/Linux-v5.15/arch/powerpc/crypto/ |
D | aes-spe-regs.h | 8 #define rKS r0 /* copy of en-/decryption key pointer */ 11 #define rKP r5 /* pointer to en-/decryption key pointer */ 12 #define rRR r6 /* en-/decryption rounds */ 16 #define rT0 r11 /* pointers to en-/decryption tables */
|
/Linux-v5.15/Documentation/networking/ |
D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side if the device handled decryption and authentication 59 request, records are retrieved from the socket and passed to decryption routine. 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 180 decryption, authentication for each record in the packet). The device leaves 189 and takes care of partial decryption. 284 arrive continue decryption. Finally when 2 arrives it's completely outside 286 handling. ``ktls`` software fallback handles the decryption of record 324 At this point the device is in sync and can resume decryption at next [all …]
|
D | tls.rst | 104 be received before decryption can happen. 121 ``EBADMSG`` is returned if decryption failed for any other reason. 238 record decryption failed (e.g. due to incorrect authentication tag)
|
/Linux-v5.15/Documentation/crypto/ |
D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 387 the given size will be generated. For a decryption operation, the
|
D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
/Linux-v5.15/include/crypto/ |
D | aead.h | 34 * encryption or decryption operation. In case of an encryption, the associated 35 * data memory is filled during the encryption operation. For decryption, the 51 * during encryption (resp. decryption). 53 * In-place encryption/decryption is enabled by using the same scatterlist 113 * supplied during the decryption operation. This function is also 259 * data returned by the encryption or decryption operation 362 * decryption operation. Therefore, the function returns this error if 487 * destination is the ciphertext. For a decryption operation, the use is 494 * - AEAD decryption input: assoc data || ciphertext || auth tag 495 * - AEAD decryption output: assoc data || plaintext
|
/Linux-v5.15/drivers/staging/rtl8712/ |
D | rtl871x_mp.h | 233 HW_CONTROL, /*hw encryption& decryption*/ 234 SW_CONTROL, /*sw encryption& decryption*/ 235 HW_ENCRY_SW_DECRY, /*hw encryption & sw decryption*/ 236 SW_ENCRY_HW_DECRY /*sw encryption & hw decryption*/
|
/Linux-v5.15/crypto/ |
D | keywrap.c | 46 * * The input for the decryption is the first semiblock handed in as an 48 * return code of the decryption operation will be EBADMSG in case an 64 * In case of decryption, ciphertext now already has the expected length 76 * ==> After decryption (which hopefully does not return EBADMSG), the ct
|
D | twofish_generic.c | 36 /* Macros to compute the g() function in the encryption and decryption 48 /* Encryption and decryption Feistel rounds. Each one calls the two g() 68 /* Encryption and decryption cycles; each one is simply two Feistel rounds
|
D | cfb.c | 17 * Note that since the pad for both encryption and decryption is 19 * decryption function.
