• Home
  • Raw
  • Download

Lines Matching full:api

1 Kernel Crypto API Architecture
7 The kernel crypto API provides different API calls for the following
23 The kernel crypto API provides implementations of single block ciphers
24 and message digests. In addition, the kernel crypto API provides
60 The kernel crypto API provides synchronous and asynchronous API
63 When using the synchronous API operation, the caller invokes a cipher
64 operation which is performed synchronously by the kernel crypto API.
66 Therefore, the kernel crypto API calls work like regular function calls.
67 For synchronous operation, the set of API calls is small and
70 Asynchronous operation is provided by the kernel crypto API which
74 must provide a callback function the kernel crypto API can invoke to
77 appropriate locking around its data. The kernel crypto API does not
81 Crypto API Cipher References And Priority
101 The kernel crypto API may provide multiple implementations of a template
104 straight C. Now, when using the string "aes" with the kernel crypto API,
107 crypto API. When a caller uses the string to refer to a cipher during
108 initialization of a cipher handle, the kernel crypto API looks up all
114 selection. To accommodate this scenario, the kernel crypto API allows
127 allocation API calls (all names listed above are examples for such
131 cipher allocation API calls
194 with the length of the provided key. Thus, the kernel crypto API does
251 limits the search the kernel crypto API can perform for a suitable
254 the kernel crypto API may not select it due to the used type and mask
257 Internal Structure of Kernel Crypto API
260 The kernel crypto API has an internal structure where a cipher
262 help to clarify how the kernel crypto API uses various components to
272 The following ASCII art decomposes the kernel crypto API layers when
283 complete logic of the kernel crypto API.
287 kernel crypto API cannot be decomposed into layers any more. In case of
290 with the kernel crypto API. In this case, the concept described by the
292 the individual sub-components by the kernel crypto API is not done any
296 obtained from the kernel crypto API. Each block is accessed by the
297 caller or by other blocks using the API functions defined by the kernel
298 crypto API for the cipher implementation type.
305 uses the API applicable to the cipher type specified for the block.
310 kernel crypto API | IPSEC Layer
354 2. Now, SEQIV uses the AEAD API function calls to invoke the associated
367 3. The GCM AEAD cipher type implementation now invokes the SKCIPHER API
378 4. The SKCIPHER of CTR(AES) now invokes the CIPHER API with the AES
382 implementation via the AHASH API.
411 kernel crypto API | Caller
430 1. The AHASH API functions are invoked by the caller. The HMAC
440 2. The HMAC instance now invokes the SHASH API with the SHA256 cipher