Searched refs:as (Results 1 – 4 of 4) sorted by relevance
/crypto/ |
D | algif_aead.c | 52 unsigned int as = crypto_aead_authsize(tfm); in aead_sufficient_data() local 58 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data() 99 unsigned int i, as = crypto_aead_authsize(tfm); in _aead_recvmsg() local 142 outlen = used + as; in _aead_recvmsg() 144 outlen = used - as; in _aead_recvmsg() 251 processed - as); in _aead_recvmsg() 264 af_alg_pull_tsgl(sk, processed, areq->tsgl, processed - as); in _aead_recvmsg()
|
D | Kconfig | 150 Create default cryptographic template instantiations such as 167 Userspace configuration for cryptographic instantiations such as 184 This is intended for developer use only, as these tests take much 309 as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012. 436 This is the Cipher Text Stealing mode as described by 439 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010. 575 dm-crypt. It uses the hash of the block encryption key as the 581 instantiated either as an skcipher or as an AEAD (depending on the 701 and gain better performance as compared with the table implementation. 747 CRC T10 Data Integrity Field computation is being cast as [all …]
|
/crypto/asymmetric_keys/ |
D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 appropriate hash algorithms (such as SHA-1) must be available. 34 Operations such as sign, verify, encrypt, decrypt are performed by
|
D | mscode.asn1 | 8 --- as published by the Free Software Foundation; either version
|