| /linux/drivers/crypto/aspeed/ |
| H A D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
| /linux/Documentation/networking/ |
| H A D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side, if the device handled decryption and authentication 59 request, records are retrieved from the socket and passed to decryption routine. 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 181 (record delineation, decryption, authentication for each record in the packet). 190 and takes care of partial decryption. 285 arrive continue decryption. Finally when 2 arrives it's completely outside 287 handling. ``ktls`` software fallback handles the decryption of record 325 At this point the device is in sync and can resume decryption at next [all …]
|
| /linux/Documentation/crypto/ |
| H A D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 395 the given size will be generated. For a decryption operation, the
|
| H A D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
| H A D | api-samples.rst | 29 * encryption/decryption operations. But in this example, we'll just do a
|
| H A D | asymmetric-keys.rst | 116 (eg. decryption and signature generation) require extra key data. 218 Optional. This is the entry point for the encryption, decryption and
|
| /linux/fs/smb/client/ |
| H A D | smb2transport.c | 308 struct derivation decryption; member 373 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 374 ptriplet->decryption.context, in generate_smb3signingkey() 430 d = &triplet.decryption; in generate_smb30signingkey() 459 d = &triplet.decryption; in generate_smb311signingkey()
|
| H A D | Kconfig | 141 bool "Dump encryption keys for offline decryption (Unsafe)" 144 Enabling this will dump the encryption and decryption keys
|
| /linux/arch/arm/crypto/ |
| H A D | Kconfig | 70 and for XTS mode encryption, CBC and XTS mode decryption speedup is 78 encryption (not CBC decryption), the encryption of XTS tweaks, XTS
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 15 for decryption and verification.
|
| /linux/fs/smb/server/ |
| H A D | auth.c | 638 struct derivation decryption; 649 generate_key(conn, sess, ptwin->decryption.label, in ksmbd_sign_smb3_pdu() 650 ptwin->decryption.context, in ksmbd_sign_smb3_pdu() 684 d = &twin.decryption; 705 d = &twin.decryption; in generate_key() 851 struct derivation decryption; global() member
|
| /linux/Documentation/security/secrets/ |
| H A D | coco.rst | 56 provides the decryption key (= secret) using the secret injection mechanism. 62 because they are encrypted. Host can't read the decryption key because
|
| /linux/drivers/isdn/mISDN/ |
| H A D | Kconfig | 23 decryption. It may use hardware features if available.
|
| /linux/crypto/asymmetric_keys/ |
| H A D | Kconfig | 8 as encryption, decryption, signature generation and signature
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a
|
| H A D | trusted-encrypted.rst | 165 a child key in the storage key hierarchy. Encryption and decryption of the 201 for encryption/decryption. New keys are created either from kernel-generated
|
| H A D | core.rst | 986 only need the public parts to be available, but for decryption and signing 1722 asym_eds_op() deals with encryption, decryption and signature creation as 1773 are supported by the key, including encryption of a blob, decryption of a 1782 raw data and signature sizes for encryption and decryption. The
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 145 decryption sessions. 152 protect key sealing and parameter decryption to protect key unsealing 189 decryption HMAC session salted to the EK primary (which also does not
|
| /linux/drivers/crypto/caam/ |
| H A D | Kconfig | 142 Supported cryptographic primitives: encryption, decryption,
|
| /linux/Documentation/block/ |
| H A D | inline-encryption.rst | 15 in terms of key, algorithm, data unit size (the granularity of en/decryption), 45 fall back to crypto API en/decryption). 146 handle en/decryption of the bio using blk-crypto-fallback. 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
|
| /linux/Documentation/core-api/ |
| H A D | padata.rst | 13 decryption on large numbers of packets without reordering those packets. This
|
| /linux/crypto/ |
| H A D | Kconfig | 380 solely on encryption (although decryption is supported as well, but 384 8 for decryption), this implementation only uses just two S-boxes of 863 and decryption requests to the encapsulated cipher after applying
|
| /linux/drivers/crypto/ |
| H A D | Kconfig | 726 AES encryption/decryption and HASH algorithms. 749 encryption and decryption. This driver interfaces with AES hw
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 713 ``enabled_steps`` is a bitmask that specifies whether decryption, 716 workqueue, and then the workqueue work does the decryption or 717 verification. Finally, folios where no decryption or verity error
|
| H A D | fscrypt.rst | 1503 folio lock must be held until decryption has finished, to prevent the
|