Searched refs:used (Results 1 – 6 of 6) sorted by relevance
| /crypto/ |
| A D | algif_aead.c | 51 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data() 80 size_t used = 0; /* [in] TX bufs to be en/decrypted */ in _aead_recvmsg() local 95 used = ctx->used; in _aead_recvmsg() 118 outlen = used + as; in _aead_recvmsg() 120 outlen = used - as; in _aead_recvmsg() 126 used -= ctx->aead_assoclen; in _aead_recvmsg() 149 if (used < less) { in _aead_recvmsg() 153 used -= less; in _aead_recvmsg() 157 processed = used + ctx->aead_assoclen; in _aead_recvmsg() 252 areq->first_rsgl.sgl.sgt.sgl, used, ctx->iv); in _aead_recvmsg() [all …]
|
| A D | acompress.c | 474 void acomp_walk_done_src(struct acomp_walk *walk, int used) in acomp_walk_done_src() argument 476 walk->slen -= used; in acomp_walk_done_src() 478 scatterwalk_advance(&walk->in, used); in acomp_walk_done_src() 480 scatterwalk_done_src(&walk->in, used); in acomp_walk_done_src() 487 void acomp_walk_done_dst(struct acomp_walk *walk, int used) in acomp_walk_done_dst() argument 489 walk->dlen -= used; in acomp_walk_done_dst() 491 scatterwalk_advance(&walk->out, used); in acomp_walk_done_dst() 493 scatterwalk_done_dst(&walk->out, used); in acomp_walk_done_dst()
|
| A D | af_alg.c | 717 size_t plen = min_t(size_t, used, sg[i].length); in af_alg_pull_tsgl() 745 used -= plen; in af_alg_pull_tsgl() 746 ctx->used -= plen; in af_alg_pull_tsgl() 759 if (!ctx->used) in af_alg_pull_tsgl() 884 (min && ctx->used >= min)), in af_alg_wait_for_data() 909 if (!ctx->used) in af_alg_data_wakeup() 974 if (ctx->used) { in af_alg_sendmsg() 1016 ctx->used += len; in af_alg_sendmsg() 1058 ctx->used += plen; in af_alg_sendmsg() 1088 ctx->used += plen; in af_alg_sendmsg() [all …]
|
| A D | algif_skcipher.c | 111 if (!ctx->init || (ctx->more && ctx->used < bs)) { in _skcipher_recvmsg() 124 err = af_alg_get_rsgl(sk, msg, flags, areq, ctx->used, &len); in _skcipher_recvmsg() 132 if (ctx->more || len < ctx->used) { in _skcipher_recvmsg() 366 af_alg_pull_tsgl(sk, ctx->used, NULL, 0); in skcipher_sock_destruct()
|
| A D | Kconfig | 55 By default the KERNELRELEASE value is used. 192 - Production kernels, to help prevent buggy drivers from being used 213 These are 'Null' algorithms, used by IPsec, which do nothing. 254 profile. This is required for Kerberos 5-style encryption, used by 493 FCrypt algorithm used by RxRPC 732 rest is used to tie each cipher block to its logical position. 755 XCTR mode is used to implement HCTR2. 861 This IV generator is used in some cases by fscrypt and/or 963 This is used in HCTR2. It is not a general-purpose 973 to be used as a secure replacement for the 128-bit hash functions [all …]
|
| /crypto/asymmetric_keys/ |
| A D | Kconfig | 7 the asymmetric keys used for public key cryptographic operations such 22 If signature generation and/or verification are to be used,
|
Completed in 20 milliseconds