Lines Matching refs:cipher

322 	  Support for the AEAD wrapper using the ChaCha20 stream cipher combined
376 This block cipher algorithm is required for IPSec.
384 This block cipher algorithm is required for TPM2 Cryptography.
392 This block cipher algorithm is required for IPSec.
415 This is the simplest block cipher algorithm. It simply encrypts
425 narrow block cipher mode for dm-crypt. Use it with cipher
428 rest is used to tie each cipher block to its logical position.
435 OFB: the Output Feedback mode makes a block cipher into a synchronous
436 stream cipher. It generates keystream blocks, which are then XORed
448 This block cipher algorithm is required for RxRPC.
456 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
499 each sector using the XChaCha12 stream cipher, two passes of
501 the AES-256 block cipher on a single 16-byte block. On CPUs
527 and decryption requests to the encapsulated cipher after applying
1090 tristate "AES cipher algorithms"
1094 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1111 tristate "Fixed time AES cipher"
1130 tristate "AES cipher algorithms (AES-NI)"
1141 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1157 In addition to AES cipher algorithm support, the acceleration
1158 for some popular block cipher mode is supported too, including
1163 tristate "AES cipher algorithms (SPARC64)"
1169 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1185 In addition to AES cipher algorithm support, the acceleration
1186 for some popular block cipher mode is supported too, including
1190 tristate "AES cipher algorithms (PPC SPE)"
1194 AES cipher algorithms (FIPS-197). Additionally the acceleration
1195 for popular block cipher modes ECB, CBC, CTR and XTS is supported.
1204 tristate "Anubis cipher algorithm"
1208 Anubis cipher algorithm.
1210 Anubis is a variable key length cipher which can use keys from
1219 tristate "ARC4 cipher algorithm"
1224 ARC4 cipher algorithm.
1226 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
1232 tristate "Blowfish cipher algorithm"
1236 Blowfish cipher algorithm, by Bruce Schneier.
1238 This is a variable key length cipher which can use keys from 32
1248 Common parts of the Blowfish cipher algorithm shared by the
1255 tristate "Blowfish cipher algorithm (x86_64)"
1260 Blowfish cipher algorithm (x86_64), by Bruce Schneier.
1262 This is a variable key length cipher which can use keys from 32
1270 tristate "Camellia cipher algorithms"
1274 Camellia cipher algorithms module.
1276 Camellia is a symmetric key block cipher developed jointly
1285 tristate "Camellia cipher algorithm (x86_64)"
1291 Camellia cipher algorithm module (x86_64).
1293 Camellia is a symmetric key block cipher developed jointly
1302 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
1311 Camellia cipher algorithm module (x86_64/AES-NI/AVX).
1313 Camellia is a symmetric key block cipher developed jointly
1322 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
1327 Camellia cipher algorithm module (x86_64/AES-NI/AVX2).
1329 Camellia is a symmetric key block cipher developed jointly
1338 tristate "Camellia cipher algorithm (SPARC64)"
1344 Camellia cipher algorithm module (SPARC64).
1346 Camellia is a symmetric key block cipher developed jointly
1357 Common parts of the CAST cipher algorithms shared by the
1361 tristate "CAST5 (CAST-128) cipher algorithm"
1369 tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
1379 This module provides the Cast5 cipher algorithm that processes
1383 tristate "CAST6 (CAST-256) cipher algorithm"
1391 tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
1403 This module provides the Cast6 cipher algorithm that processes
1407 tristate "DES and Triple DES EDE cipher algorithms"
1411 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1414 tristate "DES and Triple DES EDE cipher algorithms (SPARC64)"
1420 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3),
1424 tristate "Triple DES EDE cipher algorithm (x86-64)"
1431 This module provides implementation of the Triple DES EDE cipher
1437 tristate "FCrypt cipher algorithm"
1444 tristate "Khazad cipher algorithm"
1448 Khazad cipher algorithm.
1458 tristate "Salsa20 stream cipher algorithm"
1461 Salsa20 stream cipher algorithm.
1463 Salsa20 is a stream cipher submitted to eSTREAM, the ECRYPT
1466 The Salsa20 stream cipher algorithm is designed by Daniel J.
1470 tristate "ChaCha stream cipher algorithms"
1474 The ChaCha20, XChaCha20, and XChaCha12 stream cipher algorithms.
1476 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1492 tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
1502 tristate "ChaCha stream cipher algorithms (MIPS 32r2 optimized)"
1508 tristate "SEED cipher algorithm"
1512 SEED cipher algorithm (RFC4269).
1514 SEED is a 128-bit symmetric key block cipher that has been
1517 It is a 16 round block cipher with the key size of 128 bit.
1523 tristate "Serpent cipher algorithm"
1526 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1536 tristate "Serpent cipher algorithm (x86_64/SSE2)"
1543 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1548 This module provides Serpent cipher algorithm that processes eight
1555 tristate "Serpent cipher algorithm (i586/SSE2)"
1562 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1567 This module provides Serpent cipher algorithm that processes four
1574 tristate "Serpent cipher algorithm (x86_64/AVX)"
1582 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1587 This module provides the Serpent cipher algorithm that processes
1594 tristate "Serpent cipher algorithm (x86_64/AVX2)"
1598 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1603 This module provides Serpent cipher algorithm that processes 16
1610 tristate "SM4 cipher algorithm"
1613 SM4 cipher algorithms (OSCCA GB/T 32907-2016).
1635 tristate "TEA, XTEA and XETA cipher algorithms"
1639 TEA cipher algorithm.
1641 Tiny Encryption Algorithm is a simple cipher that uses
1653 tristate "Twofish cipher algorithm"
1657 Twofish cipher algorithm.
1660 candidate cipher by researchers at CounterPane Systems. It is a
1661 16 round block cipher supporting key sizes of 128, 192, and 256
1670 Common parts of the Twofish cipher algorithm shared by the
1674 tristate "Twofish cipher algorithms (i586)"
1679 Twofish cipher algorithm.
1682 candidate cipher by researchers at CounterPane Systems. It is a
1683 16 round block cipher supporting key sizes of 128, 192, and 256
1690 tristate "Twofish cipher algorithm (x86_64)"
1695 Twofish cipher algorithm (x86_64).
1698 candidate cipher by researchers at CounterPane Systems. It is a
1699 16 round block cipher supporting key sizes of 128, 192, and 256
1706 tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
1713 Twofish cipher algorithm (x86_64, 3-way parallel).
1716 candidate cipher by researchers at CounterPane Systems. It is a
1717 16 round block cipher supporting key sizes of 128, 192, and 256
1720 This module provides Twofish cipher algorithm that processes three
1727 tristate "Twofish cipher algorithm (x86_64/AVX)"
1736 Twofish cipher algorithm (x86_64/AVX).
1739 candidate cipher by researchers at CounterPane Systems. It is a
1740 16 round block cipher supporting key sizes of 128, 192, and 256
1743 This module provides the Twofish cipher algorithm that processes
1878 tristate "User-space interface for symmetric key cipher algorithms"
1884 key cipher algorithms.
1905 tristate "User-space interface for AEAD cipher algorithms"
1913 cipher algorithms.