Lines Matching full:implementation
103 the following implementations: AES-NI, assembler implementation, or
105 which cipher implementation is used? The answer to that question is the
106 priority number assigned to each cipher implementation by the kernel
109 implementations providing an implementation with that name and selects
110 the implementation with the highest priority.
113 implementation and thus does not want to rely on the priority-based
115 the cipher implementation to register a unique name in addition to
117 sure to refer to the intended cipher implementation.
133 - module: the kernel module providing the cipher implementation (or
136 - priority: the priority value of the cipher implementation
161 an ECDH or DH implementation
205 an ECDH or DH implementation
231 cipher implementation for the given cipher name. That means, even when a
240 implementation may use many layers and indirections. This section shall
261 seqiv.c). The generic implementation serves as an example showing the
267 the AES-NI implementation, the CTR mode, the GHASH implementation and
268 the AES cipher are all merged into one cipher implementation registered
277 crypto API for the cipher implementation type.
338 The GCM implementation is responsible to invoke the CTR mode AES and
342 3. The GCM AEAD cipher type implementation now invokes the SKCIPHER API
346 implementation of AES is instantiated. The cipher handle for AES is
349 That means that the SKCIPHER implementation of CTR(AES) only
351 chaining operation, the CIPHER implementation of AES is invoked.
356 5. The GCM AEAD implementation also invokes the GHASH cipher
357 implementation via the AHASH API.
381 implementation:
406 implementation performs its operation as needed.
412 At one time, the HMAC implementation requires a SHA256 operation