Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 1475) sorted by relevance

12345678910>>...59

/Linux-v5.10/crypto/
DKconfig116 tristate "Cryptographic algorithm manager"
132 tristate "Userspace cryptographic algorithm configuration"
144 algorithm registration.
178 This converts an arbitrary crypto algorithm into a parallel
179 algorithm that executes in kernel threads.
188 converts an arbitrary synchronous software crypto algorithm
189 into an asynchronous algorithm that executes in a kernel thread.
224 tristate "RSA algorithm"
230 Generic implementation of the RSA public key algorithm.
233 tristate "Diffie-Hellman algorithm"
[all …]
Dapi.c381 * crypto_alloc_base - Locate algorithm and allocate transform
382 * @alg_name: Name of algorithm
383 * @type: Type of algorithm
386 * This function should not be used by new algorithm types.
390 * algorithm. If that fails and the kernel supports dynamically loadable
393 * to construct an algorithm on the fly. A refcount is grabbed on the
394 * algorithm which is then associated with the new transform.
495 * crypto_alloc_tfm_node - Locate algorithm and allocate transform
496 * @alg_name: Name of algorithm
497 * @frontend: Frontend algorithm type
[all …]
/Linux-v5.10/Documentation/crypto/
Dapi-intro.rst35 [algorithm api] (for registering algorithms)
37 The idea is to make the user interface and algorithm registration API
103 When submitting a new algorithm for inclusion, a mandatory requirement
204 SHA1 algorithm contributors:
207 DES algorithm contributors:
212 Blowfish algorithm contributors:
216 Twofish algorithm contributors:
220 SHA256/384/512 algorithm contributors:
225 AES algorithm contributors:
233 CAST5 algorithm contributors:
[all …]
/Linux-v5.10/arch/arm64/crypto/
DKconfig13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)"
45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)"
64 tristate "CRCT10DIF digest algorithm using PMULL instructions"
121 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/Linux-v5.10/include/linux/
Dcrypto.h37 * Algorithm masks and types.
63 * Set if the algorithm (or an algorithm which it uses) requires another
64 * algorithm of the same type to handle corner cases.
69 * Set if the algorithm has passed automated run-time testing. Note that
70 * if there is no run-time testing for a given algorithm it is considered
77 * Set if the algorithm is an instance that is built from templates.
81 /* Set this bit if the algorithm provided is hardware accelerated but
93 * Set if the algorithm has a ->setkey() method but can be used without
104 * The algorithm may allocate memory during request processing, i.e. during
105 * encryption, decryption, or hashing. Users can request an algorithm with this
[all …]
Ddim.h15 * Causes a moderation of the algorithm run.
89 * @state: Algorithm state (see below)
97 * @tune_state: Algorithm tuning state (see below)
131 * enum dim_state - DIM algorithm states
133 * These will determine if the algorithm is in a valid state to start an iteration.
136 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if
147 * enum dim_tune_state - DIM algorithm tune states
149 * These will determine which action the algorithm should perform.
151 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference
152 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0
[all …]
/Linux-v5.10/net/batman-adv/
Dbat_algo.c29 * batadv_algo_init() - Initialize batman-adv algorithm management data
53 * batadv_algo_register() - Register callbacks for a mesh algorithm
54 * @bat_algo_ops: mesh algorithm callbacks to add
64 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register()
88 * batadv_algo_select() - Select algorithm of soft interface
90 * @name: name of the algorithm to select
92 * The algorithm callbacks for the soft interface will be set when the algorithm
93 * with the correct name was found. Any previous selected algorithm will not be
94 * deinitialized and the new selected algorithm will also not be initialized.
