Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp2038489rdd; Thu, 11 Jan 2024 18:30:52 -0800 (PST) X-Google-Smtp-Source: AGHT+IFHcMoZ2TieqSTPsu8e8B89FQnesHo3bcGSoHFVKvOHbmDela8BqoYYT73lXJN1a4+un/OW X-Received: by 2002:a17:906:360a:b0:a2c:55f1:ca14 with SMTP id q10-20020a170906360a00b00a2c55f1ca14mr218392ejb.119.1705026652126; Thu, 11 Jan 2024 18:30:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705026652; cv=none; d=google.com; s=arc-20160816; b=gooNp4hDFtBVrjsuzQbEWqm30KuAkLnpezi2hzMUB+B26VquPFfKKbsKjE3od9mzZr ok7qoIHZDRGCXYPW9iHEwqYzObLC+G9S7E7gtxL09XTrZqLytTWffwonWDiJJ3ueWtB4 foWp/QG69ctBXFHavKpdfWUbaBswTE3rpoiMBpLI4lGCG3zEf1PSKY0qwrLehjj8GqJG /e0ZB7zoI0Dy5ZyP9+aW27O8CXeNCDrnKHlv6AUxEIv97ZzX5uCJYBShWnRQFiDpoyJC PCDoQrKNRKsNd3749KLGO7lOXmBCPMqEdEXlOsDU4uHWy2s6GozBJa9obMVtdztdY4qq tmfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=x8SA3z4v/BGifSQRTOGuXTbQ9Y8PVjlrjoexvVm9QF8=; fh=VPRHTi/3EMJK6yPnyu5HUdlPl0c2xhgGy4WWIUKqW/w=; b=bsln0RjbUU1QsEb6ANJsRhOx0/+yvubKPUgIOV3FOnNThYo5Q7WsaH4/RhQUnNSrvS wS5oNxagbBVMSnRtNOszD+s6JZMIvH4yRP5mCUT/YjrhAoofDaKMkzr/ZVO7285CEAlZ ntTnhc2YiKFyQQRXER+qXjhFvZdRI1lgEIkPii/U4zAfaq35AeAgZJniq6zzAkMyHXJ1 dS51XHg288Hr/0/P5cWMpMLcnXcGDITFYMPbC+N1gGM+JAWfWzooxO4wboELDIKJKS1Z WsogyR9Z/NToXdY2+sa97KalTdptRYaJlcACeEpgk93Wj6W0yYnXqhMO0YqTiMEhV4Qx eYsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto+bounces-1401-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1401-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nsr.re.kr Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id mj16-20020a170906af9000b00a1c5b249545si997640ejb.284.2024.01.11.18.30.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 18:30:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-1401-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto+bounces-1401-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1401-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nsr.re.kr Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id DC5AB1F24F6A for ; Fri, 12 Jan 2024 02:30:51 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7F4F6FBFE; Fri, 12 Jan 2024 02:30:27 +0000 (UTC) X-Original-To: linux-crypto@vger.kernel.org Received: from mail.nsr.re.kr (unknown [210.104.33.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 45AA1D285; Fri, 12 Jan 2024 02:30:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nsr.re.kr Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=nsr.re.kr Received: from 210.104.33.70 (nsr.re.kr) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128 bits)) by mail.nsr.re.kr with SMTP; Fri, 12 Jan 2024 11:30:08 +0900 X-Sender: letrhee@nsr.re.kr Received: from 192.168.155.188 ([192.168.155.188]) by mail.nsr.re.kr (Crinity Message Backbone-7.0.1) with SMTP ID 155; Fri, 12 Jan 2024 11:30:03 +0900 (KST) From: Dongsoo Lee To: Herbert Xu , "David S. Miller" , Jens Axboe , Eric Biggers , "Theodore Y. Ts'o" , Jaegeuk Kim , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" Cc: linux-crypto@vger.kernel.org, linux-block@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-kernel@vger.kernel.org, Dongsoo Lee Subject: [PATCH v6 RESEND 3/5] blk-crypto: Add LEA-256-XTS blk-crypto support Date: Fri, 12 Jan 2024 02:28:57 +0000 Message-Id: <20240112022859.2384-4-letrhee@nsr.re.kr> X-Mailer: git-send-email 2.40.1 In-Reply-To: <20240112022859.2384-1-letrhee@nsr.re.kr> References: <20240112022859.2384-1-letrhee@nsr.re.kr> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Add LEA-256-XTS blk-crypto support LEA is a 128-bit block cipher developed by South Korea. LEA is a Korean national standard (KS X 3246) and included in the ISO/IEC 29192-2:2019 standard (Information security - Lightweight cryptography - Part 2: Block ciphers). Enable the LEA to be used in block inline encryption. This can be used via blk-crypto-fallback, when using the "inlinecrypt" mount option in fscrypt. Signed-off-by: Dongsoo Lee --- block/blk-crypto.c | 6 ++++++ include/linux/blk-crypto.h | 1 + 2 files changed, 7 insertions(+) diff --git a/block/blk-crypto.c b/block/blk-crypto.c index 4d760b092deb..b847706bbc59 100644 --- a/block/blk-crypto.c +++ b/block/blk-crypto.c @@ -43,6 +43,12 @@ const struct blk_crypto_mode blk_crypto_modes[] = { .keysize = 32, .ivsize = 16, }, + [BLK_ENCRYPTION_MODE_LEA_256_XTS] = { + .name = "LEA-256-XTS", + .cipher_str = "xts(lea)", + .keysize = 64, + .ivsize = 16, + }, }; /* diff --git a/include/linux/blk-crypto.h b/include/linux/blk-crypto.h index 5e5822c18ee4..b6bf2a5c58ed 100644 --- a/include/linux/blk-crypto.h +++ b/include/linux/blk-crypto.h @@ -14,6 +14,7 @@ enum blk_crypto_mode_num { BLK_ENCRYPTION_MODE_AES_128_CBC_ESSIV, BLK_ENCRYPTION_MODE_ADIANTUM, BLK_ENCRYPTION_MODE_SM4_XTS, + BLK_ENCRYPTION_MODE_LEA_256_XTS, BLK_ENCRYPTION_MODE_MAX, }; -- 2.40.1