/linux-6.14.4/arch/powerpc/crypto/ |
D | aes-spe-regs.h | 8 #define rKS r0 /* copy of en-/decryption key pointer */ 11 #define rKP r5 /* pointer to en-/decryption key pointer */ 12 #define rRR r6 /* en-/decryption rounds */ 16 #define rT0 r11 /* pointers to en-/decryption tables */
|
/linux-6.14.4/tools/testing/crypto/chacha20-s390/ |
D | test-cipher.c | 95 pr_info("lib decryption took: %lld nsec", end - start); in test_lib_chacha() 194 /* Prepare for decryption */ in test_skcipher() 211 pr_info("%s tfm decryption successful, took %lld nsec\n", name, end - start); in test_skcipher() 287 pr_info("generic en/decryption check FAILED\n"); in chacha_s390_test_init() 292 pr_info("generic en/decryption check OK\n"); in chacha_s390_test_init() 302 pr_info("s390 en/decryption check FAILED\n"); in chacha_s390_test_init() 307 pr_info("s390 en/decryption check OK\n"); in chacha_s390_test_init() 324 pr_info("lib en/decryption check FAILED\n"); in chacha_s390_test_init() 329 pr_info("lib en/decryption check OK\n"); in chacha_s390_test_init()
|
/linux-6.14.4/Documentation/networking/ |
D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side, if the device handled decryption and authentication 59 request, records are retrieved from the socket and passed to decryption routine. 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 181 (record delineation, decryption, authentication for each record in the packet). 190 and takes care of partial decryption. 285 arrive continue decryption. Finally when 2 arrives it's completely outside 287 handling. ``ktls`` software fallback handles the decryption of record 325 At this point the device is in sync and can resume decryption at next [all …]
|
D | tls.rst | 104 be received before decryption can happen. 121 ``EBADMSG`` is returned if decryption failed for any other reason. 213 decryption will be paused when a KeyUpdate message is received by the 302 record decryption failed (e.g. due to incorrect authentication tag)
|
/linux-6.14.4/drivers/crypto/aspeed/ |
D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
/linux-6.14.4/Documentation/crypto/ |
D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 396 the given size will be generated. For a decryption operation, the
|
D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
/linux-6.14.4/include/crypto/ |
D | aead.h | 36 * decryption operation. Another deviation from the asynchronous block cipher 50 * during encryption (resp. decryption). The authentication tag is generated 52 * decryption, the authentication tag is consumed along with the ciphertext and 55 * In-place encryption/decryption is enabled by using the same scatterlist 116 * supplied during the decryption operation. This function is also 274 * data returned by the encryption or decryption operation 377 * decryption operation. Therefore, the function returns this error if 502 * destination is the ciphertext. For a decryption operation, the use is 509 * - AEAD decryption input: assoc data || ciphertext || auth tag 510 * - AEAD decryption output: assoc data || plaintext
|
/linux-6.14.4/arch/x86/crypto/ |
D | aes-xts-avx-x86_64.S | 405 // Select either the encryption round keys or the decryption round keys. 461 // Do a single non-last round of AES encryption (if \enc==1) or decryption (if 481 // Do a single non-last round of AES en/decryption on the block(s) in \data, 497 // Do a single non-last round of AES en/decryption on the blocks in registers 520 // Do tweaked AES en/decryption (i.e., XOR with \tweak, then AES en/decrypt, 558 // decryption uses the last two tweaks in reverse order. We'll handle 719 // because CTS decryption uses the last two tweaks in reverse order. 732 // Swap the first LEN bytes of the en/decryption of the last full block 733 // with the partial block. Note that to support in-place en/decryption, 743 // in-place en/decryption, this must happen before the store to the dst [all …]
|
/linux-6.14.4/Documentation/block/ |
D | inline-encryption.rst | 15 in terms of key, algorithm, data unit size (the granularity of en/decryption), 45 fall back to crypto API en/decryption). 146 handle en/decryption of the bio using blk-crypto-fallback. 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 160 kernel crypto API. Decryption happens from a workqueue, as it may sleep. 206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
|
/linux-6.14.4/block/ |
D | blk-crypto-fallback.c | 374 * The crypto API fallback's main decryption routine. 445 * blk_crypto_fallback_decrypt_endio - queue bio for fallback decryption 449 * Restore bi_private and bi_end_io, and queue the bio for decryption into a 472 * blk_crypto_fallback_bio_prep - Prepare a bio to use fallback en/decryption 481 * For a READ operation, we mark the bio for decryption by using bi_private and 514 * bi_end_io appropriately to trigger decryption when the bio is ended. in blk_crypto_fallback_bio_prep()
|
/linux-6.14.4/drivers/net/wireless/ath/ath9k/ |
D | common-debug.h | 27 decryption process completed 33 * @decrypt_busy_err: Decryption interruptions counter
|
/linux-6.14.4/crypto/ |
D | twofish_generic.c | 36 /* Macros to compute the g() function in the encryption and decryption 48 /* Encryption and decryption Feistel rounds. Each one calls the two g() 68 /* Encryption and decryption cycles; each one is simply two Feistel rounds
|
/linux-6.14.4/drivers/net/wireless/ath/ath5k/ |
D | desc.h | 66 #define AR5K_5210_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000010 /* decryption CRC failure */ 70 #define AR5K_5210_RX_DESC_STATUS1_KEY_INDEX 0x00007e00 /* decryption key index */ 92 #define AR5K_5212_RX_DESC_STATUS1_DECRYPT_CRC_ERROR 0x00000008 /* decryption CRC failure */ 96 #define AR5K_5212_RX_DESC_STATUS1_KEY_INDEX 0x0000fe00 /* decryption key index */
|
/linux-6.14.4/drivers/gpu/drm/nouveau/include/nvrm/535.113.01/common/sdk/nvidia/inc/alloc/ |
D | alloc_channel.h | 160 // IV used for CPU-side encryption / GPU-side decryption. 162 // IV used for CPU-side decryption / GPU-side encryption.
