| /linux/tools/testing/crypto/chacha20-s390/ |
| H A D | test-cipher.c | 95 pr_info("lib decryption took: %lld nsec", end - start); in test_lib_chacha() 194 /* Prepare for decryption */ in test_skcipher() 211 pr_info("%s tfm decryption successful, took %lld nsec\n", name, end - start); in test_skcipher() 287 pr_info("generic en/decryption check FAILED\n"); in chacha_s390_test_init() 292 pr_info("generic en/decryption check OK\n"); in chacha_s390_test_init() 302 pr_info("s390 en/decryption check FAILED\n"); in chacha_s390_test_init() 307 pr_info("s390 en/decryption check OK\n"); in chacha_s390_test_init() 324 pr_info("lib en/decryption check FAILED\n"); in chacha_s390_test_init() 329 pr_info("lib en/decryption check OK\n"); in chacha_s390_test_init()
|
| /linux/drivers/crypto/aspeed/ |
| H A D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
| /linux/Documentation/crypto/ |
| H A D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 395 the given size will be generated. For a decryption operation, the
|
| H A D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
| /linux/include/crypto/ |
| H A D | aead.h | 36 * decryption operation. Another deviation from the asynchronous block cipher 50 * during encryption (resp. decryption). The authentication tag is generated 52 * decryption, the authentication tag is consumed along with the ciphertext and 55 * In-place encryption/decryption is enabled by using the same scatterlist 116 * supplied during the decryption operation. This function is also 316 * data returned by the encryption or decryption operation 458 * decryption operation. Therefore, the function returns this error if 589 * destination is the ciphertext. For a decryption operation, the use is 596 * - AEAD decryption input: assoc data || ciphertext || auth tag 597 * - AEAD decryption output: assoc data || plaintext
|
| /linux/arch/x86/crypto/ |
| H A D | aes-xts-avx-x86_64.S | 469 // Select either the encryption round keys or the decryption round keys. 525 // Do a single non-last round of AES encryption (if \enc==1) or decryption (if 545 // Do a single non-last round of AES en/decryption on the block(s) in \data, 561 // Do a single non-last round of AES en/decryption on the blocks in registers 584 // Do tweaked AES en/decryption (i.e., XOR with \tweak, then AES en/decrypt, 622 // decryption uses the last two tweaks in reverse order. We'll handle 783 // because CTS decryption uses the last two tweaks in reverse order. 796 // Swap the first LEN bytes of the en/decryption of the last full block 797 // with the partial block. Note that to support in-place en/decryption, 807 // in-place en/decryption, this must happen before the store to the dst [all …]
|
| /linux/block/ |
| H A D | blk-crypto-fallback.c | 417 * The crypto API fallback's main decryption routine. 445 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption 449 * Restore bi_private and bi_end_io, and queue the bio for decryption into a 472 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption 478 * For a READ operation, mark the bio for decryption by using bi_private and 514 * bi_end_io appropriately to trigger decryption when the bio is ended. in blk_crypto_fallback_bio_prep()
|
| /linux/drivers/net/wireless/ath/ath5k/ |
| H A D | desc.h | 66 #define AR5K_5210_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000010 /* decryption CRC failure */ 70 #define AR5K_5210_RX_DESC_STATUS1_KEY_INDEX 0x00007e00 /* decryption key index */ 92 #define AR5K_5212_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000008 /* decryption CRC failure */ 96 #define AR5K_5212_RX_DESC_STATUS1_KEY_INDEX 0x0000fe00 /* decryption key index */
|
| /linux/fs/smb/client/ |
| H A D | smb2transport.c | 309 struct derivation decryption; member 338 * All channels use the same encryption/decryption keys but in generate_smb3signingkey() 374 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 375 ptriplet->decryption.context, in generate_smb3signingkey() 431 d = &triplet.decryption; in generate_smb30signingkey() 460 d = &triplet.decryption; in generate_smb311signingkey()
|
| H A D | Kconfig | 141 bool "Dump encryption keys for offline decryption (Unsafe)" 144 Enabling this will dump the encryption and decryption keys
|
| /linux/drivers/net/wireless/ralink/rt2x00/ |
| H A D | rt2x00queue.h | 92 * @iv: IV/EIV data used during encryption/decryption. 163 * @cipher: Cipher type used during decryption. 164 * @cipher_status: Decryption status. 165 * @iv: IV/EIV data used during decryption. 166 * @icv: ICV data used during decryption.
