Lines Matching refs:AES
102 or a single block cipher. For example, AES on newer Intel hardware has
103 the following implementations: AES-NI, assembler implementation, or
193 (e.g. AES-128 vs. AES-192 vs. AES-256). These key sizes are determined
280 The depicted example decomposes the AEAD cipher of GCM(AES) based on the
286 AES-NI) provide implementations merging aspects which in the view of the
288 the AES-NI implementation, the CTR mode, the GHASH implementation and
289 the AES cipher are all merged into one cipher implementation registered
359 During instantiation of the GCM handle, the CTR(AES) and GHASH
360 ciphers are instantiated. The cipher handles for CTR(AES) and GHASH
363 The GCM implementation is responsible to invoke the CTR mode AES and
368 with the instantiated CTR(AES) cipher handle.
370 During instantiation of the CTR(AES) cipher, the CIPHER type
371 implementation of AES is instantiated. The cipher handle for AES is
374 That means that the SKCIPHER implementation of CTR(AES) only
376 chaining operation, the CIPHER implementation of AES is invoked.
378 4. The SKCIPHER of CTR(AES) now invokes the CIPHER API with the AES
394 For example, CBC(AES) is implemented with cbc.c, and aes-generic.c. The