Lines Matching refs:implementation
103 the following implementations: AES-NI, assembler implementation, or
105 which cipher implementation is used? The answer to that question is the
106 priority number assigned to each cipher implementation by the kernel
109 implementations providing an implementation with that name and selects
110 the implementation with the highest priority.
113 implementation and thus does not want to rely on the priority-based
115 the cipher implementation to register a unique name in addition to
117 sure to refer to the intended cipher implementation.
133 - module: the kernel module providing the cipher implementation (or
136 - priority: the priority value of the cipher implementation
161 an ECDH or DH implementation
205 an ECDH or DH implementation
229 cipher implementation for the given cipher name. That means, even when a
238 implementation may use many layers and indirections. This section shall
259 seqiv.c). The generic implementation serves as an example showing the
265 the AES-NI implementation, the CTR mode, the GHASH implementation and
266 the AES cipher are all merged into one cipher implementation registered
275 crypto API for the cipher implementation type.
336 The GCM implementation is responsible to invoke the CTR mode AES and
340 3. The GCM AEAD cipher type implementation now invokes the SKCIPHER API
344 implementation of AES is instantiated. The cipher handle for AES is
347 That means that the SKCIPHER implementation of CTR(AES) only
349 chaining operation, the CIPHER implementation of AES is invoked.
354 5. The GCM AEAD implementation also invokes the GHASH cipher
355 implementation via the AHASH API.
379 implementation:
404 implementation performs its operation as needed.
410 At one time, the HMAC implementation requires a SHA256 operation