Home
last modified time | relevance | path

Searched full:decryption (Results 1 – 25 of 162) sorted by relevance

1234567

/linux/tools/testing/crypto/chacha20-s390/
H A Dtest-cipher.c95 pr_info("lib decryption took: %lld nsec", end - start); in test_lib_chacha()
194 /* Prepare for decryption */ in test_skcipher()
211 pr_info("%s tfm decryption successful, took %lld nsec\n", name, end - start); in test_skcipher()
287 pr_info("generic en/decryption check FAILED\n"); in chacha_s390_test_init()
292 pr_info("generic en/decryption check OK\n"); in chacha_s390_test_init()
302 pr_info("s390 en/decryption check FAILED\n"); in chacha_s390_test_init()
307 pr_info("s390 en/decryption check OK\n"); in chacha_s390_test_init()
324 pr_info("lib en/decryption check FAILED\n"); in chacha_s390_test_init()
329 pr_info("lib en/decryption check OK\n"); in chacha_s390_test_init()
/linux/drivers/crypto/aspeed/
H A DKconfig7 throughput of hash data digest, encryption and decryption.
45 Supports AES/DES symmetric-key encryption and decryption
56 Supports 256 bits to 4096 bits RSA encryption/decryption
/linux/Documentation/crypto/
H A Duserspace-if.rst95 to provide different memory pointers for the encryption and decryption
159 should be processed for encryption or decryption. In addition, the IV is
172 - ALG_OP_DECRYPT - decryption of data
218 should be processed for encryption or decryption. In addition, the IV is
231 - ALG_OP_DECRYPT - decryption of data
254 The authenticated decryption operation may indicate an integrity error.
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
286 - AEAD decryption output: plaintext
395 the given size will be generated. For a decryption operation, the
H A Ddescore-readme.rst5 Fast & Portable DES encryption & decryption
15 des - fast & portable DES encryption & decryption.
41 1. Highest possible encryption/decryption PERFORMANCE.
68 this has the quickest encryption/decryption routines i've seen.
85 encryption/decryption is still slower on the sparc and 68000.
244 or about 32 to 40 instructions per en/decryption.
275 the en/decryption routines each use 6 necessary register variables,
355 en/decryption with the key k. if you use DesMethod,
360 will be set to magic constants which speed up the encryption/decryption
/linux/include/crypto/
H A Daead.h36 * decryption operation. Another deviation from the asynchronous block cipher
50 * during encryption (resp. decryption). The authentication tag is generated
52 * decryption, the authentication tag is consumed along with the ciphertext and
55 * In-place encryption/decryption is enabled by using the same scatterlist
116 * supplied during the decryption operation. This function is also
316 * data returned by the encryption or decryption operation
458 * decryption operation. Therefore, the function returns this error if
589 * destination is the ciphertext. For a decryption operation, the use is
596 * - AEAD decryption input: assoc data || ciphertext || auth tag
597 * - AEAD decryption output: assoc data || plaintext
/linux/arch/x86/crypto/
H A Daes-xts-avx-x86_64.S469 // Select either the encryption round keys or the decryption round keys.
525 // Do a single non-last round of AES encryption (if \enc==1) or decryption (if
545 // Do a single non-last round of AES en/decryption on the block(s) in \data,
561 // Do a single non-last round of AES en/decryption on the blocks in registers
584 // Do tweaked AES en/decryption (i.e., XOR with \tweak, then AES en/decrypt,
622 // decryption uses the last two tweaks in reverse order. We'll handle
783 // because CTS decryption uses the last two tweaks in reverse order.
796 // Swap the first LEN bytes of the en/decryption of the last full block
797 // with the partial block. Note that to support in-place en/decryption,
807 // in-place en/decryption, this must happen before the store to the dst
[all …]
/linux/block/
H A Dblk-crypto-fallback.c417 * The crypto API fallback's main decryption routine.
445 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption
449 * Restore bi_private and bi_end_io, and queue the bio for decryption into a
472 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption
478 * For a READ operation, mark the bio for decryption by using bi_private and
514 * bi_end_io appropriately to trigger decryption when the bio is ended. in blk_crypto_fallback_bio_prep()
