Lines Matching refs:cipher
177 cipher mode. Only select this option by hand if you expect to load
288 Support for the AEAD wrapper using the ChaCha20 stream cipher combined
422 This block cipher algorithm is required for IPSec.
430 This block cipher algorithm is required for TPM2 Cryptography.
439 This block cipher algorithm is required for IPSec.
458 This is the simplest block cipher algorithm. It simply encrypts
468 narrow block cipher mode for dm-crypt. Use it with cipher
471 rest is used to tie each cipher block to its logical position.
479 This block cipher algorithm is required for RxRPC.
487 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
1025 tristate "AES cipher algorithms"
1028 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1045 tristate "Fixed time AES cipher"
1062 tristate "AES cipher algorithms (i586)"
1067 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1084 tristate "AES cipher algorithms (x86_64)"
1089 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1106 tristate "AES cipher algorithms (AES-NI)"
1118 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1134 In addition to AES cipher algorithm support, the acceleration
1135 for some popular block cipher mode is supported too, including
1140 tristate "AES cipher algorithms (SPARC64)"
1147 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1163 In addition to AES cipher algorithm support, the acceleration
1164 for some popular block cipher mode is supported too, including
1168 tristate "AES cipher algorithms (PPC SPE)"
1171 AES cipher algorithms (FIPS-197). Additionally the acceleration
1172 for popular block cipher modes ECB, CBC, CTR and XTS is supported.
1181 tristate "Anubis cipher algorithm"
1184 Anubis cipher algorithm.
1186 Anubis is a variable key length cipher which can use keys from
1195 tristate "ARC4 cipher algorithm"
1198 ARC4 cipher algorithm.
1200 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
1206 tristate "Blowfish cipher algorithm"
1210 Blowfish cipher algorithm, by Bruce Schneier.
1212 This is a variable key length cipher which can use keys from 32
1222 Common parts of the Blowfish cipher algorithm shared by the
1229 tristate "Blowfish cipher algorithm (x86_64)"
1234 Blowfish cipher algorithm (x86_64), by Bruce Schneier.
1236 This is a variable key length cipher which can use keys from 32
1244 tristate "Camellia cipher algorithms"
1248 Camellia cipher algorithms module.
1250 Camellia is a symmetric key block cipher developed jointly
1259 tristate "Camellia cipher algorithm (x86_64)"
1265 Camellia cipher algorithm module (x86_64).
1267 Camellia is a symmetric key block cipher developed jointly
1276 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
1285 Camellia cipher algorithm module (x86_64/AES-NI/AVX).
1287 Camellia is a symmetric key block cipher developed jointly
1296 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
1301 Camellia cipher algorithm module (x86_64/AES-NI/AVX2).
1303 Camellia is a symmetric key block cipher developed jointly
1312 tristate "Camellia cipher algorithm (SPARC64)"
1317 Camellia cipher algorithm module (SPARC64).
1319 Camellia is a symmetric key block cipher developed jointly
1330 Common parts of the CAST cipher algorithms shared by the
1334 tristate "CAST5 (CAST-128) cipher algorithm"
1342 tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
1352 This module provides the Cast5 cipher algorithm that processes
1356 tristate "CAST6 (CAST-256) cipher algorithm"
1364 tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
1376 This module provides the Cast6 cipher algorithm that processes
1380 tristate "DES and Triple DES EDE cipher algorithms"
1383 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1386 tristate "DES and Triple DES EDE cipher algorithms (SPARC64)"
1391 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3),
1395 tristate "Triple DES EDE cipher algorithm (x86-64)"
1402 This module provides implementation of the Triple DES EDE cipher
1408 tristate "FCrypt cipher algorithm"
1415 tristate "Khazad cipher algorithm"
1418 Khazad cipher algorithm.
1428 tristate "Salsa20 stream cipher algorithm"
1431 Salsa20 stream cipher algorithm.
1433 Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
1436 The Salsa20 stream cipher algorithm is designed by Daniel J.
1440 tristate "ChaCha20 cipher algorithm"
1443 ChaCha20 cipher algorithm, RFC7539.
1445 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1453 tristate "ChaCha20 cipher algorithm (x86_64/SSSE3/AVX2)"
1458 ChaCha20 cipher algorithm, RFC7539.
1460 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1468 tristate "SEED cipher algorithm"
1471 SEED cipher algorithm (RFC4269).
1473 SEED is a 128-bit symmetric key block cipher that has been
1476 It is a 16 round block cipher with the key size of 128 bit.
1482 tristate "Serpent cipher algorithm"
1485 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1495 tristate "Serpent cipher algorithm (x86_64/SSE2)"
1502 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1507 This module provides Serpent cipher algorithm that processes eight
1514 tristate "Serpent cipher algorithm (i586/SSE2)"
1521 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1526 This module provides Serpent cipher algorithm that processes four
1533 tristate "Serpent cipher algorithm (x86_64/AVX)"
1541 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1546 This module provides the Serpent cipher algorithm that processes
1553 tristate "Serpent cipher algorithm (x86_64/AVX2)"
1557 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1562 This module provides Serpent cipher algorithm that processes 16
1569 tristate "SM4 cipher algorithm"
1572 SM4 cipher algorithms (OSCCA GB/T 32907-2016).
1594 tristate "Speck cipher algorithm"
1597 Speck is a lightweight block cipher that is tuned for optimal
1608 tristate "TEA, XTEA and XETA cipher algorithms"
1611 TEA cipher algorithm.
1613 Tiny Encryption Algorithm is a simple cipher that uses
1625 tristate "Twofish cipher algorithm"
1629 Twofish cipher algorithm.
1632 candidate cipher by researchers at CounterPane Systems. It is a
1633 16 round block cipher supporting key sizes of 128, 192, and 256
1642 Common parts of the Twofish cipher algorithm shared by the
1646 tristate "Twofish cipher algorithms (i586)"
1651 Twofish cipher algorithm.
1654 candidate cipher by researchers at CounterPane Systems. It is a
1655 16 round block cipher supporting key sizes of 128, 192, and 256
1662 tristate "Twofish cipher algorithm (x86_64)"
1667 Twofish cipher algorithm (x86_64).
1670 candidate cipher by researchers at CounterPane Systems. It is a
1671 16 round block cipher supporting key sizes of 128, 192, and 256
1678 tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
1685 Twofish cipher algorithm (x86_64, 3-way parallel).
1688 candidate cipher by researchers at CounterPane Systems. It is a
1689 16 round block cipher supporting key sizes of 128, 192, and 256
1692 This module provides Twofish cipher algorithm that processes three
1699 tristate "Twofish cipher algorithm (x86_64/AVX)"
1708 Twofish cipher algorithm (x86_64/AVX).
1711 candidate cipher by researchers at CounterPane Systems. It is a
1712 16 round block cipher supporting key sizes of 128, 192, and 256
1715 This module provides the Twofish cipher algorithm that processes
1850 tristate "User-space interface for symmetric key cipher algorithms"
1856 key cipher algorithms.
1868 tristate "User-space interface for AEAD cipher algorithms"
1876 cipher algorithms.