Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 1414) sorted by relevance

12345678910>>...57

/Linux-v5.4/crypto/
DKconfig116 tristate "Cryptographic algorithm manager"
132 tristate "Userspace cryptographic algorithm configuration"
146 algorithm registration.
182 This converts an arbitrary crypto algorithm into a parallel
183 algorithm that executes in kernel threads.
192 converts an arbitrary synchronous software crypto algorithm
193 into an asynchronous algorithm that executes in a kernel thread.
228 tristate "RSA algorithm"
234 Generic implementation of the RSA public key algorithm.
237 tristate "Diffie-Hellman algorithm"
[all …]
Dapi.c392 * crypto_alloc_base - Locate algorithm and allocate transform
393 * @alg_name: Name of algorithm
394 * @type: Type of algorithm
397 * This function should not be used by new algorithm types.
401 * algorithm. If that fails and the kernel supports dynamically loadable
404 * to construct an algorithm on the fly. A refcount is grabbed on the
405 * algorithm which is then associated with the new transform.
504 * crypto_alloc_tfm - Locate algorithm and allocate transform
505 * @alg_name: Name of algorithm
506 * @frontend: Frontend algorithm type
[all …]
/Linux-v5.4/Documentation/crypto/
Dapi-intro.txt30 [algorithm api] (for registering algorithms)
32 The idea is to make the user interface and algorithm registration API
96 When submitting a new algorithm for inclusion, a mandatory requirement
191 SHA1 algorithm contributors:
194 DES algorithm contributors:
199 Blowfish algorithm contributors:
203 Twofish algorithm contributors:
207 SHA256/384/512 algorithm contributors:
212 AES algorithm contributors:
220 CAST5 algorithm contributors:
[all …]
/Linux-v5.4/arch/arm64/crypto/
DKconfig13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)"
45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)"
64 tristate "CRCT10DIF digest algorithm using PMULL instructions"
114 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/Linux-v5.4/Documentation/networking/
Dnet_dim.txt13 - The Net DIM Algorithm
29 processing. The mechanism includes an algorithm which decides if and how to
32 iteration of the algorithm, it analyses a given sample of the data, compares it
38 the algorithm might decide not to change anything. The configuration fields are
40 number of wanted packets per event. The Net DIM algorithm ascribes importance to
44 Part II: The Net DIM Algorithm
47 Each iteration of the Net DIM algorithm follows these steps:
61 compared. Here the algorithm tries to optimize for lower interrupt rate so an
69 and the internal state of the algorithm. The states reflect the "direction" of
70 the algorithm: is it going left (reducing moderation), right (increasing
[all …]
/Linux-v5.4/net/batman-adv/
Dbat_algo.c29 * batadv_algo_init() - Initialize batman-adv algorithm management data
53 * batadv_algo_register() - Register callbacks for a mesh algorithm
54 * @bat_algo_ops: mesh algorithm callbacks to add
64 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register()
88 * batadv_algo_select() - Select algorithm of soft interface
90 * @name: name of the algorithm to select
92 * The algorithm callbacks for the soft interface will be set when the algorithm
93 * with the correct name was found. Any previous selected algorithm will not be
94 * deinitialized and the new selected algorithm will also not be initialized.
147 pr_err("Routing algorithm '%s' is not supported\n", algo_name); in batadv_param_set_ra()
[all …]
/Linux-v5.4/include/linux/
Ddim.h11 * Causes a moderation of the algorithm run.
81 * @state: Algorithm state (see below)
88 * @tune_state: Algorithm tuning state (see below)
126 * These are the DIM algorithm states.
127 * These will determine if the algorithm is in a valid state to start an iteration.
130 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if
143 * These are the DIM algorithm tune states.
144 * These will determine which action the algorithm should perform.
146 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference
147 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0
[all …]
Dcrypto.h38 * Algorithm masks and types.
67 * Set this bit if and only if the algorithm requires another algorithm of
73 * Set if the algorithm has passed automated run-time testing. Note that
74 * if there is no run-time testing for a given algorithm it is considered
81 * Set if the algorithm is an instance that is built from templates.