147 pr_err("Routing algorithm '%s' is not supported\n", algo_name); in batadv_param_set_ra()
[all …]
/Linux-v5.10/Documentation/networking/
Dnet_dim.rst21 processing. The mechanism includes an algorithm which decides if and how to
24 iteration of the algorithm, it analyses a given sample of the data, compares it
30 the algorithm might decide not to change anything. The configuration fields are
32 number of wanted packets per event. The Net DIM algorithm ascribes importance to
36 Net DIM Algorithm
39 Each iteration of the Net DIM algorithm follows these steps:
54 compared. Here the algorithm tries to optimize for lower interrupt rate so an
62 and the internal state of the algorithm. The states reflect the "direction" of
63 the algorithm: is it going left (reducing moderation), right (increasing
66 algorithm would increase in order to reduce calculation overhead. Also, after
[all …]
/Linux-v5.10/include/crypto/internal/
Dscompress.h20 * struct scomp_alg - synchronous compression algorithm
22 * @alloc_ctx: Function allocates algorithm specific context
26 * @base: Common crypto API algorithm data structure
97 * crypto_register_scomp() -- Register synchronous compression algorithm
100 * compression algorithm
102 * @alg: algorithm definition
109 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm
112 * compression algorithm
114 * @alg: algorithm definition
Dakcipher.h103 * crypto_register_akcipher() -- Register public key algorithm
105 * Function registers an implementation of a public key verify algorithm
107 * @alg: algorithm definition
114 * crypto_unregister_akcipher() -- Unregister public key algorithm
116 * Function unregisters an implementation of a public key verify algorithm
118 * @alg: algorithm definition
125 * Function registers an implementation of an asymmetric key algorithm
128 * @tmpl: the template from which the algorithm was created
Dkpp.h37 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm
40 * algorithm
42 * @alg: algorithm definition
50 * algorithm
53 * algorithm
55 * @alg: algorithm definition
Dacompress.h53 * crypto_register_acomp() -- Register asynchronous compression algorithm
56 * compression algorithm
58 * @alg: algorithm definition
65 * crypto_unregister_acomp() -- Unregister asynchronous compression algorithm
68 * compression algorithm
70 * @alg: algorithm definition
/Linux-v5.10/include/crypto/
Dakcipher.h46 * @base: Common crypto API algorithm data structure
53 * struct akcipher_alg - generic public key algorithm
56 * algorithm. In case of error, where the dst_len was insufficient,
60 * public key algorithm, returning verification status. Requires
63 * algorithm. In case of error, where the dst_len was insufficient,
67 * algorithm. In case of error, where the dst_len was insufficient,
70 * @set_pub_key: Function invokes the algorithm specific set public key
73 * @set_priv_key: Function invokes the algorithm specific set private key
89 * @reqsize: Request context size required by algorithm implementation
90 * @base: Common crypto API algorithm data structure
[all …]
Dacompress.h43 * algorithm
45 * @base: Common crypto API algorithm data structure
56 * struct acomp_alg - asynchronous compression algorithm
60 * @dst_free: Frees destination buffer if allocated inside the algorithm
74 * @base: Common crypto API algorithm data structure
96 * compression algorithm e.g. "deflate"
97 * @type: specifies the type of the algorithm
98 * @mask: specifies the mask for the algorithm
100 * Allocate a handle for a compression algorithm. The returned struct
112 * compression algorithm e.g. "deflate"
[all …]
Dkpp.h40 * @base: Common crypto API algorithm data structure
57 * the algorithm. The result is given back to the user.
67 * @reqsize: Request context size required by algorithm
69 * @base: Common crypto API algorithm data structure
89 * The KPP API is used with the algorithm type
95 * @alg_name: is the name of the kpp algorithm (e.g. "dh", "ecdh")
96 * @type: specifies the type of the algorithm
97 * @mask: specifies the mask for the algorithm
99 * Allocate a handle for kpp algorithm. The returned struct crypto_kpp
298 * for a given kpp algorithm.
[all …]
/Linux-v5.10/net/netfilter/ipvs/
DKconfig117 The robin-robin scheduling algorithm simply directs network
126 The weighted robin-robin scheduling algorithm directs network
139 The least-connection scheduling algorithm directs network
149 The weighted least-connection scheduling algorithm directs network
159 The weighted failover scheduling algorithm directs network
169 The weighted overflow scheduling algorithm directs network
180 The locality-based least-connection scheduling algorithm is for
182 This algorithm usually directs packet destined for an IP address to
195 algorithm is also for destination IP load balancing. It is
212 The destination hashing scheduling algorithm assigns network
[all …]
/Linux-v5.10/arch/arm/crypto/
DKconfig13 tristate "SHA1 digest algorithm (ARM-asm)"
21 tristate "SHA1 digest algorithm (ARM NEON)"
32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)"
41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)"
50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)"
58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
120 tristate "CRCT10DIF digest algorithm using PMULL instructions"
126 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
/Linux-v5.10/fs/verity/
Dhash_algs.c30 * fsverity_get_hash_alg() - validate and prepare a hash algorithm
32 * @num: the hash algorithm number
34 * Get the struct fsverity_hash_alg for the given hash algorithm number, and
50 fsverity_warn(inode, "Unknown hash algorithm number: %u", num); in fsverity_get_hash_alg()
72 "Missing crypto API support for hash algorithm \"%s\"", in fsverity_get_hash_alg()
78 "Error allocating hash algorithm \"%s\": %ld", in fsverity_get_hash_alg()
113 * @alg: the hash algorithm for which to allocate the request
135 * @alg: the hash algorithm
149 * @alg: hash algorithm
179 * algorithm's compression function, e.g. 64 bytes for SHA-256 or 128 in fsverity_prepare_hash_state()
[all …]
/Linux-v5.10/net/sched/
DKconfig52 scheduling algorithm. This algorithm classifies the waiting packets
69 packet scheduling algorithm. See
74 different properties and different algorithm.
