Searched refs:to (Results 1 – 5 of 5) sorted by relevance
32 required if you want the system to operate in a FIPS 200532 Keys are allowed to be from 0 to 256 bits in length, in steps579 the TEA algorithm to address a potential key weakness630 security than XTS, subject to the security bound.692 Addendum to SP800-38A (October 2010))732 rest is used to tie each cipher block to its logical position.755 XCTR mode is used to implement HCTR2.975 (not to be confused with RIPEMD-128).1237 compliant with NIST SP800-90B) intended to provide a seed to a1254 to that cache is measured. The closer the cache is to the CPU[all …]
267 static ssize_t jent_raw_hires_read(struct file *file, char __user *to, in jent_raw_hires_read() argument270 return jent_testing_extract_user(file, to, count, ppos, in jent_raw_hires_read()
22 If signature generation and/or verification are to be used,33 data and provides the ability to instantiate a crypto key from a43 private key data and provides the ability to instantiate a crypto key54 signature data and provides the ability to verify the signature.82 This option causes some selftests to be run on the signature
85 -- Explicit because easier to compute digest on
19 intended for network filesystems to use.
Completed in 15 milliseconds