Home
last modified time | relevance | path

Searched refs:used (Results 1 – 6 of 6) sorted by relevance

/crypto/
A Dalgif_aead.c51 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data()
80 size_t used = 0; /* [in] TX bufs to be en/decrypted */ in _aead_recvmsg() local
95 used = ctx->used; in _aead_recvmsg()
118 outlen = used + as; in _aead_recvmsg()
120 outlen = used - as; in _aead_recvmsg()
126 used -= ctx->aead_assoclen; in _aead_recvmsg()
149 if (used < less) { in _aead_recvmsg()
153 used -= less; in _aead_recvmsg()
157 processed = used + ctx->aead_assoclen; in _aead_recvmsg()
252 areq->first_rsgl.sgl.sgt.sgl, used, ctx->iv); in _aead_recvmsg()
[all …]
A Dacompress.c474 void acomp_walk_done_src(struct acomp_walk *walk, int used) in acomp_walk_done_src() argument
476 walk->slen -= used; in acomp_walk_done_src()
478 scatterwalk_advance(&walk->in, used); in acomp_walk_done_src()
480 scatterwalk_done_src(&walk->in, used); in acomp_walk_done_src()
487 void acomp_walk_done_dst(struct acomp_walk *walk, int used) in acomp_walk_done_dst() argument
489 walk->dlen -= used; in acomp_walk_done_dst()
491 scatterwalk_advance(&walk->out, used); in acomp_walk_done_dst()
493 scatterwalk_done_dst(&walk->out, used); in acomp_walk_done_dst()
A Daf_alg.c717 size_t plen = min_t(size_t, used, sg[i].length); in af_alg_pull_tsgl()
745 used -= plen; in af_alg_pull_tsgl()
746 ctx->used -= plen; in af_alg_pull_tsgl()
759 if (!ctx->used) in af_alg_pull_tsgl()
884 (min && ctx->used >= min)), in af_alg_wait_for_data()
909 if (!ctx->used) in af_alg_data_wakeup()
974 if (ctx->used) { in af_alg_sendmsg()
1016 ctx->used += len; in af_alg_sendmsg()
1058 ctx->used += plen; in af_alg_sendmsg()
1088 ctx->used += plen; in af_alg_sendmsg()
[all …]
A Dalgif_skcipher.c111 if (!ctx->init || (ctx->more && ctx->used < bs)) { in _skcipher_recvmsg()
124 err = af_alg_get_rsgl(sk, msg, flags, areq, ctx->used, &len); in _skcipher_recvmsg()
132 if (ctx->more || len < ctx->used) { in _skcipher_recvmsg()
366 af_alg_pull_tsgl(sk, ctx->used, NULL, 0); in skcipher_sock_destruct()
A DKconfig55 By default the KERNELRELEASE value is used.
192 - Production kernels, to help prevent buggy drivers from being used
213 These are 'Null' algorithms, used by IPsec, which do nothing.
254 profile. This is required for Kerberos 5-style encryption, used by
493 FCrypt algorithm used by RxRPC
732 rest is used to tie each cipher block to its logical position.
755 XCTR mode is used to implement HCTR2.
861 This IV generator is used in some cases by fscrypt and/or
963 This is used in HCTR2. It is not a general-purpose
973 to be used as a secure replacement for the 128-bit hash functions
[all …]
/crypto/asymmetric_keys/
A DKconfig7 the asymmetric keys used for public key cryptographic operations such
22 If signature generation and/or verification are to be used,

Completed in 20 milliseconds