Searched full:algorithm (Results 1 – 25 of 1414) sorted by relevance
12345678910>>...57
/Linux-v5.4/crypto/ |
D | Kconfig | 116 tristate "Cryptographic algorithm manager" 132 tristate "Userspace cryptographic algorithm configuration" 146 algorithm registration. 182 This converts an arbitrary crypto algorithm into a parallel 183 algorithm that executes in kernel threads. 192 converts an arbitrary synchronous software crypto algorithm 193 into an asynchronous algorithm that executes in a kernel thread. 228 tristate "RSA algorithm" 234 Generic implementation of the RSA public key algorithm. 237 tristate "Diffie-Hellman algorithm" [all …]
|
D | api.c | 392 * crypto_alloc_base - Locate algorithm and allocate transform 393 * @alg_name: Name of algorithm 394 * @type: Type of algorithm 397 * This function should not be used by new algorithm types. 401 * algorithm. If that fails and the kernel supports dynamically loadable 404 * to construct an algorithm on the fly. A refcount is grabbed on the 405 * algorithm which is then associated with the new transform. 504 * crypto_alloc_tfm - Locate algorithm and allocate transform 505 * @alg_name: Name of algorithm 506 * @frontend: Frontend algorithm type [all …]
|
/Linux-v5.4/Documentation/crypto/ |
D | api-intro.txt | 30 [algorithm api] (for registering algorithms) 32 The idea is to make the user interface and algorithm registration API 96 When submitting a new algorithm for inclusion, a mandatory requirement 191 SHA1 algorithm contributors: 194 DES algorithm contributors: 199 Blowfish algorithm contributors: 203 Twofish algorithm contributors: 207 SHA256/384/512 algorithm contributors: 212 AES algorithm contributors: 220 CAST5 algorithm contributors: [all …]
|
/Linux-v5.4/arch/arm64/crypto/ |
D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 64 tristate "CRCT10DIF digest algorithm using PMULL instructions" 114 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
/Linux-v5.4/Documentation/networking/ |
D | net_dim.txt | 13 - The Net DIM Algorithm 29 processing. The mechanism includes an algorithm which decides if and how to 32 iteration of the algorithm, it analyses a given sample of the data, compares it 38 the algorithm might decide not to change anything. The configuration fields are 40 number of wanted packets per event. The Net DIM algorithm ascribes importance to 44 Part II: The Net DIM Algorithm 47 Each iteration of the Net DIM algorithm follows these steps: 61 compared. Here the algorithm tries to optimize for lower interrupt rate so an 69 and the internal state of the algorithm. The states reflect the "direction" of 70 the algorithm: is it going left (reducing moderation), right (increasing [all …]
|
/Linux-v5.4/net/batman-adv/ |
D | bat_algo.c | 29 * batadv_algo_init() - Initialize batman-adv algorithm management data 53 * batadv_algo_register() - Register callbacks for a mesh algorithm 54 * @bat_algo_ops: mesh algorithm callbacks to add 64 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register() 88 * batadv_algo_select() - Select algorithm of soft interface 90 * @name: name of the algorithm to select 92 * The algorithm callbacks for the soft interface will be set when the algorithm 93 * with the correct name was found. Any previous selected algorithm will not be 94 * deinitialized and the new selected algorithm will also not be initialized. 147 pr_err("Routing algorithm '%s' is not supported\n", algo_name); in batadv_param_set_ra() [all …]
|
/Linux-v5.4/include/linux/ |
D | dim.h | 11 * Causes a moderation of the algorithm run. 81 * @state: Algorithm state (see below) 88 * @tune_state: Algorithm tuning state (see below) 126 * These are the DIM algorithm states. 127 * These will determine if the algorithm is in a valid state to start an iteration. 130 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if 143 * These are the DIM algorithm tune states. 144 * These will determine which action the algorithm should perform. 146 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference 147 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0 [all …]
|
D | crypto.h | 38 * Algorithm masks and types. 67 * Set this bit if and only if the algorithm requires another algorithm of 73 * Set if the algorithm has passed automated run-time testing. Note that 74 * if there is no run-time testing for a given algorithm it is considered 81 * Set if the algorithm is an instance that is built from templates. 85 /* Set this bit if the algorithm provided is hardware accelerated but 97 * Set if the algorithm has a ->setkey() method but can be used without 186 * DOC: Block Cipher Algorithm Definitions 188 * These data structures define modular crypto algorithm implementations, 195 * smallest key length supported by this transformation algorithm. [all …]
|
/Linux-v5.4/fs/pstore/ |
D | Kconfig | 24 algorithm support. 31 This option enables LZO compression algorithm support. 38 This option enables LZ4 compression algorithm support. 45 This option enables LZ4HC (high compression) mode algorithm. 52 This option enables 842 compression algorithm support. 59 This option enables zstd compression algorithm support. 69 prompt "Default pstore compression algorithm" 72 This option chooses the default active compression algorithm. 79 The default compression algorithm is deflate.