|
/Linux-v5.15/drivers/net/wireless/ath/ath9k/ |
D | common-debug.h | 27 decryption process completed 33 * @decrypt_busy_err: Decryption interruptions counter
|
/Linux-v5.15/block/ |
D | blk-crypto-fallback.c | 374 * The crypto API fallback's main decryption routine. 444 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption 448 * Restore bi_private and bi_end_io, and queue the bio for decryption into a 471 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption 480 * For a READ operation, we mark the bio for decryption by using bi_private and 513 * bi_end_io appropriately to trigger decryption when the bio is ended. in blk_crypto_fallback_bio_prep()
|
/Linux-v5.15/drivers/crypto/ux500/cryp/ |
D | cryp.c | 121 /* Prepare key for decryption in AES_ECB and AES_CBC mode. */ in cryp_set_configuration() 128 * encrypt even though it is a decryption that we are doing. It in cryp_set_configuration() 131 * algodir back to decryption, which is done outside this if in cryp_set_configuration() 140 * if statement when running decryption. in cryp_set_configuration()
|
/Linux-v5.15/drivers/staging/r8188eu/include/ |
D | rtw_mp.h | 397 HW_CONTROL, /* hw encryption& decryption */ 398 SW_CONTROL, /* sw encryption& decryption */ 399 HW_ENCRY_SW_DECRY, /* hw encryption & sw decryption */ 400 SW_ENCRY_HW_DECRY /* sw encryption & hw decryption */
|
/Linux-v5.15/drivers/net/wireless/ath/ath5k/ |
D | desc.h | 66 #define AR5K_5210_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000010 /* decryption CRC failure */ 70 #define AR5K_5210_RX_DESC_STATUS1_KEY_INDEX 0x00007e00 /* decryption key index */ 92 #define AR5K_5212_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000008 /* decryption CRC failure */ 96 #define AR5K_5212_RX_DESC_STATUS1_KEY_INDEX 0x0000fe00 /* decryption key index */
|
/Linux-v5.15/drivers/crypto/ |
D | sa2ul.h | 71 #define SA_ENG_ID_EM2 3 /* Encryption/Decryption enginefor pass 2 */ 299 * @dec: struct sa_ctx_info for decryption 300 * @keylen: encrption/decryption keylength
|
/Linux-v5.15/drivers/net/wireless/ralink/rt2x00/ |
D | rt2x00queue.h | 92 * @iv: IV/EIV data used during encryption/decryption. 163 * @cipher: Cipher type used during decryption. 164 * @cipher_status: Decryption status. 165 * @iv: IV/EIV data used during decryption. 166 * @icv: ICV data used during decryption.
|
/Linux-v5.15/fs/cifs/ |
D | smb2transport.c | 389 struct derivation decryption; member 402 * All channels use the same encryption/decryption keys but in generate_smb3signingkey() 433 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 434 ptriplet->decryption.context, in generate_smb3signingkey() 492 d = &triplet.decryption; in generate_smb30signingkey() 520 d = &triplet.decryption; in generate_smb311signingkey()
|
D | Kconfig | 142 bool "Dump encryption keys for offline decryption (Unsafe)" 145 Enabling this will dump the encryption and decryption keys
|
/Linux-v5.15/fs/ext4/ |
D | readpage.c | 114 * will be disabled for that, decryption may still be needed, causing in verity_work() 131 * We use different work queues for decryption and for verity because in bio_post_read_processing() 132 * verity may require reading metadata pages that need decryption, and in bio_post_read_processing()
|
/Linux-v5.15/net/tipc/ |
D | crypto.c | 3 * net/tipc/crypto.c: TIPC crypto for key handling & packet en/decryption 181 * @aead: array of pointers to AEAD keys for encryption/decryption 875 * @aead: TIPC AEAD for the message decryption 880 * * 0 : if the decryption has completed 882 * * < 0 : the decryption has failed 1305 * tipc_crypto_key_pick_tx - Pick one TX key for message decryption 1312 * for the message decryption, that must be a cluster key and not used before 1797 * If the decryption is successful, the decrypted skb is returned directly or 1802 * cluster key(s) can be taken for decryption (- recursive). 1805 * * 0 : the decryption has successfully completed [all …]
|
/Linux-v5.15/Documentation/driver-api/mei/ |
D | hdcp.rst | 15 for decryption and verification.
|
/Linux-v5.15/include/crypto/internal/ |
D | cipher.h | 105 * memory for the data returned by the encryption or decryption operation 173 * Invoke the decryption operation of one block. The caller must ensure that
|
/Linux-v5.15/Documentation/devicetree/bindings/crypto/ |
D | intel,keembay-ocs-aes.yaml | 14 hardware-accelerated AES/SM4 encryption/decryption.
|
/Linux-v5.15/drivers/isdn/mISDN/ |
D | Kconfig | 23 decryption. It may use hardware features if available.
|