Home
last modified time | relevance | path

Searched refs:to (Results 1 – 5 of 5) sorted by relevance

/crypto/
A DKconfig32 required if you want the system to operate in a FIPS 200
532 Keys are allowed to be from 0 to 256 bits in length, in steps
579 the TEA algorithm to address a potential key weakness
630 security than XTS, subject to the security bound.
692 Addendum to SP800-38A (October 2010))
732 rest is used to tie each cipher block to its logical position.
755 XCTR mode is used to implement HCTR2.
975 (not to be confused with RIPEMD-128).
1237 compliant with NIST SP800-90B) intended to provide a seed to a
1254 to that cache is measured. The closer the cache is to the CPU
[all …]
A Djitterentropy-testing.c267 static ssize_t jent_raw_hires_read(struct file *file, char __user *to, in jent_raw_hires_read() argument
270 return jent_testing_extract_user(file, to, count, ppos, in jent_raw_hires_read()
/crypto/asymmetric_keys/
A DKconfig22 If signature generation and/or verification are to be used,
33 data and provides the ability to instantiate a crypto key from a
43 private key data and provides the ability to instantiate a crypto key
54 signature data and provides the ability to verify the signature.
82 This option causes some selftests to be run on the signature
A Dpkcs7.asn185 -- Explicit because easier to compute digest on
/crypto/krb5/
A DKconfig19 intended for network filesystems to use.

Completed in 15 milliseconds