Lines Matching refs:algorithm
138 tristate "Cryptographic algorithm manager"
154 tristate "Userspace cryptographic algorithm configuration"
166 algorithm registration.
200 This converts an arbitrary crypto algorithm into a parallel
201 algorithm that executes in kernel threads.
210 converts an arbitrary synchronous software crypto algorithm
211 into an asynchronous algorithm that executes in a kernel thread.
250 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
257 DH (Diffie-Hellman) key exchange algorithm
281 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
318 SM2 (ShangMi 2) public key algorithm
383 Anubis cipher algorithm
396 ARIA cipher algorithm (RFC5794)
398 ARIA is a standard encryption algorithm of the Republic of Korea.
405 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
412 Blowfish cipher algorithm, by Bruce Schneier
423 Common parts of the Blowfish cipher algorithm shared by the
450 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
457 CAST6 (CAST-256) encryption algorithm (RFC2612)
473 FCrypt algorithm used by RxRPC
482 Khazad cipher algorithm
485 an algorithm optimized for 64-bit processors with good performance
496 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
500 national standard encryption algorithm of the Republic of Korea.
503 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
510 Serpent cipher algorithm, by Anderson, Biham & Knudsen
559 the TEA algorithm to address a potential key weakness
560 in the TEA algorithm.
563 of the XTEA algorithm for compatibility purposes.
570 Twofish cipher algorithm
582 Common parts of the Twofish cipher algorithm shared by the
620 ARC4 cipher algorithm
623 bits in length. This algorithm is required for driver-based
625 weakness of the algorithm.
794 AEGIS-128 AEAD algorithm
801 AEGIS-128 AEAD algorithm
850 xoring it with a salt. This algorithm is mainly useful for CTR.
865 algorithm for CBC.
948 MD4 message digest algorithm (RFC1320)
954 MD5 message digest algorithm (RFC1321)
965 This algorithm is required for TKIP, but it should not be used for
966 other purposes because of the weakness of the algorithm.
983 Poly1305 authenticator algorithm (RFC7539)
985 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
1012 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)
1071 VMAC is a message authentication algorithm designed for
1102 xxHash non-cryptographic hash algorithm
1117 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1132 CRC32 CRC algorithm (IEEE 802.3)
1140 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
1142 CRC algorithm used by the SCSI Block Commands standard.
1145 tristate "CRC64 based on Rocksoft Model algorithm"
1149 CRC64 CRC algorithm based on the Rocksoft Model CRC Algorithm
1166 Deflate compression algorithm (RFC1951)
1177 LZO compression algorithm
1188 842 compression algorithm by IBM
1199 LZ4 compression algorithm
1210 LZ4 high compression mode algorithm
1221 zstd compression algorithm
1236 This uses the AES cipher algorithm.
1270 This uses the AES cipher algorithm with the counter block mode.