Searched full:algorithms (Results 1 – 25 of 388) sorted by relevance
12345678910>>...16
/Linux-v5.10/drivers/crypto/ |
D | Kconfig | 23 operations with supported algorithms. 42 tristate "PadLock driver for SHA1 and SHA256 algorithms" 48 Use VIA PadLock for SHA1/SHA256 algorithms. 123 tristate "PAES cipher algorithms" 131 AES cipher algorithms for use with protected key. 187 tristate "DES and Triple DES cipher algorithms" 200 tristate "AES cipher algorithms" 206 AES cipher algorithms (FIPS-197). 240 tristate "CRC-32 algorithms" 246 implementations of CRC algorithms. With this option, you [all …]
|
/Linux-v5.10/crypto/ |
D | Kconfig | 3 # Generic algorithms support 39 This option provides the API for cryptographic algorithms. 150 Enable extra run-time self tests of registered crypto algorithms, 160 tristate "Null algorithms" 163 These are 'Null' algorithms, used by IPsec, which do nothing. 260 standard algorithms (called GOST algorithms). Only signature verification 652 CRC32c and CRC32 CRC algorithms implemented using mips crypto 672 This module provides the following algorithms: 690 This module provides the following algorithms: 737 Stress test for CRC32c and CRC-T10DIF algorithms implemented with [all …]
|
/Linux-v5.10/Documentation/crypto/ |
D | api-intro.rst | 23 At the lowest level are algorithms, which register dynamically with the 28 abstraction to the underlying algorithms. However, at the user 35 [algorithm api] (for registering algorithms) 100 Adding New Algorithms 112 Algorithms submitted must also be generally patent-free (e.g. IDEA 117 Also check for any RFCs which may relate to the use of specific algorithms, 119 Cipher Algorithms"). 188 Original developers of the crypto algorithms:
|
D | devel-algos.rst | 1 Developing Cipher Algorithms 40 successfully registered all the given algorithms; if it fails partway 44 return value. Don't try to unregister algorithms that aren't 111 The registration of multi-block cipher algorithms is one of the most
|
D | intro.rst | 18 The kernel crypto API refers to all algorithms as "transformations". 34 transformations (such as CRC or even compression algorithms) that can
|
/Linux-v5.10/net/ipv6/ |
D | Kconfig | 56 AH can be used with various authentication algorithms. Besides 58 implementations of the algorithms that RFC 8221 lists as MUST be 59 implemented. If you need any other algorithms, you'll need to enable 61 implementations of any needed algorithms when available. 71 ESP can be used with various encryption and authentication algorithms. 73 implementations of the algorithms that RFC 8221 lists as MUST be 74 implemented. If you need any other algorithms, you'll need to enable 76 implementations of any needed algorithms when available.
|
/Linux-v5.10/drivers/crypto/hisilicon/ |
D | Kconfig | 35 It provides AES, SM4, and 3DES algorithms with ECB 36 CBC, and XTS cipher mode, and AEAD algorithms. 73 accelerator, which can accelerate RSA and DH algorithms.
|
/Linux-v5.10/drivers/crypto/allwinner/ |
D | Kconfig | 22 and SHA1 and MD5 hash algorithms. 70 Say y to enable support for hash algorithms. 130 Say y to enable support for hash algorithms.
|
/Linux-v5.10/net/batman-adv/ |
D | bat_algo.c | 69 /* all algorithms must implement all ops (for now) */ in batadv_algo_register() 116 * batadv_algo_seq_print_text() - Print the supported algorithms in a seq file 126 seq_puts(seq, "Available routing algorithms:\n"); in batadv_algo_seq_print_text() 200 * algorithms
|
/Linux-v5.10/arch/arm/crypto/ |
D | Kconfig | 4 bool "ARM Accelerated Cryptographic Algorithms" 7 Say Y here to choose from a selection of cryptographic algorithms 132 tristate "NEON and scalar accelerated ChaCha stream cipher algorithms"
|
/Linux-v5.10/Documentation/filesystems/ |
D | btrfs.rst | 21 * Checksums on data and metadata (multiple algorithms available) 23 * Integrated multiple device support, with several raid algorithms
|
/Linux-v5.10/include/linux/ |
D | crc8.h | 46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically 64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically 95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-driver-uacce | 22 What: /sys/class/uacce/<dev_name>/algorithms 26 Description: Algorithms supported by this accelerator, separated by new line.
|
D | sysfs-class-backlight-adp5520 | 19 algorithms. 31 between 0 mA and 30 mA using linear or non-linear algorithms.
|
D | sysfs-class-backlight-adp8860 | 24 algorithms. 37 between 0 mA and 30 mA using linear or non-linear algorithms.
|
/Linux-v5.10/drivers/crypto/qce/ |
D | core.h | 49 * @register_algs: invoked by core to register the algorithms 50 * @unregister_algs: invoked by core to unregister the algorithms
|
D | common.h | 34 /* cipher algorithms */ 39 /* hash and hmac algorithms */
|
/Linux-v5.10/Documentation/userspace-api/media/ |
D | glossary.rst | 103 A specialized processor that implements a set of algorithms for 104 processing image data. ISPs may implement algorithms for lens 107 algorithms (e.g. automatic exposure, white balance and focus).
|
/Linux-v5.10/arch/arm64/crypto/ |
D | Kconfig | 4 bool "ARM64 Accelerated Cryptographic Algorithms" 7 Say Y here to choose from a selection of cryptographic algorithms
|
/Linux-v5.10/Documentation/locking/ |
D | pi-futex.rst | 33 technique that often cannot be replaced with lockless algorithms. As we 38 algorithms often endangers to ability to do robust reviews of said code. 40 data structures, instead of lockless algorithms. Furthermore, there are
|
/Linux-v5.10/net/ipv4/ |
D | Kconfig | 347 AH can be used with various authentication algorithms. Besides 349 implementations of the algorithms that RFC 8221 lists as MUST be 350 implemented. If you need any other algorithms, you'll need to enable 352 implementations of any needed algorithms when available. 362 ESP can be used with various encryption and authentication algorithms. 364 implementations of the algorithms that RFC 8221 lists as MUST be 365 implemented. If you need any other algorithms, you'll need to enable 367 implementations of any needed algorithms when available.
|
/Linux-v5.10/net/xfrm/ |
D | Kconfig | 81 # This option selects XFRM_ALGO along with the AH authentication algorithms that 91 # algorithms that RFC 8221 lists as MUST be implemented.
|
/Linux-v5.10/include/crypto/ |
D | aes.h | 3 * Common values for AES algorithms 35 * validate key length for AES algorithms
|
/Linux-v5.10/fs/f2fs/ |
D | Kconfig | 19 layout, but also for selecting allocation and cleaning algorithms. 102 multiple back-end compression algorithms are supported.
|
/Linux-v5.10/drivers/mtd/ |
D | Kconfig | 83 You may find that the algorithms used in this code are patented 100 You may find that the algorithms used in this code are patented 125 You may find that the algorithms used in this code are patented
|
12345678910>>...16