Lines Matching full:aes

38 -  aes
40 - ecb(aes)
42 - cmac(aes)
44 - ccm(aes)
46 - rfc4106(gcm(aes))
52 - authenc(hmac(sha1),cbc(aes))
54 In these examples, "aes" and "sha1" are the ciphers and all others are
102 or a single block cipher. For example, AES on newer Intel hardware has
103 the following implementations: AES-NI, assembler implementation, or
104 straight C. Now, when using the string "aes" with the kernel crypto API,
180 (e.g. AES-128 vs. AES-192 vs. AES-256). These key sizes are determined
257 The depicted example decomposes the AEAD cipher of GCM(AES) based on the
258 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c,
263 AES-NI) provide implementations merging aspects which in the view of the
265 the AES-NI implementation, the CTR mode, the GHASH implementation and
266 the AES cipher are all merged into one cipher implementation registered
311 | (aes) |
318 configuration, the administrator set up the use of seqiv(rfc4106(gcm(aes)))
332 During instantiation of the GCM handle, the CTR(AES) and GHASH
333 ciphers are instantiated. The cipher handles for CTR(AES) and GHASH
336 The GCM implementation is responsible to invoke the CTR mode AES and
341 with the instantiated CTR(AES) cipher handle.
343 During instantiation of the CTR(AES) cipher, the CIPHER type
344 implementation of AES is instantiated. The cipher handle for AES is
347 That means that the SKCIPHER implementation of CTR(AES) only
349 chaining operation, the CIPHER implementation of AES is invoked.
351 4. The SKCIPHER of CTR(AES) now invokes the CIPHER API with the AES
367 For example, CBC(AES) is implemented with cbc.c, and aes-generic.c. The