58, "KM XTS-Encrypted-AES-128") 235 DEF_FEAT(KM_XTS_EAES_256, "km-xts-eaes-256", KM, 60, "KM XTS-Encrypted-AES-256") 328 DEF_FEAT(PCC_XTS_AES_128, "pcc-xts-aes-128", PCC, 50, "PCC Compute-XTS-Parameter-Using-AES-128") 329 DEF_FEAT(PCC_XTS_AES_256, "pcc-xts-aes-256", PCC, 52, "PCC Compute-XTS-Parameter-Using-AES-256") 330 DEF_FEAT(PCC_XTS_EAES_128, "pcc-xts-eaes-128", PCC, 58, "PCC Compute-XTS-Parameter-Using-Encrypted-… 331 DEF_FEAT(PCC_XTS_EAES_256, "pcc-xts-eaes-256", PCC, 60, "PCC Compute-XTS-Parameter-Using-Encrypted-…
|
/openbmc/linux/crypto/ |
H A D | tcrypt.c | 1509 ret = min(ret, tcrypt_test("xts(twofish)")); in do_test() 1517 ret = min(ret, tcrypt_test("xts(serpent)")); in do_test() 1524 ret = min(ret, tcrypt_test("xts(aes)")); in do_test() 1555 ret = min(ret, tcrypt_test("xts(cast6)")); in do_test() 1612 ret = min(ret, tcrypt_test("xts(camellia)")); in do_test() 1850 ret = min(ret, tcrypt_test("xts(sm4)")); in do_test() 1871 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1873 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1927 test_cipher_speed("xts(twofish)", ENCRYPT, sec, NULL, 0, in do_test() 1929 test_cipher_speed("xts(twofish)", DECRYPT, sec, NULL, 0, in do_test() [all …]
|
H A D | xts.c | 2 /* XTS: as defined in IEEE1619/D16 20 #include <crypto/xts.h> 389 err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", in xts_create() 413 "xts(%s)", name) >= CRYPTO_MAX_ALG_NAME) { in xts_create() 454 .name = "xts", 473 MODULE_DESCRIPTION("XTS block cipher mode"); 474 MODULE_ALIAS_CRYPTO("xts");
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-block.c | 441 return "XTS cipher key length should be a multiple of 2"; in luks_bad_cipher_xts_size() 468 memcpy(hdr->cipher_mode, "xts:plain64", 12); in luks_bad_ivgen_separator() 470 return "Unexpected cipher mode string format 'xts:plain64'"; in luks_bad_ivgen_separator() 475 memcpy(hdr->cipher_mode, "xts-", 5); in luks_bad_ivgen_name_empty() 482 memcpy(hdr->cipher_mode, "xts-plain65", 12); in luks_bad_ivgen_name_unknown() 489 memcpy(hdr->cipher_mode, "xts-plain65:", 13); in luks_bad_ivgen_hash_empty() 496 memcpy(hdr->cipher_mode, "xts-plain65:sha257", 19); in luks_bad_ivgen_hash_unknown() 602 g_test_add_data_func("/crypto/block/luks/bad/cipher-xts-size", in main()
|
H A D | test-crypto-cipher.c | 400 .path = "/crypto/cipher/aes-xts-128-1", 417 .path = "/crypto/cipher/aes-xts-128-2", 433 /* #5 from xts.7, 32 byte key, 32 byte PTX */ 434 .path = "/crypto/cipher/aes-xts-128-3", 451 .path = "/crypto/cipher/aes-xts-128-4", 528 * which is incompatible with XTS 530 .path = "/crypto/cipher/cast5-xts-128",
|
H A D | test-crypto-xts.c | 2 * QEMU Crypto XTS cipher mode 20 * LibTomCrypt crytographic library http://libtom.org. The XTS code 28 #include "crypto/xts.h" 44 "/crypto/xts/t-1-key-32-ptx-32", 64 "/crypto/xts/t-2-key-32-ptx-32", 82 /* #5 from xts.7, 32 byte key, 32 byte PTX */ 84 "/crypto/xts/t-5-key-32-ptx-32", 104 "/crypto/xts/t-4-key-32-ptx-512", 248 "/crypto/xts/t-7-key-32-ptx-17", 264 "/crypto/xts/t-15-key-32-ptx-25", [all …]
|
/openbmc/linux/include/linux/ |
H A D | ccp.h | 193 /***** XTS-AES engine *****/ 195 * ccp_xts_aes_unit_size - XTS unit size 213 * struct ccp_xts_aes_engine - CCP XTS AES operation 215 * @unit_size: unit size of the XTS operation 216 * @key: key to be used for this XTS AES operation 218 * @iv: IV to be used for this XTS AES operation 223 * @final: indicates final XTS operation 595 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 653 struct ccp_xts_aes_engine xts; member
|
/openbmc/linux/Documentation/admin-guide/device-mapper/ |
H A D | dm-crypt.rst | 26 aes-xts-plain64 27 serpent-xts-plain64 41 capi:xts(aes)-plain64 46 capi:authenc(hmac(sha256),xts(aes))-random
|
/openbmc/linux/Documentation/devicetree/bindings/crypto/ |
H A D | samsung-slimsss.yaml | 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS
|
/openbmc/qemu/crypto/ |
H A D | meson.build | 36 if xts == 'private' variable 37 crypto_ss.add(files('xts.c'))
|
/openbmc/qemu/include/crypto/ |
H A D | xts.h | 2 * QEMU Crypto XTS cipher mode 20 * LibTomCrypt crytographic library http://libtom.org. The XTS code
|