Home
last modified time | relevance | path

Searched refs:as (Results 1 – 4 of 4) sorted by relevance

/crypto/
Dalgif_aead.c52 unsigned int as = crypto_aead_authsize(tfm); in aead_sufficient_data() local
58 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data()
99 unsigned int i, as = crypto_aead_authsize(tfm); in _aead_recvmsg() local
142 outlen = used + as; in _aead_recvmsg()
144 outlen = used - as; in _aead_recvmsg()
251 processed - as); in _aead_recvmsg()
264 af_alg_pull_tsgl(sk, processed, areq->tsgl, processed - as); in _aead_recvmsg()
DKconfig150 Create default cryptographic template instantiations such as
167 Userspace configuration for cryptographic instantiations such as
184 This is intended for developer use only, as these tests take much
304 as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012.
431 This is the Cipher Text Stealing mode as described by
434 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010.
550 dm-crypt. It uses the hash of the block encryption key as the
556 instantiated either as an skcipher or as an AEAD (depending on the
676 and gain better performance as compared with the table implementation.
740 CRC T10 Data Integrity Field computation is being cast as
[all …]
/crypto/asymmetric_keys/
DKconfig8 as encryption, decryption, signature generation and signature
22 appropriate hash algorithms (such as SHA-1) must be available.
34 Operations such as sign, verify, encrypt, decrypt are performed by
Dmscode.asn18 --- as published by the Free Software Foundation; either version