Searched refs:decryption (Results  1 – 25 of 26) sorted by relevance
12
| /Linux-v5.4/Documentation/crypto/ | 
| D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption159 should be processed for encryption or decryption. In addition, the IV is
 172    -  ALG_OP_DECRYPT - decryption of data
 218 should be processed for encryption or decryption. In addition, the IV is
 231    -  ALG_OP_DECRYPT - decryption of data
 254 The authenticated decryption operation may indicate an integrity error.
 279 -  AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
 286 -  AEAD decryption output: plaintext
 376    the given size will be generated. For a decryption operation, the
 
 | 
| D | descore-readme.txt | 4 des - fast & portable DES encryption & decryption.30 1.	Highest possible encryption/decryption PERFORMANCE.
 55 	this has the quickest encryption/decryption routines i've seen.
 70 	encryption/decryption is still slower on the sparc and 68000.
 207    or about 32 to 40 instructions per en/decryption.
 233 the en/decryption routines each use 6 necessary register variables,
 303 	en/decryption with the key k. if you use DesMethod,
 308 	will be set to magic constants which speed up the encryption/decryption
 
 | 
| D | api-samples.rst | 29              * encryption/decryption operations.  But in this example, we'll just do a
 | 
| D | asymmetric-keys.txt | 117 (eg. decryption and signature generation) require extra key data.220      Optional.  This is the entry point for the encryption, decryption and
 
 | 
| /Linux-v5.4/Documentation/networking/ | 
| D | tls-offload.rst | 22    latency on socket reads (decryption only starts when a read syscall54 On the receive side if the device handled decryption and authentication
 59 request, records are retrieved from the socket and passed to decryption routine.
 60 If device decrypted all the segments of the record the decryption is skipped,
 61 otherwise software path handles decryption.
 180 decryption, authentication for each record in the packet). The device leaves
 189 and takes care of partial decryption.
 284 arrive continue decryption. Finally when 2 arrives it's completely outside
 286 handling. ``ktls`` software fallback handles the decryption of record
 324 At this point the device is in sync and can resume decryption at next
 [all …]
 
 | 
| D | tls.rst | 104 be received before decryption can happen.121 ``EBADMSG`` is returned if decryption failed for any other reason.
 
 | 
| D | xfrm_device.txt | 103 decryption, the driver needs to add a reference to the decoded SA into
 | 
| /Linux-v5.4/fs/cifs/ | 
| D | smb2transport.c | 322 	struct derivation decryption;  member343 	rc = generate_key(ses, ptriplet->decryption.label,  in generate_smb3signingkey()
 344 			  ptriplet->decryption.context,  in generate_smb3signingkey()
 389 	d = &triplet.decryption;  in generate_smb30signingkey()
 417 	d = &triplet.decryption;  in generate_smb311signingkey()
 
 | 
| D | Kconfig | 170 	bool "Dump encryption keys for offline decryption (Unsafe)"173 	  Enabling this will dump the encryption and decryption keys
 
 | 
| /Linux-v5.4/Documentation/driver-api/mei/ | 
| D | hdcp.rst | 15 for decryption and verification.
 | 
| /Linux-v5.4/drivers/isdn/mISDN/ | 
| D | Kconfig | 22 	  decryption. It may use hardware features if available.
 | 
| /Linux-v5.4/crypto/asymmetric_keys/ | 
| D | Kconfig | 8 	  as encryption, decryption, signature generation and signature
 | 
| /Linux-v5.4/Documentation/security/keys/ | 
| D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a
 | 
| D | trusted-encrypted.rst | 83 encryption/decryption.  New keys are created from kernel generated random
 | 
| D | core.rst | 982      only need the public parts to be available, but for decryption and signing1661      asym_eds_op() deals with encryption, decryption and signature creation as
 1712      are supported by the key, including encryption of a blob, decryption of a
 1721      raw data and signature sizes for encryption and decryption.  The
 
 | 
| /Linux-v5.4/arch/arm/crypto/ | 
| D | Kconfig | 92 	  and for XTS mode encryption, CBC and XTS mode decryption speedup is
 | 
| /Linux-v5.4/drivers/crypto/caam/ | 
| D | Kconfig | 138           Supported cryptographic primitives: encryption, decryption,
 | 
| /Linux-v5.4/Documentation/ | 
| D | DMA-attributes.txt | 120   doing a heavy operation like decryption or decompression this
 | 
| D | padata.txt | 10 encryption and decryption on large numbers of packets without reordering
 | 
| /Linux-v5.4/Documentation/filesystems/ | 
| D | fsverity.rst | 527 ``enabled_steps`` is a bitmask that specifies whether decryption,530 workqueue, and then the workqueue work does the decryption or
 531 verification.  Finally, pages where no decryption or verity error
 
 | 
| D | ubifs-authentication.rst | 14 on the device without the filesystem decryption key.
 | 
| D | fscrypt.rst | 1099 page lock must be held until decryption has finished, to prevent the
 | 
| /Linux-v5.4/crypto/ | 
| D | Kconfig | 504 	  and decryption requests to the encapsulated cipher after applying1054 	  solely on encryption (although decryption is supported as well, but
 1058 	  8 for decryption), this implementation only uses just two S-boxes of
 
 | 
| /Linux-v5.4/drivers/crypto/ | 
| D | Kconfig | 262 	  Group, which can perform encryption, decryption, hashing,
 | 
| /Linux-v5.4/arch/x86/crypto/ | 
| D | aesni-intel_asm.S | 636 # PARTIAL_BLOCK: Handles encryption/decryption and the tag partial blocks
 | 
        12