Searched refs:decryption (Results 1 – 25 of 33) sorted by relevance
12
/linux-6.1.9/drivers/crypto/aspeed/ |
D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 47 Supports AES/DES symmetric-key encryption and decryption
|
/linux-6.1.9/Documentation/networking/ |
D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side if the device handled decryption and authentication 59 request, records are retrieved from the socket and passed to decryption routine. 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 180 decryption, authentication for each record in the packet). The device leaves 189 and takes care of partial decryption. 284 arrive continue decryption. Finally when 2 arrives it's completely outside 286 handling. ``ktls`` software fallback handles the decryption of record 324 At this point the device is in sync and can resume decryption at next [all …]
|
D | tls.rst | 104 be received before decryption can happen. 121 ``EBADMSG`` is returned if decryption failed for any other reason. 276 record decryption failed (e.g. due to incorrect authentication tag)
|
D | xfrm_device.rst | 113 decryption, the driver needs to add a reference to the decoded SA into
|
/linux-6.1.9/Documentation/crypto/ |
D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 387 the given size will be generated. For a decryption operation, the
|
D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
D | api-samples.rst | 29 * encryption/decryption operations. But in this example, we'll just do a
|
D | asymmetric-keys.rst | 116 (eg. decryption and signature generation) require extra key data. 218 Optional. This is the entry point for the encryption, decryption and
|
/linux-6.1.9/Documentation/devicetree/bindings/crypto/ |
D | intel,keembay-ocs-aes.yaml | 14 hardware-accelerated AES/SM4 encryption/decryption.
|
D | aspeed,ast2500-hace.yaml | 14 of hash data digest, encryption, and decryption. Basically, HACE can be
|
/linux-6.1.9/fs/cifs/ |
D | smb2transport.c | 383 struct derivation decryption; member 436 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 437 ptriplet->decryption.context, in generate_smb3signingkey() 496 d = &triplet.decryption; in generate_smb30signingkey() 525 d = &triplet.decryption; in generate_smb311signingkey()
|
D | Kconfig | 142 bool "Dump encryption keys for offline decryption (Unsafe)" 145 Enabling this will dump the encryption and decryption keys
|
/linux-6.1.9/Documentation/driver-api/mei/ |
D | hdcp.rst | 15 for decryption and verification.
|
/linux-6.1.9/drivers/isdn/mISDN/ |
D | Kconfig | 23 decryption. It may use hardware features if available.
|
/linux-6.1.9/fs/ksmbd/ |
D | auth.c | 827 struct derivation decryption; member 842 rc = generate_key(conn, sess, ptwin->decryption.label, in generate_smb3encryptionkey() 843 ptwin->decryption.context, in generate_smb3encryptionkey() 880 d = &twin.decryption; in ksmbd_gen_smb30_encryptionkey() 901 d = &twin.decryption; in ksmbd_gen_smb311_encryptionkey()
|
/linux-6.1.9/Documentation/security/secrets/ |
D | coco.rst | 56 provides the decryption key (= secret) using the secret injection mechanism. 62 because they are encrypted. Host can't read the decryption key because
|
/linux-6.1.9/Documentation/block/ |
D | inline-encryption.rst | 15 in terms of key, algorithm, data unit size (the granularity of en/decryption), 45 fall back to crypto API en/decryption). 146 handle en/decryption of the bio using blk-crypto-fallback. 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
|
/linux-6.1.9/crypto/asymmetric_keys/ |
D | Kconfig | 8 as encryption, decryption, signature generation and signature
|
/linux-6.1.9/Documentation/security/keys/ |
D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a
|
D | trusted-encrypted.rst | 110 a child key in the storage key hierarchy. Encryption and decryption of the 139 for encryption/decryption. New keys are created either from kernel-generated
|
/linux-6.1.9/drivers/crypto/caam/ |
D | Kconfig | 142 Supported cryptographic primitives: encryption, decryption,
|
/linux-6.1.9/arch/arm/crypto/ |
D | Kconfig | 182 and for XTS mode encryption, CBC and XTS mode decryption speedup is
|
/linux-6.1.9/Documentation/core-api/ |
D | dma-attributes.rst | 94 doing a heavy operation like decryption or decompression this
|
D | padata.rst | 13 decryption on large numbers of packets without reordering those packets. This
|
/linux-6.1.9/crypto/ |
D | Kconfig | 368 solely on encryption (although decryption is supported as well, but 372 8 for decryption), this implementation only uses just two S-boxes of 882 and decryption requests to the encapsulated cipher after applying
|
12