Searched refs:used (Results 1 – 5 of 5) sorted by relevance
/crypto/ |
D | algif_aead.c | 58 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data() 104 size_t used = 0; /* [in] TX bufs to be en/decrypted */ in _aead_recvmsg() local 109 if (!ctx->used) { in _aead_recvmsg() 119 used = ctx->used; in _aead_recvmsg() 142 outlen = used + as; in _aead_recvmsg() 144 outlen = used - as; in _aead_recvmsg() 150 used -= ctx->aead_assoclen; in _aead_recvmsg() 173 if (used < less) { in _aead_recvmsg() 177 used -= less; in _aead_recvmsg() 181 processed = used + ctx->aead_assoclen; in _aead_recvmsg() [all …]
|
D | algif_skcipher.c | 64 if (!ctx->used) { in _skcipher_recvmsg() 82 if (len > ctx->used) in _skcipher_recvmsg() 83 len = ctx->used; in _skcipher_recvmsg() 89 if (ctx->more || len < ctx->used) in _skcipher_recvmsg() 327 af_alg_pull_tsgl(sk, ctx->used, NULL, 0); in skcipher_sock_destruct() 355 ctx->used = 0; in skcipher_accept_parent_nokey()
|
D | af_alg.c | 583 void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst, in af_alg_pull_tsgl() argument 598 size_t plen = min_t(size_t, used, sg[i].length); in af_alg_pull_tsgl() 626 used -= plen; in af_alg_pull_tsgl() 627 ctx->used -= plen; in af_alg_pull_tsgl() 640 if (!ctx->used) in af_alg_pull_tsgl() 761 if (sk_wait_event(sk, &timeout, (ctx->used || !ctx->more), in af_alg_wait_for_data() 786 if (!ctx->used) in af_alg_data_wakeup() 850 if (!ctx->more && ctx->used) { in af_alg_sendmsg() 886 ctx->used += len; in af_alg_sendmsg() 932 ctx->used += plen; in af_alg_sendmsg() [all …]
|
D | Kconfig | 167 These are 'Null' algorithms, used by IPsec, which do nothing. 405 The first 128, 192 or 256 bits in the key are used for AES and the 406 rest is used to tie each cipher block to its logical position. 456 SSE2 optimized implementation of the hash function used by the 464 AVX2 optimized implementation of the hash function used by the 496 generation method that is used in some cases by fscrypt and/or 507 that the keys are presented in the same format used by the authenc 648 transforms to be used if they are available. 683 GHASH is the hash function used in GCM (Galois/Counter Mode). 693 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use [all …]
|
/crypto/asymmetric_keys/ |
D | Kconfig | 7 the asymmetric keys used for public key cryptographic operations such 21 If signature generation and/or verification are to be used,
|