/linux-6.12.1/drivers/crypto/aspeed/ |
D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
/linux-6.12.1/Documentation/networking/ |
D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side if the device handled decryption and authentication 59 request, records are retrieved from the socket and passed to decryption routine. 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 180 decryption, authentication for each record in the packet). The device leaves 189 and takes care of partial decryption. 284 arrive continue decryption. Finally when 2 arrives it's completely outside 286 handling. ``ktls`` software fallback handles the decryption of record 324 At this point the device is in sync and can resume decryption at next [all …]
|
D | tls.rst | 104 be received before decryption can happen. 121 ``EBADMSG`` is returned if decryption failed for any other reason. 276 record decryption failed (e.g. due to incorrect authentication tag)
|
D | xfrm_device.rst | 146 decryption, the driver needs to add a reference to the decoded SA into
|
/linux-6.12.1/Documentation/crypto/ |
D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 396 the given size will be generated. For a decryption operation, the
|
D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
D | api-samples.rst | 29 * encryption/decryption operations. But in this example, we'll just do a
|
D | asymmetric-keys.rst | 116 (eg. decryption and signature generation) require extra key data. 218 Optional. This is the entry point for the encryption, decryption and
|
/linux-6.12.1/fs/smb/client/ |
D | smb2transport.c | 400 struct derivation decryption; member 465 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 466 ptriplet->decryption.context, in generate_smb3signingkey() 522 d = &triplet.decryption; in generate_smb30signingkey() 551 d = &triplet.decryption; in generate_smb311signingkey()
|
D | Kconfig | 142 bool "Dump encryption keys for offline decryption (Unsafe)" 145 Enabling this will dump the encryption and decryption keys
|
/linux-6.12.1/Documentation/driver-api/mei/ |
D | hdcp.rst | 15 for decryption and verification.
|
/linux-6.12.1/fs/smb/server/ |
D | auth.c | 840 struct derivation decryption; member 855 rc = generate_key(conn, sess, ptwin->decryption.label, in generate_smb3encryptionkey() 856 ptwin->decryption.context, in generate_smb3encryptionkey() 893 d = &twin.decryption; in ksmbd_gen_smb30_encryptionkey() 914 d = &twin.decryption; in ksmbd_gen_smb311_encryptionkey()
|
/linux-6.12.1/Documentation/security/secrets/ |
D | coco.rst | 56 provides the decryption key (= secret) using the secret injection mechanism. 62 because they are encrypted. Host can't read the decryption key because
|
/linux-6.12.1/drivers/isdn/mISDN/ |
D | Kconfig | 23 decryption. It may use hardware features if available.
|
/linux-6.12.1/Documentation/block/ |
D | inline-encryption.rst | 15 in terms of key, algorithm, data unit size (the granularity of en/decryption), 45 fall back to crypto API en/decryption). 146 handle en/decryption of the bio using blk-crypto-fallback. 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
|
/linux-6.12.1/arch/arm/crypto/ |
D | Kconfig | 183 and for XTS mode encryption, CBC and XTS mode decryption speedup is 191 encryption (not CBC decryption), the encryption of XTS tweaks, XTS
|
/linux-6.12.1/crypto/asymmetric_keys/ |
D | Kconfig | 8 as encryption, decryption, signature generation and signature
|
/linux-6.12.1/Documentation/security/keys/ |
D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a
|
D | trusted-encrypted.rst | 134 a child key in the storage key hierarchy. Encryption and decryption of the 170 for encryption/decryption. New keys are created either from kernel-generated
|
/linux-6.12.1/Documentation/security/tpm/ |
D | tpm-security.rst | 145 decryption sessions. 152 protect key sealing and parameter decryption to protect key unsealing 189 decryption HMAC session salted to the EK primary (which also does not
|
/linux-6.12.1/drivers/crypto/caam/ |
D | Kconfig | 142 Supported cryptographic primitives: encryption, decryption,
|
/linux-6.12.1/Documentation/core-api/ |
D | dma-attributes.rst | 94 doing a heavy operation like decryption or decompression this
|
D | padata.rst | 13 decryption on large numbers of packets without reordering those packets. This
|
/linux-6.12.1/drivers/crypto/ |
D | Kconfig | 196 Group, which can perform encryption, decryption, hashing, 715 AES encryption/decryption and HASH algorithms. 725 encryption and decryption. This driver interfaces with AES hw
|
/linux-6.12.1/crypto/ |
D | Kconfig | 356 solely on encryption (although decryption is supported as well, but 360 8 for decryption), this implementation only uses just two S-boxes of 847 and decryption requests to the encapsulated cipher after applying
|