Lines Matching refs:data
35 * associated data memory location before performing the encryption or
46 * associated data || plaintext or ciphertext.
53 * used to verify the integrity of the plaintext and the associated data.
59 * the associated data, even though it won't be written to. This makes the
61 * "destination" associated data to alias the "source" associated data.
65 * associated data, the first element must point to the plaintext/ciphertext.
69 * of the associated data buffer must contain a second copy of the IV. This is
73 * treat the IV as associated data; nevertheless the length passed to
83 * @assoclen: Length in bytes of associated data for authentication
84 * @cryptlen: Length of data to be encrypted or decrypted
86 * @src: Source data
87 * @dst: Destination data
88 * @__ctx: Start of private context data
107 * @encrypt_tlen: total data size handled by encrypt requests
109 * @decrypt_tlen: total data size handled by decrypt requests
125 * integrity of the encrypted data, a consumer typically wants the
251 * crypto_aead_authsize() - obtain maximum authentication data size
254 * The maximum size of the authentication data for the AEAD cipher referenced
255 * by the AEAD cipher handle is returned. The authentication data size may be
258 * The authentication data may also be known as "tag value".
260 * Return: authentication data size / tag size in bytes
283 * data returned by the encryption or decryption operation
332 * crypto_aead_setauthsize() - set authentication data size
334 * @authsize: size of the authentication data / tag in bytes
336 * Set the authentication data size / tag size. AEAD requires an authentication
337 * tag (or MAC) in addition to the associated data.
353 * Encrypt plaintext data using the aead_request handle. That data structure
354 * and how it is filled with data is discussed with the aead_request_*
357 * IMPORTANT NOTE The encryption operation creates the authentication data /
358 * tag. That data is concatenated with the created ciphertext.
374 * Decrypt ciphertext data using the aead_request handle. That data structure
375 * and how it is filled with data is discussed with the aead_request_*
379 * authentication data / tag. That authentication data / tag
385 * cipher operation performs the authentication of the data during the
388 * integrity of the ciphertext or the associated data was violated);
396 * The aead_request data structure contains all pointers to data required for
405 * crypto_aead_reqsize() - obtain size of the request data structure
421 * data structure with a different one.
430 * aead_request_alloc() - allocate request data structure
434 * Allocate the request data structure that must be used with the AEAD
436 * handle is registered in the request data structure.
454 * aead_request_free() - zeroize and free request data structure
455 * @req: request data structure cipher handle to be freed
470 * @data: The data pointer refers to memory that is not used by the kernel
474 * related functionality, it may need to access data structures of the
476 * callback function can access the memory via the "data" field in the
477 * crypto_async_request data structure provided to the callback function.
490 void *data)
493 req->base.data = data;
498 * aead_request_set_crypt - set data buffers
506 * Setting the source data and destination data scatter / gather lists which
507 * hold the associated data concatenated with the plaintext or ciphertext. See
516 * - AEAD encryption input: assoc data || plaintext
517 * - AEAD encryption output: assoc data || ciphertext || auth tag
518 * - AEAD decryption input: assoc data || ciphertext || auth tag
519 * - AEAD decryption output: assoc data || plaintext
523 * caller wants to have that data buffer filled, the caller must either
539 * aead_request_set_ad - set associated data information
541 * @assoclen: number of bytes in associated data
544 * the associated data.