83 (HFSC) packet scheduling algorithm.
124 packet scheduling algorithm.
135 packet scheduling algorithm.
146 packet scheduling algorithm.
157 scheduling algorithm. This queueing discipline allows the combination
169 scheduling algorithm.
180 scheduling algorithm.
[all …]
/Linux-v5.10/Documentation/devicetree/bindings/sound/
Dcs35l33.txt43 Optional H/G Algorithm sub-node:
46 the internal H/G Algorithm.
48 - cirrus,hg-algo : Sub-node for internal Class H/G algorithm that
53 - cirrus,mem-depth : Memory depth for the Class H/G algorithm measured in
67 algorithm uses the max detection path. If not present, the LDO
71 algorithm switches to the LDO voltage. This property can be set to values
78 - cirrus,vp-hg : Class H/G algorithm VPhg. Controls the H/G algorithm's
/Linux-v5.10/fs/pstore/
DKconfig24 algorithm support.
31 This option enables LZO compression algorithm support.
38 This option enables LZ4 compression algorithm support.
45 This option enables LZ4HC (high compression) mode algorithm.
52 This option enables 842 compression algorithm support.
59 This option enables zstd compression algorithm support.
69 prompt "Default pstore compression algorithm"
72 This option chooses the default active compression algorithm.
79 The default compression algorithm is deflate.
/Linux-v5.10/lib/
Dtextsearch.c27 * | | Algorithm | |
39 * the search parameters such as the pattern and algorithm name.
40 * (2) Core requests the algorithm to allocate and initialize a search
44 * is provided to the algorithm to store persistent variables.
46 * request to the algorithm.
47 * (5) Algorithm calls get_next_block() provided by the user continuously
49 * (6) Algorithm invokes finish() after the last call to get_next_block
52 * (8) Core notifies the algorithm to destroy algorithm specific
58 * by calling textsearch_prepare() specifying the searching algorithm,
61 * performance of algorithm, so you should use it at own your risk.
[all …]
/Linux-v5.10/drivers/crypto/caam/
Dkey_gen.h10 * split_key_len - Compute MDHA split key length for a given algorithm
11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
28 * split_key_pad_len - Compute MDHA split key pad length for a given algorithm
29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
/Linux-v5.10/lib/raid6/
Dalgos.c11 * Algorithm list and algorithm selection for RAID-6
138 pr_info("raid6: using %s recovery algorithm\n", best->name); in raid6_choose_recov()
140 pr_err("raid6: Yikes! No recovery algorithm found!\n"); in raid6_choose_recov()
212 pr_info("raid6: using algorithm %s gen() %ld MB/s\n", in raid6_choose_gen()
221 pr_info("raid6: skip pq benchmark and using algorithm %s\n", in raid6_choose_gen()
225 pr_err("raid6: Yikes! No algorithm found!\n"); in raid6_choose_gen()
231 /* Try to pick the best algorithm */
/Linux-v5.10/Documentation/admin-guide/device-mapper/
Ddm-integrity.rst62 the internal-hash algorithm)
123 internal_hash:algorithm(:key) (the key is optional)
129 You can use a crc algorithm (such as crc32), then integrity target
131 You can also use a hmac algorithm (for example
143 journal_crypt:algorithm(:key) (the key is optional)
144 Encrypt the journal using given algorithm to make sure that the
155 journal_mac:algorithm(:key) (the key is optional)
158 crc algorithm, to protect against malicious modification, use a
159 hmac algorithm with a key.

12345678910>>...59