85 /* Set this bit if the algorithm provided is hardware accelerated but
97 * Set if the algorithm has a ->setkey() method but can be used without
186 * DOC: Block Cipher Algorithm Definitions
188 * These data structures define modular crypto algorithm implementations,
195 * smallest key length supported by this transformation algorithm.
[all …]
/Linux-v5.4/fs/pstore/
DKconfig24 algorithm support.
31 This option enables LZO compression algorithm support.
38 This option enables LZ4 compression algorithm support.
45 This option enables LZ4HC (high compression) mode algorithm.
52 This option enables 842 compression algorithm support.
59 This option enables zstd compression algorithm support.
69 prompt "Default pstore compression algorithm"
72 This option chooses the default active compression algorithm.
79 The default compression algorithm is deflate.
/Linux-v5.4/include/crypto/internal/
Dscompress.h20 * struct scomp_alg - synchronous compression algorithm
22 * @alloc_ctx: Function allocates algorithm specific context
26 * @base: Common crypto API algorithm data structure
97 * crypto_register_scomp() -- Register synchronous compression algorithm
100 * compression algorithm
102 * @alg: algorithm definition
109 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm
112 * compression algorithm
114 * @alg: algorithm definition
Dakcipher.h109 * crypto_register_akcipher() -- Register public key algorithm
111 * Function registers an implementation of a public key verify algorithm
113 * @alg: algorithm definition
120 * crypto_unregister_akcipher() -- Unregister public key algorithm
122 * Function unregisters an implementation of a public key verify algorithm
124 * @alg: algorithm definition
131 * Function registers an implementation of an asymmetric key algorithm
134 * @tmpl: the template from which the algorithm was created
Dkpp.h37 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm
40 * algorithm
42 * @alg: algorithm definition
50 * algorithm
53 * algorithm
55 * @alg: algorithm definition
Dacompress.h53 * crypto_register_acomp() -- Register asynchronous compression algorithm
56 * compression algorithm
58 * @alg: algorithm definition
65 * crypto_unregister_acomp() -- Unregister asynchronous compression algorithm
68 * compression algorithm
70 * @alg: algorithm definition
/Linux-v5.4/include/crypto/
Dakcipher.h46 * @base: Common crypto API algorithm data structure
53 * struct akcipher_alg - generic public key algorithm
56 * algorithm. In case of error, where the dst_len was insufficient,
60 * public key algorithm, returning verification status. Requires
63 * algorithm. In case of error, where the dst_len was insufficient,
67 * algorithm. In case of error, where the dst_len was insufficient,
70 * @set_pub_key: Function invokes the algorithm specific set public key
73 * @set_priv_key: Function invokes the algorithm specific set private key
89 * @reqsize: Request context size required by algorithm implementation
90 * @base: Common crypto API algorithm data structure
[all …]
Dacompress.h43 * algorithm
45 * @base: Common crypto API algorithm data structure
56 * struct acomp_alg - asynchronous compression algorithm
60 * @dst_free: Frees destination buffer if allocated inside the algorithm
74 * @base: Common crypto API algorithm data structure
96 * compression algorithm e.g. "deflate"
97 * @type: specifies the type of the algorithm
98 * @mask: specifies the mask for the algorithm
100 * Allocate a handle for a compression algorithm. The returned struct
177 * inside the algorithm
Dkpp.h40 * @base: Common crypto API algorithm data structure
57 * the algorithm. The result is given back to the user.
67 * @reqsize: Request context size required by algorithm
69 * @base: Common crypto API algorithm data structure
89 * The KPP API is used with the algorithm type
95 * @alg_name: is the name of the kpp algorithm (e.g. "dh", "ecdh")
96 * @type: specifies the type of the algorithm
97 * @mask: specifies the mask for the algorithm
99 * Allocate a handle for kpp algorithm. The returned struct crypto_kpp
298 * for a given kpp algorithm.
