Lines Matching full:api
1 Kernel Crypto API Architecture
7 The kernel crypto API provides different API calls for the following
23 The kernel crypto API provides implementations of single block ciphers
24 and message digests. In addition, the kernel crypto API provides
60 The kernel crypto API provides synchronous and asynchronous API
63 When using the synchronous API operation, the caller invokes a cipher
64 operation which is performed synchronously by the kernel crypto API.
66 Therefore, the kernel crypto API calls work like regular function calls.
67 For synchronous operation, the set of API calls is small and
70 Asynchronous operation is provided by the kernel crypto API which
74 must provide a callback function the kernel crypto API can invoke to
77 appropriate locking around its data. The kernel crypto API does not
81 Crypto API Cipher References And Priority
101 The kernel crypto API may provide multiple implementations of a template
104 straight C. Now, when using the string "aes" with the kernel crypto API,
107 crypto API. When a caller uses the string to refer to a cipher during
108 initialization of a cipher handle, the kernel crypto API looks up all
114 selection. To accommodate this scenario, the kernel crypto API allows
127 allocation API calls (all names listed above are examples for such
131 cipher allocation API calls
181 with the length of the provided key. Thus, the kernel crypto API does
232 limits the search the kernel crypto API can perform for a suitable
235 the kernel crypto API may not select it due to the used type and mask
238 Internal Structure of Kernel Crypto API
241 The kernel crypto API has an internal structure where a cipher
243 help to clarify how the kernel crypto API uses various components to
253 The following ASCII art decomposes the kernel crypto API layers when
264 complete logic of the kernel crypto API.
268 kernel crypto API cannot be decomposed into layers any more. In case of
271 with the kernel crypto API. In this case, the concept described by the
273 the individual sub-components by the kernel crypto API is not done any
277 obtained from the kernel crypto API. Each block is accessed by the
278 caller or by other blocks using the API functions defined by the kernel
279 crypto API for the cipher implementation type.
286 uses the API applicable to the cipher type specified for the block.
291 kernel crypto API | IPSEC Layer
331 2. Now, SEQIV uses the AEAD API function calls to invoke the associated
344 3. The GCM AEAD cipher type implementation now invokes the SKCIPHER API
355 4. The SKCIPHER of CTR(AES) now invokes the CIPHER API with the AES
359 implementation via the AHASH API.
388 kernel crypto API | Caller
407 1. The AHASH API functions are invoked by the caller. The HMAC
417 2. The HMAC instance now invokes the SHASH API with the SHA256 cipher