diff options
author | Rik Snel <rsnel@cube.dyndns.org> | 2007-09-19 08:23:13 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-10-10 19:55:45 -0400 |
commit | f19f5111c94053ba4931892f5c01c806de33942e (patch) | |
tree | b40dfae8fa170ebdc92fdcfeb3000c84d6203645 /include/crypto/gf128mul.h | |
parent | 5aaff0c8f7dd3515c9f1ca57f86463f30779acc7 (diff) |
[CRYPTO] xts: XTS blockcipher mode implementation without partial blocks
XTS currently considered to be the successor of the LRW mode by the IEEE1619
workgroup. LRW was discarded, because it was not secure if the encyption key
itself is encrypted with LRW.
XTS does not have this problem. The implementation is pretty straightforward,
a new function was added to gf128mul to handle GF(128) elements in ble format.
Four testvectors from the specification
http://grouper.ieee.org/groups/1619/email/pdf00086.pdf
were added, and they verify on my system.
Signed-off-by: Rik Snel <rsnel@cube.dyndns.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'include/crypto/gf128mul.h')
-rw-r--r-- | include/crypto/gf128mul.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/include/crypto/gf128mul.h b/include/crypto/gf128mul.h index 4fd315202442..4086b8ebfafe 100644 --- a/include/crypto/gf128mul.h +++ b/include/crypto/gf128mul.h | |||
@@ -161,6 +161,8 @@ void gf128mul_lle(be128 *a, const be128 *b); | |||
161 | 161 | ||
162 | void gf128mul_bbe(be128 *a, const be128 *b); | 162 | void gf128mul_bbe(be128 *a, const be128 *b); |
163 | 163 | ||
164 | /* multiply by x in ble format, needed by XTS */ | ||
165 | void gf128mul_x_ble(be128 *a, const be128 *b); | ||
164 | 166 | ||
165 | /* 4k table optimization */ | 167 | /* 4k table optimization */ |
166 | 168 | ||