|
| /linux/drivers/crypto/ |
| H A D | sa2ul.h | 72 #define SA_ENG_ID_EM2 3 /* Encryption/Decryption enginefor pass 2 */ 300 * @dec: struct sa_ctx_info for decryption 301 * @keylen: encrption/decryption keylength
|
| /linux/Documentation/security/secrets/ |
| H A D | coco.rst | 56 provides the decryption key (= secret) using the secret injection mechanism. 62 because they are encrypted. Host can't read the decryption key because
|
| /linux/net/tipc/ |
| H A D | crypto.c | 3 * net/tipc/crypto.c: TIPC crypto for key handling & packet en/decryption 181 * @aead: array of pointers to AEAD keys for encryption/decryption 877 * @aead: TIPC AEAD for the message decryption 882 * * 0 : if the decryption has completed 884 * * < 0 : the decryption has failed 1307 * tipc_crypto_key_pick_tx - Pick one TX key for message decryption 1314 * for the message decryption, that must be a cluster key and not used before 1799 * If the decryption is successful, the decrypted skb is returned directly or 1804 * cluster key(s) can be taken for decryption (- recursive). 1807 * * 0 : the decryption has successfully completed [all …]
|
| /linux/fs/smb/server/ |
| H A D | auth.c | 636 struct derivation decryption; member 647 generate_key(conn, sess, ptwin->decryption.label, in generate_smb3encryptionkey() 648 ptwin->decryption.context, in generate_smb3encryptionkey() 651 ksmbd_debug(AUTH, "generated SMB3 encryption/decryption keys\n"); in generate_smb3encryptionkey() 668 d = &twin.decryption; in ksmbd_gen_smb30_encryptionkey() 689 d = &twin.decryption; in ksmbd_gen_smb311_encryptionkey()
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 145 decryption sessions. 152 protect key sealing and parameter decryption to protect key unsealing 189 decryption HMAC session salted to the EK primary (which also does not
|
| /linux/include/crypto/internal/ |
| H A D | cipher.h | 105 * memory for the data returned by the encryption or decryption operation 173 * Invoke the decryption operation of one block. The caller must ensure that
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_crypto.c | 537 * %0: decryption successful 538 * negative errno: decryption could not be completed 885 * decryption function: as follows, where D() is AES decryption in 896 * %GSS_S_COMPLETE: Decryption successful 898 * %GSS_S_FAILURE: Decryption failed
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 15 for decryption and verification.
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | intel,keembay-ocs-aes.yaml | 14 hardware-accelerated AES/SM4 encryption/decryption.
|
| H A D | aspeed,ast2500-hace.yaml | 14 of hash data digest, encryption, and decryption. Basically, HACE can be
|
| H A D | nvidia,tegra234-se-aes.yaml | 10 The Tegra Security Engine accelerates the following AES encryption/decryption
|
| /linux/drivers/crypto/rockchip/ |
| H A D | rk3288_crypto.h | 94 /* Encryption = 0 , Decryption = 1 */ 142 /* Encryption = 0 , Decryption = 1 */
|
| /linux/drivers/isdn/mISDN/ |
| H A D | Kconfig | 23 decryption. It may use hardware features if available.
|
| /linux/arch/arm64/mm/ |
| H A D | mem_encrypt.c | 3 * Implementation of the memory encryption/decryption API.
|