Searched refs:used (Results 1 – 5 of 5) sorted by relevance
/crypto/ |
D | algif_aead.c | 58 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data() 104 size_t used = 0; /* [in] TX bufs to be en/decrypted */ in _aead_recvmsg() local 119 used = ctx->used; in _aead_recvmsg() 142 outlen = used + as; in _aead_recvmsg() 144 outlen = used - as; in _aead_recvmsg() 150 used -= ctx->aead_assoclen; in _aead_recvmsg() 173 if (used < less) { in _aead_recvmsg() 177 used -= less; in _aead_recvmsg() 181 processed = used + ctx->aead_assoclen; in _aead_recvmsg() 281 areq->first_rsgl.sgl.sg, used, ctx->iv); in _aead_recvmsg() [all …]
|
D | af_alg.c | 594 void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst, in af_alg_pull_tsgl() argument 609 size_t plen = min_t(size_t, used, sg[i].length); in af_alg_pull_tsgl() 637 used -= plen; in af_alg_pull_tsgl() 638 ctx->used -= plen; in af_alg_pull_tsgl() 651 if (!ctx->used) in af_alg_pull_tsgl() 776 (min && ctx->used >= min)), in af_alg_wait_for_data() 801 if (!ctx->used) in af_alg_data_wakeup() 866 if (ctx->used) { in af_alg_sendmsg() 908 ctx->used += len; in af_alg_sendmsg() 954 ctx->used += plen; in af_alg_sendmsg() [all …]
|
D | algif_skcipher.c | 64 if (!ctx->init || (ctx->more && ctx->used < bs)) { in _skcipher_recvmsg() 77 err = af_alg_get_rsgl(sk, msg, flags, areq, ctx->used, &len); in _skcipher_recvmsg() 85 if (ctx->more || len < ctx->used) in _skcipher_recvmsg() 316 af_alg_pull_tsgl(sk, ctx->used, NULL, 0); in skcipher_sock_destruct()
|
D | Kconfig | 55 used if you don't need to meet these requirements. 194 These are 'Null' algorithms, used by IPsec, which do nothing. 458 The first 128, 192 or 256 bits in the key are used for AES and the 459 rest is used to tie each cipher block to its logical position. 509 SSE2 optimized implementation of the hash function used by the 517 AVX2 optimized implementation of the hash function used by the 549 generation method that is used in some cases by fscrypt and/or 560 that the keys are presented in the same format used by the authenc 742 transforms to be used if they are available. 777 GHASH is the hash function used in GCM (Galois/Counter Mode). [all …]
|
/crypto/asymmetric_keys/ |
D | Kconfig | 7 the asymmetric keys used for public key cryptographic operations such 21 If signature generation and/or verification are to be used,
|