Searched refs:as (Results 1 – 4 of 4) sorted by relevance
/crypto/ |
D | algif_aead.c | 52 unsigned int as = crypto_aead_authsize(tfm); in aead_sufficient_data() local 58 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data() 99 unsigned int i, as = crypto_aead_authsize(tfm); in _aead_recvmsg() local 142 outlen = used + as; in _aead_recvmsg() 144 outlen = used - as; in _aead_recvmsg() 251 processed - as); in _aead_recvmsg() 264 af_alg_pull_tsgl(sk, processed, areq->tsgl, processed - as); in _aead_recvmsg()
|
D | Kconfig | 150 Create default cryptographic template instantiations such as 167 Userspace configuration for cryptographic instantiations such as 184 This is intended for developer use only, as these tests take much 304 as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012. 431 This is the Cipher Text Stealing mode as described by 434 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010. 550 dm-crypt. It uses the hash of the block encryption key as the 556 instantiated either as an skcipher or as an AEAD (depending on the 676 and gain better performance as compared with the table implementation. 740 CRC T10 Data Integrity Field computation is being cast as [all …]
|
/crypto/asymmetric_keys/ |
D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 appropriate hash algorithms (such as SHA-1) must be available. 34 Operations such as sign, verify, encrypt, decrypt are performed by
|
D | mscode.asn1 | 8 --- as published by the Free Software Foundation; either version
|