/linux/Documentation/networking/ |
A D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side if the device handled decryption and authentication 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 189 and takes care of partial decryption. 284 arrive continue decryption. Finally when 2 arrives it's completely outside 286 handling. ``ktls`` software fallback handles the decryption of record 324 At this point the device is in sync and can resume decryption at next 388 decryption and authentication errors, packets with errors must simply not 432 decryption. [all …]
|
A D | tls.rst | 104 be received before decryption can happen. 121 ``EBADMSG`` is returned if decryption failed for any other reason. 238 record decryption failed (e.g. due to incorrect authentication tag)
|
A D | xfrm_device.rst | 113 decryption, the driver needs to add a reference to the decoded SA into
|
/linux/Documentation/crypto/ |
A D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 387 the given size will be generated. For a decryption operation, the
|
A D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
A D | api-samples.rst | 29 * encryption/decryption operations. But in this example, we'll just do a
|
A D | asymmetric-keys.rst | 116 (eg. decryption and signature generation) require extra key data. 218 Optional. This is the entry point for the encryption, decryption and
|
/linux/fs/cifs/ |
A D | smb2transport.c | 388 struct derivation decryption; member 432 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 433 ptriplet->decryption.context, in generate_smb3signingkey() 491 d = &triplet.decryption; in generate_smb30signingkey() 519 d = &triplet.decryption; in generate_smb311signingkey()
|
A D | Kconfig | 142 bool "Dump encryption keys for offline decryption (Unsafe)" 145 Enabling this will dump the encryption and decryption keys
|
/linux/Documentation/devicetree/bindings/crypto/ |
A D | intel,keembay-ocs-aes.yaml | 14 hardware-accelerated AES/SM4 encryption/decryption.
|
/linux/fs/ksmbd/ |
A D | auth.c | 792 struct derivation decryption; member 806 rc = generate_key(sess, ptwin->decryption.label, in generate_smb3encryptionkey() 807 ptwin->decryption.context, in generate_smb3encryptionkey() 843 d = &twin.decryption; in ksmbd_gen_smb30_encryptionkey() 863 d = &twin.decryption; in ksmbd_gen_smb311_encryptionkey()
|
/linux/Documentation/driver-api/mei/ |
A D | hdcp.rst | 15 for decryption and verification.
|
/linux/drivers/isdn/mISDN/ |
A D | Kconfig | 23 decryption. It may use hardware features if available.
|
/linux/Documentation/block/ |
A D | inline-encryption.rst | 15 in terms of key, algorithm, data unit size (the granularity of en/decryption), 45 fall back to crypto API en/decryption). 146 handle en/decryption of the bio using blk-crypto-fallback. 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
|
/linux/crypto/asymmetric_keys/ |
A D | Kconfig | 8 as encryption, decryption, signature generation and signature
|
/linux/Documentation/security/keys/ |
A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a
|
A D | trusted-encrypted.rst | 92 Encryption and decryption of the child key must be protected by a strong 110 for encryption/decryption. New keys are created from kernel-generated random
|
A D | core.rst | 986 only need the public parts to be available, but for decryption and signing 1722 asym_eds_op() deals with encryption, decryption and signature creation as 1773 are supported by the key, including encryption of a blob, decryption of a 1782 raw data and signature sizes for encryption and decryption. The
|
/linux/drivers/crypto/caam/ |
A D | Kconfig | 142 Supported cryptographic primitives: encryption, decryption,
|
/linux/arch/arm/crypto/ |
A D | Kconfig | 111 and for XTS mode encryption, CBC and XTS mode decryption speedup is
|
/linux/Documentation/core-api/ |
A D | dma-attributes.rst | 94 doing a heavy operation like decryption or decompression this
|
A D | padata.rst | 13 decryption on large numbers of packets without reordering those packets. This
|
/linux/drivers/crypto/ |
A D | Kconfig | 266 Group, which can perform encryption, decryption, hashing, 795 encryption and decryption. This driver interfaces with AES hw
|
/linux/Documentation/filesystems/ |
A D | fsverity.rst | 607 ``enabled_steps`` is a bitmask that specifies whether decryption, 610 workqueue, and then the workqueue work does the decryption or 611 verification. Finally, pages where no decryption or verity error
|
/linux/crypto/ |
A D | Kconfig | 532 and decryption requests to the encapsulated cipher after applying 1074 solely on encryption (although decryption is supported as well, but 1078 8 for decryption), this implementation only uses just two S-boxes of
|