Lines Matching full:with

56 A cipher is accessed with the same name as done for the in-kernel API
60 To interact with the kernel crypto API, a socket must be created by the
61 user space application. User space invokes the cipher operation with the
63 obtained with the read()/recv() system call family.
72 1. Create a socket of type AF_ALG with the struct sockaddr_alg
75 2. Invoke bind with the socket descriptor
77 3. Invoke accept with the socket descriptor. The accept system call
78 returns a new file descriptor that is to be used to interact with the
121 should be processed with the message digest. The send system call allows
129 With the recv() system call, the application can read the message digest
155 family, the consumer must set the key. The key setting is described with
160 specified with the data structure provided by the sendmsg() system call.
164 information on how the cmsghdr data structure is used together with the
166 following information specified with a separate header instances:
168 - specification of the cipher operation type with one of these flags:
174 - specification of the IV information marked with the flag ALG_SET_IV
179 cipher update function where more input data is expected with a
186 With the recv() system call, the application can read the result of the
209 family, the consumer must set the key. The key setting is described with
219 specified with the data structure provided by the sendmsg() system call.
223 information on how the cmsghdr data structure is used together with the
225 following information specified with a separate header instances:
227 - specification of the cipher operation type with one of these flags:
233 - specification of the IV information marked with the flag ALG_SET_IV
235 - specification of the associated authentication data (AAD) with the
237 with the plaintext / ciphertext. See below for the memory structure.
242 cipher update function where more input data is expected with a
249 With the recv() system call, the application can read the result of the
251 at least as large as defined with the memory structure below. If the
255 Such breach in integrity is marked with the -EBADMSG error code.
260 The AEAD cipher operates with the following information that is
269 The sizes of the AAD and the authentication tag are provided with the
318 Following CAVP testing interfaces are enabled when kernel is built with
332 interface can be accessed with the zero-copy interface of
343 input into segments with a maximum size of 16 pages.
345 Zero-copy can be used with the following code example (a complete
346 working example is provided with libkcapi):
367 be invoked with the file descriptor of the open cipher (i.e. the file