diff mbox series

[2/2] fscrypt: document the LEA support

Message ID 20230630064811.22569-3-ebiggers@kernel.org (mailing list archive)
State New
Headers show
Series fscrypt: update the encryption mode docs | expand

Commit Message

Eric Biggers June 30, 2023, 6:48 a.m. UTC
From: Eric Biggers <ebiggers@google.com>

Document the LEA encryption support in fscrypt.rst.

Signed-off-by: Eric Biggers <ebiggers@google.com>
---
 Documentation/filesystems/fscrypt.rst | 2 ++
 1 file changed, 2 insertions(+)
diff mbox series

Patch

diff --git a/Documentation/filesystems/fscrypt.rst b/Documentation/filesystems/fscrypt.rst
index a624e92f2687f..84fbda668191e 100644
--- a/Documentation/filesystems/fscrypt.rst
+++ b/Documentation/filesystems/fscrypt.rst
@@ -343,6 +343,7 @@  Currently, the following pairs of encryption modes are supported:
 - Adiantum for both contents and filenames
 - AES-128-CBC-ESSIV for contents and AES-128-CTS-CBC for filenames
 - SM4-XTS for contents and SM4-CTS-CBC for filenames
+- LEA-256-XTS for contents and LEA-256-CTS-CBC for filenames
 
 Authenticated encryption modes are not currently supported because of
 the difficulty of dealing with ciphertext expansion.  Therefore,
@@ -382,6 +383,7 @@  accelerator such as CAAM or CESA that does not support XTS.
 The remaining mode pairs are the "national pride ciphers":
 
 - (SM4-XTS, SM4-CTS-CBC)
+- (LEA-256-XTS, LEA-256-CTS-CBC)
 
 Generally speaking, these ciphers aren't "bad" per se, but they
 receive limited security review compared to the usual choices such as