|
/Linux-v5.4/include/crypto/internal/ |
D | scompress.h | 20 * struct scomp_alg - synchronous compression algorithm 22 * @alloc_ctx: Function allocates algorithm specific context 26 * @base: Common crypto API algorithm data structure 97 * crypto_register_scomp() -- Register synchronous compression algorithm 100 * compression algorithm 102 * @alg: algorithm definition 109 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm 112 * compression algorithm 114 * @alg: algorithm definition
|
D | akcipher.h | 109 * crypto_register_akcipher() -- Register public key algorithm 111 * Function registers an implementation of a public key verify algorithm 113 * @alg: algorithm definition 120 * crypto_unregister_akcipher() -- Unregister public key algorithm 122 * Function unregisters an implementation of a public key verify algorithm 124 * @alg: algorithm definition 131 * Function registers an implementation of an asymmetric key algorithm 134 * @tmpl: the template from which the algorithm was created
|
D | kpp.h | 37 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm 40 * algorithm 42 * @alg: algorithm definition 50 * algorithm 53 * algorithm 55 * @alg: algorithm definition
|
D | acompress.h | 53 * crypto_register_acomp() -- Register asynchronous compression algorithm 56 * compression algorithm 58 * @alg: algorithm definition 65 * crypto_unregister_acomp() -- Unregister asynchronous compression algorithm 68 * compression algorithm 70 * @alg: algorithm definition
|
/Linux-v5.4/include/crypto/ |
D | akcipher.h | 46 * @base: Common crypto API algorithm data structure 53 * struct akcipher_alg - generic public key algorithm 56 * algorithm. In case of error, where the dst_len was insufficient, 60 * public key algorithm, returning verification status. Requires 63 * algorithm. In case of error, where the dst_len was insufficient, 67 * algorithm. In case of error, where the dst_len was insufficient, 70 * @set_pub_key: Function invokes the algorithm specific set public key 73 * @set_priv_key: Function invokes the algorithm specific set private key 89 * @reqsize: Request context size required by algorithm implementation 90 * @base: Common crypto API algorithm data structure [all …]
|
D | acompress.h | 43 * algorithm 45 * @base: Common crypto API algorithm data structure 56 * struct acomp_alg - asynchronous compression algorithm 60 * @dst_free: Frees destination buffer if allocated inside the algorithm 74 * @base: Common crypto API algorithm data structure 96 * compression algorithm e.g. "deflate" 97 * @type: specifies the type of the algorithm 98 * @mask: specifies the mask for the algorithm 100 * Allocate a handle for a compression algorithm. The returned struct 177 * inside the algorithm
|
D | kpp.h | 40 * @base: Common crypto API algorithm data structure 57 * the algorithm. The result is given back to the user. 67 * @reqsize: Request context size required by algorithm 69 * @base: Common crypto API algorithm data structure 89 * The KPP API is used with the algorithm type 95 * @alg_name: is the name of the kpp algorithm (e.g. "dh", "ecdh") 96 * @type: specifies the type of the algorithm 97 * @mask: specifies the mask for the algorithm 99 * Allocate a handle for kpp algorithm. The returned struct crypto_kpp 298 * for a given kpp algorithm. [all …]
|
/Linux-v5.4/arch/arm/crypto/ |
D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 120 tristate "CRCT10DIF digest algorithm using PMULL instructions" 125 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
|
/Linux-v5.4/net/netfilter/ipvs/ |
D | Kconfig | 118 The robin-robin scheduling algorithm simply directs network 127 The weighted robin-robin scheduling algorithm directs network 140 The least-connection scheduling algorithm directs network 150 The weighted least-connection scheduling algorithm directs network 160 The weighted failover scheduling algorithm directs network 170 The weighted overflow scheduling algorithm directs network 181 The locality-based least-connection scheduling algorithm is for 183 This algorithm usually directs packet destined for an IP address to 196 algorithm is also for destination IP load balancing. It is 213 The destination hashing scheduling algorithm assigns network [all …]