|
/linux-6.14.4/arch/arm/crypto/ |
D | Kconfig | 183 and for XTS mode encryption, CBC and XTS mode decryption speedup is 191 encryption (not CBC decryption), the encryption of XTS tweaks, XTS
|
/linux-6.14.4/Documentation/security/secrets/ |
D | coco.rst | 56 provides the decryption key (= secret) using the secret injection mechanism. 62 because they are encrypted. Host can't read the decryption key because
|
/linux-6.14.4/drivers/crypto/ |
D | sa2ul.h | 72 #define SA_ENG_ID_EM2 3 /* Encryption/Decryption enginefor pass 2 */ 300 * @dec: struct sa_ctx_info for decryption 301 * @keylen: encrption/decryption keylength
|
/linux-6.14.4/fs/ext4/ |
D | readpage.c | 102 * will be disabled for that, decryption may still be needed, causing in verity_work() 119 * We use different work queues for decryption and for verity because in bio_post_read_processing() 120 * verity may require reading metadata pages that need decryption, and in bio_post_read_processing()
|
/linux-6.14.4/drivers/net/wireless/ralink/rt2x00/ |
D | rt2x00queue.h | 92 * @iv: IV/EIV data used during encryption/decryption. 163 * @cipher: Cipher type used during decryption. 164 * @cipher_status: Decryption status. 165 * @iv: IV/EIV data used during decryption. 166 * @icv: ICV data used during decryption.
|
/linux-6.14.4/net/tipc/ |
D | crypto.c | 3 * net/tipc/crypto.c: TIPC crypto for key handling & packet en/decryption 181 * @aead: array of pointers to AEAD keys for encryption/decryption 868 * @aead: TIPC AEAD for the message decryption 873 * * 0 : if the decryption has completed 875 * * < 0 : the decryption has failed 1298 * tipc_crypto_key_pick_tx - Pick one TX key for message decryption 1305 * for the message decryption, that must be a cluster key and not used before 1790 * If the decryption is successful, the decrypted skb is returned directly or 1795 * cluster key(s) can be taken for decryption (- recursive). 1798 * * 0 : the decryption has successfully completed [all …]
|
/linux-6.14.4/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 142 * krb5_decrypt - simple decryption of an RPCSEC GSS payload 681 * %0: decryption successful 682 * negative errno: decryption could not be completed 1029 * decryption function: as follows, where D() is AES decryption in 1040 * %GSS_S_COMPLETE: Decryption successful 1042 * %GSS_S_FAILURE: Decryption failed
|
/linux-6.14.4/Documentation/security/tpm/ |
D | tpm-security.rst | 145 decryption sessions. 152 protect key sealing and parameter decryption to protect key unsealing 189 decryption HMAC session salted to the EK primary (which also does not
|
/linux-6.14.4/fs/smb/client/ |
D | smb2transport.c | 424 struct derivation decryption; member 453 * All channels use the same encryption/decryption keys but in generate_smb3signingkey() 489 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 490 ptriplet->decryption.context, in generate_smb3signingkey() 546 d = &triplet.decryption; in generate_smb30signingkey() 575 d = &triplet.decryption; in generate_smb311signingkey()
|
/linux-6.14.4/fs/crypto/ |
D | bio.c | 3 * Utility functions for file contents encryption/decryption on 24 * the file is also compressed, so decompression is required after decryption),
|