[all …]
/Linux-v5.4/arch/arm/crypto/
DKconfig13 tristate "SHA1 digest algorithm (ARM-asm)"
21 tristate "SHA1 digest algorithm (ARM NEON)"
32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)"
41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)"
50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)"
58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
120 tristate "CRCT10DIF digest algorithm using PMULL instructions"
125 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
/Linux-v5.4/net/netfilter/ipvs/
DKconfig118 The robin-robin scheduling algorithm simply directs network
127 The weighted robin-robin scheduling algorithm directs network
140 The least-connection scheduling algorithm directs network
150 The weighted least-connection scheduling algorithm directs network
160 The weighted failover scheduling algorithm directs network
170 The weighted overflow scheduling algorithm directs network
181 The locality-based least-connection scheduling algorithm is for
183 This algorithm usually directs packet destined for an IP address to
196 algorithm is also for destination IP load balancing. It is
213 The destination hashing scheduling algorithm assigns network
[all …]
/Linux-v5.4/Documentation/devicetree/bindings/sound/
Dcs35l33.txt43 Optional H/G Algorithm sub-node:
46 the internal H/G Algorithm.
48 - cirrus,hg-algo : Sub-node for internal Class H/G algorithm that
53 - cirrus,mem-depth : Memory depth for the Class H/G algorithm measured in
67 algorithm uses the max detection path. If not present, the LDO
71 algorithm switches to the LDO voltage. This property can be set to values
78 - cirrus,vp-hg : Class H/G algorithm VPhg. Controls the H/G algorithm's
/Linux-v5.4/lib/
Dtextsearch.c27 * | | Algorithm | |
39 * the search parameters such as the pattern and algorithm name.
40 * (2) Core requests the algorithm to allocate and initialize a search
44 * is provided to the algorithm to store persistent variables.
46 * request to the algorithm.
47 * (5) Algorithm calls get_next_block() provided by the user continuously
49 * (6) Algorithm invokes finish() after the last call to get_next_block
52 * (8) Core notifies the algorithm to destroy algorithm specific
58 * by calling textsearch_prepare() specifying the searching algorithm,
61 * performance of algorithm, so you should use it at own your risk.
[all …]
/Linux-v5.4/fs/verity/
Dhash_algs.c28 * fsverity_get_hash_alg() - validate and prepare a hash algorithm
30 * @num: the hash algorithm number
32 * Get the struct fsverity_hash_alg for the given hash algorithm number, and
48 fsverity_warn(inode, "Unknown hash algorithm number: %u", num); in fsverity_get_hash_alg()
65 "Missing crypto API support for hash algorithm \"%s\"", in fsverity_get_hash_alg()
70 "Error allocating hash algorithm \"%s\": %ld", in fsverity_get_hash_alg()
97 * @alg: hash algorithm
130 * algorithm's compression function, e.g. 64 bytes for SHA-256 or 128 in fsverity_prepare_hash_state()
131 * bytes for SHA-512. This ensures that the hash algorithm won't have in fsverity_prepare_hash_state()
222 * @alg: the hash algorithm to use
/Linux-v5.4/net/sched/
DKconfig52 scheduling algorithm. This algorithm classifies the waiting packets
69 packet scheduling algorithm. See
74 different properties and different algorithm.
83 (HFSC) packet scheduling algorithm.
124 packet scheduling algorithm.
135 packet scheduling algorithm.
146 packet scheduling algorithm.
157 scheduling algorithm. This queueing discipline allows the combination
169 scheduling algorithm.
180 scheduling algorithm.
[all …]
/Linux-v5.4/drivers/crypto/caam/
Dkey_gen.h10 * split_key_len - Compute MDHA split key length for a given algorithm
11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
28 * split_key_pad_len - Compute MDHA split key pad length for a given algorithm
29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
/Linux-v5.4/Documentation/admin-guide/device-mapper/
Ddm-integrity.rst62 the internal-hash algorithm)
123 internal_hash:algorithm(:key) (the key is optional)
129 You can use a crc algorithm (such as crc32), then integrity target
131 You can also use a hmac algorithm (for example
143 journal_crypt:algorithm(:key) (the key is optional)
144 Encrypt the journal using given algorithm to make sure that the
155 journal_mac:algorithm(:key) (the key is optional)
158 crc algorithm, to protect against malicious modification, use a
159 hmac algorithm with a key.
/Linux-v5.4/Documentation/i2c/
Dsummary.rst30 Bus -> Algorithm
35 An Algorithm driver contains general code that can be used for a whole class
36 of I2C adapters. Each specific adapter driver either depends on one algorithm
42 integrated than Algorithm and Adapter.

12345678910>>...57