Home
last modified time | relevance | path

Searched full:decryption (Results 1 – 25 of 420) sorted by relevance

12345678910>>...17

/kernel/linux/linux-6.6/arch/powerpc/crypto/
Daes-spe-regs.h8 #define rKS r0 /* copy of en-/decryption key pointer */
11 #define rKP r5 /* pointer to en-/decryption key pointer */
12 #define rRR r6 /* en-/decryption rounds */
16 #define rT0 r11 /* pointers to en-/decryption tables */
/kernel/linux/linux-5.10/arch/powerpc/crypto/
Daes-spe-regs.h8 #define rKS r0 /* copy of en-/decryption key pointer */
11 #define rKP r5 /* pointer to en-/decryption key pointer */
12 #define rRR r6 /* en-/decryption rounds */
16 #define rT0 r11 /* pointers to en-/decryption tables */
/kernel/linux/linux-6.6/tools/testing/crypto/chacha20-s390/
Dtest-cipher.c95 pr_info("lib decryption took: %lld nsec", end - start); in test_lib_chacha()
194 /* Prepare for decryption */ in test_skcipher()
211 pr_info("%s tfm decryption successful, took %lld nsec\n", name, end - start); in test_skcipher()
287 pr_info("generic en/decryption check FAILED\n"); in chacha_s390_test_init()
292 pr_info("generic en/decryption check OK\n"); in chacha_s390_test_init()
302 pr_info("s390 en/decryption check FAILED\n"); in chacha_s390_test_init()
307 pr_info("s390 en/decryption check OK\n"); in chacha_s390_test_init()
324 pr_info("lib en/decryption check FAILED\n"); in chacha_s390_test_init()
329 pr_info("lib en/decryption check OK\n"); in chacha_s390_test_init()
/kernel/linux/linux-5.10/Documentation/networking/
Dtls-offload.rst22 latency on socket reads (decryption only starts when a read syscall
54 On the receive side if the device handled decryption and authentication
59 request, records are retrieved from the socket and passed to decryption routine.
60 If device decrypted all the segments of the record the decryption is skipped,
61 otherwise software path handles decryption.
180 decryption, authentication for each record in the packet). The device leaves
189 and takes care of partial decryption.
284 arrive continue decryption. Finally when 2 arrives it's completely outside
286 handling. ``ktls`` software fallback handles the decryption of record
324 At this point the device is in sync and can resume decryption at next
[all …]
Dtls.rst104 be received before decryption can happen.
121 ``EBADMSG`` is returned if decryption failed for any other reason.
238 record decryption failed (e.g. due to incorrect authentication tag)
/kernel/linux/linux-6.6/Documentation/networking/
Dtls-offload.rst22 latency on socket reads (decryption only starts when a read syscall
54 On the receive side if the device handled decryption and authentication
59 request, records are retrieved from the socket and passed to decryption routine.
60 If device decrypted all the segments of the record the decryption is skipped,
61 otherwise software path handles decryption.
180 decryption, authentication for each record in the packet). The device leaves
189 and takes care of partial decryption.
284 arrive continue decryption. Finally when 2 arrives it's completely outside
286 handling. ``ktls`` software fallback handles the decryption of record
324 At this point the device is in sync and can resume decryption at next
[all …]
/kernel/linux/linux-6.6/drivers/crypto/aspeed/
DKconfig7 throughput of hash data digest, encryption and decryption.
47 Supports AES/DES symmetric-key encryption and decryption
58 Supports 256 bits to 4096 bits RSA encryption/decryption
/kernel/linux/linux-5.10/Documentation/crypto/
Duserspace-if.rst95 to provide different memory pointers for the encryption and decryption
159 should be processed for encryption or decryption. In addition, the IV is
172 - ALG_OP_DECRYPT - decryption of data
218 should be processed for encryption or decryption. In addition, the IV is
231 - ALG_OP_DECRYPT - decryption of data
254 The authenticated decryption operation may indicate an integrity error.
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
286 - AEAD decryption output: plaintext
387 the given size will be generated. For a decryption operation, the
Ddescore-readme.rst5 Fast & Portable DES encryption & decryption
15 des - fast & portable DES encryption & decryption.
41 1. Highest possible encryption/decryption PERFORMANCE.
68 this has the quickest encryption/decryption routines i've seen.
85 encryption/decryption is still slower on the sparc and 68000.
244 or about 32 to 40 instructions per en/decryption.
275 the en/decryption routines each use 6 necessary register variables,
355 en/decryption with the key k. if you use DesMethod,
360 will be set to magic constants which speed up the encryption/decryption
/kernel/linux/linux-6.6/Documentation/crypto/
Duserspace-if.rst95 to provide different memory pointers for the encryption and decryption
159 should be processed for encryption or decryption. In addition, the IV is
172 - ALG_OP_DECRYPT - decryption of data
218 should be processed for encryption or decryption. In addition, the IV is
231 - ALG_OP_DECRYPT - decryption of data
254 The authenticated decryption operation may indicate an integrity error.
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
286 - AEAD decryption output: plaintext
396 the given size will be generated. For a decryption operation, the
Ddescore-readme.rst5 Fast & Portable DES encryption & decryption
15 des - fast & portable DES encryption & decryption.
41 1. Highest possible encryption/decryption PERFORMANCE.
68 this has the quickest encryption/decryption routines i've seen.
85 encryption/decryption is still slower on the sparc and 68000.
244 or about 32 to 40 instructions per en/decryption.