|
/Linux-v5.4/Documentation/devicetree/bindings/sound/ |
D | cs35l33.txt | 43 Optional H/G Algorithm sub-node: 46 the internal H/G Algorithm. 48 - cirrus,hg-algo : Sub-node for internal Class H/G algorithm that 53 - cirrus,mem-depth : Memory depth for the Class H/G algorithm measured in 67 algorithm uses the max detection path. If not present, the LDO 71 algorithm switches to the LDO voltage. This property can be set to values 78 - cirrus,vp-hg : Class H/G algorithm VPhg. Controls the H/G algorithm's
|
/Linux-v5.4/lib/ |
D | textsearch.c | 27 * | | Algorithm | | 39 * the search parameters such as the pattern and algorithm name. 40 * (2) Core requests the algorithm to allocate and initialize a search 44 * is provided to the algorithm to store persistent variables. 46 * request to the algorithm. 47 * (5) Algorithm calls get_next_block() provided by the user continuously 49 * (6) Algorithm invokes finish() after the last call to get_next_block 52 * (8) Core notifies the algorithm to destroy algorithm specific 58 * by calling textsearch_prepare() specifying the searching algorithm, 61 * performance of algorithm, so you should use it at own your risk. [all …]
|
/Linux-v5.4/fs/verity/ |
D | hash_algs.c | 28 * fsverity_get_hash_alg() - validate and prepare a hash algorithm 30 * @num: the hash algorithm number 32 * Get the struct fsverity_hash_alg for the given hash algorithm number, and 48 fsverity_warn(inode, "Unknown hash algorithm number: %u", num); in fsverity_get_hash_alg() 65 "Missing crypto API support for hash algorithm \"%s\"", in fsverity_get_hash_alg() 70 "Error allocating hash algorithm \"%s\": %ld", in fsverity_get_hash_alg() 97 * @alg: hash algorithm 130 * algorithm's compression function, e.g. 64 bytes for SHA-256 or 128 in fsverity_prepare_hash_state() 131 * bytes for SHA-512. This ensures that the hash algorithm won't have in fsverity_prepare_hash_state() 222 * @alg: the hash algorithm to use
|
/Linux-v5.4/net/sched/ |
D | Kconfig | 52 scheduling algorithm. This algorithm classifies the waiting packets 69 packet scheduling algorithm. See 74 different properties and different algorithm. 83 (HFSC) packet scheduling algorithm. 124 packet scheduling algorithm. 135 packet scheduling algorithm. 146 packet scheduling algorithm. 157 scheduling algorithm. This queueing discipline allows the combination 169 scheduling algorithm. 180 scheduling algorithm. [all …]
|
/Linux-v5.4/drivers/crypto/caam/ |
D | key_gen.h | 10 * split_key_len - Compute MDHA split key length for a given algorithm 11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1, 28 * split_key_pad_len - Compute MDHA split key pad length for a given algorithm 29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
|
/Linux-v5.4/Documentation/admin-guide/device-mapper/ |
D | dm-integrity.rst | 62 the internal-hash algorithm) 123 internal_hash:algorithm(:key) (the key is optional) 129 You can use a crc algorithm (such as crc32), then integrity target 131 You can also use a hmac algorithm (for example 143 journal_crypt:algorithm(:key) (the key is optional) 144 Encrypt the journal using given algorithm to make sure that the 155 journal_mac:algorithm(:key) (the key is optional) 158 crc algorithm, to protect against malicious modification, use a 159 hmac algorithm with a key.
|
/Linux-v5.4/Documentation/i2c/ |
D | summary.rst | 30 Bus -> Algorithm 35 An Algorithm driver contains general code that can be used for a whole class 36 of I2C adapters. Each specific adapter driver either depends on one algorithm 42 integrated than Algorithm and Adapter.
|
12345678910>>...57