Lines Matching refs:data
33 * pointer to the associated data memory location before performing the
35 * data memory is filled during the encryption operation. For decryption, the
36 * associated data memory must contain data that is used to verify the integrity
37 * of the decrypted data. Another deviation from the asynchronous block cipher
47 * associated data || plaintext or ciphertext.
57 * the associated data, even though it won't be written to. This makes the
59 * "destination" associated data to alias the "source" associated data.
63 * associated data, the first element must point to the plaintext/ciphertext.
67 * of the associated data buffer must contain a second copy of the IV. This is
71 * treat the IV as associated data; nevertheless the length passed to
80 * @assoclen: Length in bytes of associated data for authentication
81 * @cryptlen: Length of data to be encrypted or decrypted
83 * @src: Source data
84 * @dst: Destination data
85 * @__ctx: Start of private context data
106 * integrity of the encrypted data, a consumer typically wants the
222 * crypto_aead_authsize() - obtain maximum authentication data size
225 * The maximum size of the authentication data for the AEAD cipher referenced
226 * by the AEAD cipher handle is returned. The authentication data size may be
229 * The authentication data may also be known as "tag value".
231 * Return: authentication data size / tag size in bytes
254 * data returned by the encryption or decryption operation
303 * crypto_aead_setauthsize() - set authentication data size
305 * @authsize: size of the authentication data / tag in bytes
307 * Set the authentication data size / tag size. AEAD requires an authentication
308 * tag (or MAC) in addition to the associated data.
324 * Encrypt plaintext data using the aead_request handle. That data structure
325 * and how it is filled with data is discussed with the aead_request_*
328 * IMPORTANT NOTE The encryption operation creates the authentication data /
329 * tag. That data is concatenated with the created ciphertext.
345 * Decrypt ciphertext data using the aead_request handle. That data structure
346 * and how it is filled with data is discussed with the aead_request_*
350 * authentication data / tag. That authentication data / tag
356 * cipher operation performs the authentication of the data during the
359 * integrity of the ciphertext or the associated data was violated);
367 * The aead_request data structure contains all pointers to data required for
376 * crypto_aead_reqsize() - obtain size of the request data structure
392 * data structure with a different one.
401 * aead_request_alloc() - allocate request data structure
405 * Allocate the request data structure that must be used with the AEAD
407 * handle is registered in the request data structure.
425 * aead_request_free() - zeroize and free request data structure
426 * @req: request data structure cipher handle to be freed
441 * @data: The data pointer refers to memory that is not used by the kernel
445 * related functionality, it may need to access data structures of the
447 * callback function can access the memory via the "data" field in the
448 * crypto_async_request data structure provided to the callback function.
461 void *data)
464 req->base.data = data;
469 * aead_request_set_crypt - set data buffers
477 * Setting the source data and destination data scatter / gather lists which
478 * hold the associated data concatenated with the plaintext or ciphertext. See
487 * - AEAD encryption input: assoc data || plaintext
488 * - AEAD encryption output: assoc data || cipherntext || auth tag
489 * - AEAD decryption input: assoc data || ciphertext || auth tag
490 * - AEAD decryption output: assoc data || plaintext
494 * caller wants to have that data buffer filled, the caller must either
510 * aead_request_set_ad - set associated data information
512 * @assoclen: number of bytes in associated data
515 * the associated data.