Lines Matching full:cipher
32 * struct skcipher_request - Symmetric key cipher request
98 * struct skcipher_alg - symmetric key cipher definition
170 * struct lskcipher_alg - linear symmetric key cipher definition
229 * DOC: Symmetric Key Cipher API
231 * Symmetric key cipher API is used with the ciphers of type
234 * Asynchronous cipher operations imply that the function invocation for a
235 * cipher request returns immediately before the completion of the operation.
236 * The cipher request is scheduled as a separate kernel thread and therefore
238 * the kernel crypto API to inform the caller about the completion of a cipher
240 * invoked with the cipher handle when the request completes.
243 * cipher handle must be supplied to the kernel crypto API. That additional
246 * For the symmetric key cipher API, the state is maintained with the tfm
247 * cipher handle. A single tfm can be used across multiple calls and in
248 * parallel. For asynchronous block cipher calls, context data supplied and
250 * addition to the IV used for the cipher request. The maintenance of such
253 * cipher operation, that callback function may need some information about
265 * crypto_alloc_skcipher() - allocate symmetric key cipher handle
267 * skcipher cipher
268 * @type: specifies the type of the cipher
269 * @mask: specifies the mask for the cipher
271 * Allocate a cipher handle for an skcipher. The returned struct
272 * crypto_skcipher is the cipher handle that is required for any subsequent
275 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
286 * crypto_alloc_lskcipher() - allocate linear symmetric key cipher handle
289 * @type: specifies the type of the cipher
290 * @mask: specifies the mask for the cipher
292 * Allocate a cipher handle for an lskcipher. The returned struct
293 * crypto_lskcipher is the cipher handle that is required for any subsequent
296 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
315 * crypto_free_skcipher() - zeroize and free cipher handle
316 * @tfm: cipher handle to be freed
331 * crypto_free_lskcipher() - zeroize and free cipher handle
332 * @tfm: cipher handle to be freed
388 * @tfm: cipher handle
390 * The size of the IV for the skcipher referenced by the cipher handle is
391 * returned. This IV size may be zero if the cipher does not need an IV.
408 * @tfm: cipher handle
410 * The size of the IV for the lskcipher referenced by the cipher handle is
411 * returned. This IV size may be zero if the cipher does not need an IV.
422 * crypto_skcipher_blocksize() - obtain block size of cipher
423 * @tfm: cipher handle
425 * The block size for the skcipher referenced with the cipher handle is
429 * Return: block size of cipher
438 * crypto_lskcipher_blocksize() - obtain block size of cipher
439 * @tfm: cipher handle
441 * The block size for the lskcipher referenced with the cipher handle is
445 * Return: block size of cipher
455 * @tfm: cipher handle
472 * @tfm: cipher handle
489 * @tfm: cipher handle
506 * @tfm: cipher handle
592 * crypto_skcipher_setkey() - set key for cipher
593 * @tfm: cipher handle
597 * The caller provided key is set for the skcipher referenced by the cipher
600 * Note, the key length determines the cipher type. Many block ciphers implement
601 * different cipher modes depending on the key size, such as AES-128 vs AES-192
602 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
617 * crypto_lskcipher_setkey() - set key for cipher
618 * @tfm: cipher handle
622 * The caller provided key is set for the lskcipher referenced by the cipher
625 * Note, the key length determines the cipher type. Many block ciphers implement
626 * different cipher modes depending on the key size, such as AES-128 vs AES-192
627 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
660 * crypto_skcipher_reqtfm() - obtain cipher handle from request
661 * @req: skcipher_request out of which the cipher handle is to be obtained
685 * needed to perform the cipher operation
691 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
698 * needed to perform the cipher operation
704 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
722 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
737 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
747 * @siv: IV + state for the cipher operation. The length of the IV must
753 * Return: >=0 if the cipher operation was successful, if positive
766 * @siv: IV + state for the cipher operation. The length of the IV must
773 * Return: >=0 if the cipher operation was successful, if positive
781 * DOC: Symmetric Key Cipher Request Handle
784 * required for the symmetric key cipher operation. This includes the cipher
793 * @tfm: cipher handle
803 * skcipher_request_set_tfm() - update cipher handle reference in request
805 * @tfm: cipher handle that shall be added to the request handle
830 * @tfm: cipher handle to be registered with the request
856 * @req: request data structure cipher handle to be freed
888 * cipher operation completes.
911 * @iv: IV for the cipher operation which must comply with the IV size defined