275 the en/decryption routines each use 6 necessary register variables,
355 en/decryption with the key k. if you use DesMethod,
360 will be set to magic constants which speed up the encryption/decryption
/kernel/linux/linux-5.10/include/crypto/
Daead.h34 * encryption or decryption operation. In case of an encryption, the associated
35 * data memory is filled during the encryption operation. For decryption, the
51 * during encryption (resp. decryption).
53 * In-place encryption/decryption is enabled by using the same scatterlist
113 * supplied during the decryption operation. This function is also
254 * data returned by the encryption or decryption operation
357 * decryption operation. Therefore, the function returns this error if
482 * destination is the ciphertext. For a decryption operation, the use is
489 * - AEAD decryption input: assoc data || ciphertext || auth tag
490 * - AEAD decryption output: assoc data || plaintext
/kernel/linux/linux-6.6/include/crypto/
Daead.h36 * decryption operation. Another deviation from the asynchronous block cipher
50 * during encryption (resp. decryption). The authentication tag is generated
52 * decryption, the authentication tag is consumed along with the ciphertext and
55 * In-place encryption/decryption is enabled by using the same scatterlist
132 * supplied during the decryption operation. This function is also
283 * data returned by the encryption or decryption operation
386 * decryption operation. Therefore, the function returns this error if
511 * destination is the ciphertext. For a decryption operation, the use is
518 * - AEAD decryption input: assoc data || ciphertext || auth tag
519 * - AEAD decryption output: assoc data || plaintext
/kernel/linux/linux-5.10/drivers/staging/rtl8712/
Drtl871x_mp.h232 HW_CONTROL, /*hw encryption& decryption*/
233 SW_CONTROL, /*sw encryption& decryption*/
234 HW_ENCRY_SW_DECRY, /*hw encryption & sw decryption*/
235 SW_ENCRY_HW_DECRY /*sw encryption & hw decryption*/
/kernel/linux/linux-6.6/drivers/staging/rtl8712/
Drtl871x_mp.h233 HW_CONTROL, /*hw encryption& decryption*/
234 SW_CONTROL, /*sw encryption& decryption*/
235 HW_ENCRY_SW_DECRY, /*hw encryption & sw decryption*/
236 SW_ENCRY_HW_DECRY /*sw encryption & hw decryption*/
/kernel/linux/linux-6.6/Documentation/block/
Dinline-encryption.rst15 in terms of key, algorithm, data unit size (the granularity of en/decryption),
45 fall back to crypto API en/decryption).
146 handle en/decryption of the bio using blk-crypto-fallback.
155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback
160 kernel crypto API. Decryption happens from a workqueue, as it may sleep.
206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
/kernel/linux/linux-5.10/crypto/
Dkeywrap.c46 * * The input for the decryption is the first semiblock handed in as an
48 * return code of the decryption operation will be EBADMSG in case an
64 * In case of decryption, ciphertext now already has the expected length
76 * ==> After decryption (which hopefully does not return EBADMSG), the ct
Dtwofish_generic.c36 /* Macros to compute the g() function in the encryption and decryption
48 /* Encryption and decryption Feistel rounds. Each one calls the two g()
68 /* Encryption and decryption cycles; each one is simply two Feistel rounds
/kernel/linux/linux-6.6/crypto/
Dkeywrap.c46 * * The input for the decryption is the first semiblock handed in as an
48 * return code of the decryption operation will be EBADMSG in case an
64 * In case of decryption, ciphertext now already has the expected length
76 * ==> After decryption (which hopefully does not return EBADMSG), the ct
Dtwofish_generic.c36 /* Macros to compute the g() function in the encryption and decryption
48 /* Encryption and decryption Feistel rounds. Each one calls the two g()
68 /* Encryption and decryption cycles; each one is simply two Feistel rounds
/kernel/linux/linux-5.10/drivers/net/wireless/ath/ath9k/
Dcommon-debug.h27 decryption process completed
33 * @decrypt_busy_err: Decryption interruptions counter
/kernel/linux/linux-6.6/drivers/net/wireless/ath/ath9k/
Dcommon-debug.h27 decryption process completed
33 * @decrypt_busy_err: Decryption interruptions counter
/kernel/linux/linux-5.10/block/
Dblk-crypto-fallback.c370 * The crypto API fallback's main decryption routine.
440 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption
444 * Restore bi_private and bi_end_io, and queue the bio for decryption into a
467 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption
476 * For a READ operation, we mark the bio for decryption by using bi_private and
509 * bi_end_io appropriately to trigger decryption when the bio is ended. in blk_crypto_fallback_bio_prep()
/kernel/linux/linux-6.6/block/
Dblk-crypto-fallback.c373 * The crypto API fallback's main decryption routine.
444 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption
448 * Restore bi_private and bi_end_io, and queue the bio for decryption into a
471 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption
480 * For a READ operation, we mark the bio for decryption by using bi_private and
513 * bi_end_io appropriately to trigger decryption when the bio is ended. in blk_crypto_fallback_bio_prep()
/kernel/linux/linux-5.10/drivers/crypto/ux500/cryp/
Dcryp.c121 /* Prepare key for decryption in AES_ECB and AES_CBC mode. */ in cryp_set_configuration()
128 * encrypt even though it is a decryption that we are doing. It in cryp_set_configuration()
131 * algodir back to decryption, which is done outside this if in cryp_set_configuration()
140 * if statement when running decryption. in cryp_set_configuration()

12345678910>>...17