/linux/drivers/net/wireless/ath/ath5k/
H A Ddesc.h66 #define AR5K_5210_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000010 /* decryption CRC failure */
70 #define AR5K_5210_RX_DESC_STATUS1_KEY_INDEX 0x00007e00 /* decryption key index */
92 #define AR5K_5212_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000008 /* decryption CRC failure */
96 #define AR5K_5212_RX_DESC_STATUS1_KEY_INDEX 0x0000fe00 /* decryption key index */
/linux/fs/smb/client/
H A Dsmb2transport.c309 struct derivation decryption; member
338 * All channels use the same encryption/decryption keys but in generate_smb3signingkey()
374 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey()
375 ptriplet->decryption.context, in generate_smb3signingkey()
431 d = &triplet.decryption; in generate_smb30signingkey()
460 d = &triplet.decryption; in generate_smb311signingkey()
H A DKconfig141 bool "Dump encryption keys for offline decryption (Unsafe)"
144 Enabling this will dump the encryption and decryption keys
/linux/drivers/net/wireless/ralink/rt2x00/
H A Drt2x00queue.h92 * @iv: IV/EIV data used during encryption/decryption.
163 * @cipher: Cipher type used during decryption.
164 * @cipher_status: Decryption status.
165 * @iv: IV/EIV data used during decryption.
166 * @icv: ICV data used during decryption.
/linux/drivers/crypto/
H A Dsa2ul.h72 #define SA_ENG_ID_EM2 3 /* Encryption/Decryption enginefor pass 2 */
300 * @dec: struct sa_ctx_info for decryption
301 * @keylen: encrption/decryption keylength
/linux/Documentation/security/secrets/
H A Dcoco.rst56 provides the decryption key (= secret) using the secret injection mechanism.
62 because they are encrypted. Host can't read the decryption key because
/linux/net/tipc/
H A Dcrypto.c3 * net/tipc/crypto.c: TIPC crypto for key handling & packet en/decryption
181 * @aead: array of pointers to AEAD keys for encryption/decryption
877 * @aead: TIPC AEAD for the message decryption
882 * * 0 : if the decryption has completed
884 * * < 0 : the decryption has failed
1307 * tipc_crypto_key_pick_tx - Pick one TX key for message decryption
1314 * for the message decryption, that must be a cluster key and not used before
1799 * If the decryption is successful, the decrypted skb is returned directly or
1804 * cluster key(s) can be taken for decryption (- recursive).
1807 * * 0 : the decryption has successfully completed
[all …]
/linux/fs/smb/server/
H A Dauth.c636 struct derivation decryption; member
647 generate_key(conn, sess, ptwin->decryption.label, in generate_smb3encryptionkey()
648 ptwin->decryption.context, in generate_smb3encryptionkey()
651 ksmbd_debug(AUTH, "generated SMB3 encryption/decryption keys\n"); in generate_smb3encryptionkey()
668 d = &twin.decryption; in ksmbd_gen_smb30_encryptionkey()
689 d = &twin.decryption; in ksmbd_gen_smb311_encryptionkey()
/linux/Documentation/security/tpm/
H A Dtpm-security.rst145 decryption sessions.
152 protect key sealing and parameter decryption to protect key unsealing
189 decryption HMAC session salted to the EK primary (which also does not
/linux/include/crypto/internal/
H A Dcipher.h105 * memory for the data returned by the encryption or decryption operation
173 * Invoke the decryption operation of one block. The caller must ensure that
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c537 * %0: decryption successful
538 * negative errno: decryption could not be completed
885 * decryption function: as follows, where D() is AES decryption in
896 * %GSS_S_COMPLETE: Decryption successful
898 * %GSS_S_FAILURE: Decryption failed
/linux/Documentation/driver-api/mei/
H A Dhdcp.rst15 for decryption and verification.
/linux/Documentation/devicetree/bindings/crypto/
H A Dintel,keembay-ocs-aes.yaml14 hardware-accelerated AES/SM4 encryption/decryption.
H A Daspeed,ast2500-hace.yaml14 of hash data digest, encryption, and decryption. Basically, HACE can be
H A Dnvidia,tegra234-se-aes.yaml10 The Tegra Security Engine accelerates the following AES encryption/decryption
/linux/drivers/crypto/rockchip/
H A Drk3288_crypto.h94 /* Encryption = 0 , Decryption = 1 */
142 /* Encryption = 0 , Decryption = 1 */
/linux/drivers/isdn/mISDN/
H A DKconfig23 decryption. It may use hardware features if available.
/linux/arch/arm64/mm/
H A Dmem_encrypt.c3 * Implementation of the memory encryption/decryption API.

1234567