/openbmc/linux/drivers/crypto/aspeed/ |
H A D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 47 Supports AES/DES symmetric-key encryption and decryption 58 Supports 256 bits to 4096 bits RSA encryption/decryption
|
/openbmc/linux/Documentation/networking/ |
H A D | tls-offload.rst | 22 latency on socket reads (decryption only starts when a read syscall 54 On the receive side if the device handled decryption and authentication 59 request, records are retrieved from the socket and passed to decryption routine. 60 If device decrypted all the segments of the record the decryption is skipped, 61 otherwise software path handles decryption. 180 decryption, authentication for each record in the packet). The device leaves 189 and takes care of partial decryption. 284 arrive continue decryption. Finally when 2 arrives it's completely outside 286 handling. ``ktls`` software fallback handles the decryption of record 324 At this point the device is in sync and can resume decryption at next [all …]
|
H A D | tls.rst | 104 be received before decryption can happen. 121 ``EBADMSG`` is returned if decryption failed for any other reason. 276 record decryption failed (e.g. due to incorrect authentication tag)
|
/openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/libdvbcsa/libdvbcsa/ |
H A D | libdvbcsa.pc | 6 …ion of the DVB Common Scrambling Algorithm - DVB/CSA - with encryption and decryption capabilities.
|
/openbmc/linux/Documentation/crypto/ |
H A D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 172 - ALG_OP_DECRYPT - decryption of data 218 should be processed for encryption or decryption. In addition, the IV is 231 - ALG_OP_DECRYPT - decryption of data 254 The authenticated decryption operation may indicate an integrity error. 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 286 - AEAD decryption output: plaintext 396 the given size will be generated. For a decryption operation, the
|
H A D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 68 this has the quickest encryption/decryption routines i've seen. 85 encryption/decryption is still slower on the sparc and 68000. 244 or about 32 to 40 instructions per en/decryption. 275 the en/decryption routines each use 6 necessary register variables, 355 en/decryption with the key k. if you use DesMethod, 360 will be set to magic constants which speed up the encryption/decryption
|
H A D | api-samples.rst | 29 * encryption/decryption operations. But in this example, we'll just do a
|
/openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/vlc/ |
H A D | libdvdcss_1.4.3.bb | 2 …ary designed for accessing DVDs like a block device without having to bother about the decryption."
|
/openbmc/linux/fs/smb/client/ |
H A D | smb2transport.c | 424 struct derivation decryption; member 489 rc = generate_key(ses, ptriplet->decryption.label, in generate_smb3signingkey() 490 ptriplet->decryption.context, in generate_smb3signingkey() 546 d = &triplet.decryption; in generate_smb30signingkey() 575 d = &triplet.decryption; in generate_smb311signingkey()
|
H A D | Kconfig | 141 bool "Dump encryption keys for offline decryption (Unsafe)" 144 Enabling this will dump the encryption and decryption keys
|
/openbmc/u-boot/board/xilinx/zynq/ |
H A D | Kconfig | 14 bool "Enable zynq aes command for decryption of encrypted images"
|
/openbmc/linux/Documentation/driver-api/mei/ |
H A D | hdcp.rst | 15 for decryption and verification.
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/opensc/ |
H A D | opensc_0.25.1.bb |
|
/openbmc/linux/fs/smb/server/ |
H A D | auth.c | 836 struct derivation decryption; member 851 rc = generate_key(conn, sess, ptwin->decryption.label, in generate_smb3encryptionkey() 852 ptwin->decryption.context, in generate_smb3encryptionkey() 889 d = &twin.decryption; in ksmbd_gen_smb30_encryptionkey() 910 d = &twin.decryption; in ksmbd_gen_smb311_encryptionkey()
|
/openbmc/linux/Documentation/security/secrets/ |
H A D | coco.rst | 56 provides the decryption key (= secret) using the secret injection mechanism. 62 because they are encrypted. Host can't read the decryption key because
|
/openbmc/linux/drivers/isdn/mISDN/ |
H A D | Kconfig | 23 decryption. It may use hardware features if available.
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/ |
H A D | tpm2-tss-engine_1.2.0.bb | 2 … interface of the TSS 2.0 for downwards communication. It supports RSA decryption and signatures a…
|
/openbmc/linux/Documentation/block/ |
H A D | inline-encryption.rst | 15 in terms of key, algorithm, data unit size (the granularity of en/decryption), 45 fall back to crypto API en/decryption). 146 handle en/decryption of the bio using blk-crypto-fallback. 155 For decryption, blk-crypto-fallback "wraps" the bio's completion callback 206 for en/decryption. Users don't need to worry about freeing the bio_crypt_ctx
|
/openbmc/qemu/qapi/ |
H A D | crypto.json | 178 # decryption key. Mandatory except when probing image for 192 # decryption key. Mandatory except when probing image for 538 # the password for decryption.
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | Kconfig | 8 as encryption, decryption, signature generation and signature
|
/openbmc/openbmc/poky/meta/recipes-support/gpgme/ |
H A D | gpgme_1.24.0.bb |
|
/openbmc/linux/Documentation/security/keys/ |
H A D | ecryptfs.rst | 17 FEK decryption is called authentication token and, currently, can be stored in a
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | Kconfig | 142 Supported cryptographic primitives: encryption, decryption,
|
/openbmc/qemu/crypto/ |
H A D | cipher-builtin.c.inc | 281 error_setg(errp, "Failed to set decryption key");
|
/openbmc/linux/arch/arm/crypto/ |
H A D | Kconfig | 184 and for XTS mode encryption, CBC and XTS mode decryption speedup is
|