Searched full:algorithms (Results 1 – 25 of 413) sorted by relevance
12345678910>>...17
/Linux-v5.15/drivers/crypto/ |
D | Kconfig | 23 operations with supported algorithms. 42 tristate "PadLock driver for SHA1 and SHA256 algorithms" 48 Use VIA PadLock for SHA1/SHA256 algorithms. 123 tristate "PAES cipher algorithms" 131 AES cipher algorithms for use with protected key. 187 tristate "DES and Triple DES cipher algorithms" 200 tristate "AES cipher algorithms" 206 AES cipher algorithms (FIPS-197). 240 tristate "CRC-32 algorithms" 246 implementations of CRC algorithms. With this option, you [all …]
|
/Linux-v5.15/crypto/ |
D | Kconfig | 3 # Generic algorithms support 39 This option provides the API for cryptographic algorithms. 150 Enable extra run-time self tests of registered crypto algorithms, 160 tristate "Null algorithms" 163 These are 'Null' algorithms, used by IPsec, which do nothing. 265 standard algorithms (called GOST algorithms). Only signature verification 657 CRC32c and CRC32 CRC algorithms implemented using mips crypto 677 This module provides the following algorithms: 695 This module provides the following algorithms: 742 Stress test for CRC32c and CRC-T10DIF algorithms implemented with [all …]
|
/Linux-v5.15/Documentation/crypto/ |
D | api-intro.rst | 23 At the lowest level are algorithms, which register dynamically with the 28 abstraction to the underlying algorithms. However, at the user 35 [algorithm api] (for registering algorithms) 100 Adding New Algorithms 112 Algorithms submitted must also be generally patent-free (e.g. IDEA 117 Also check for any RFCs which may relate to the use of specific algorithms, 119 Cipher Algorithms"). 188 Original developers of the crypto algorithms:
|
D | devel-algos.rst | 1 Developing Cipher Algorithms 40 successfully registered all the given algorithms; if it fails partway 44 return value. Don't try to unregister algorithms that aren't 111 The registration of multi-block cipher algorithms is one of the most
|
D | intro.rst | 18 The kernel crypto API refers to all algorithms as "transformations". 34 transformations (such as CRC or even compression algorithms) that can
|
/Linux-v5.15/net/ipv6/ |
D | Kconfig | 56 AH can be used with various authentication algorithms. Besides 58 implementations of the algorithms that RFC 8221 lists as MUST be 59 implemented. If you need any other algorithms, you'll need to enable 61 implementations of any needed algorithms when available. 71 ESP can be used with various encryption and authentication algorithms. 73 implementations of the algorithms that RFC 8221 lists as MUST be 74 implemented. If you need any other algorithms, you'll need to enable 76 implementations of any needed algorithms when available.
|
/Linux-v5.15/fs/crypto/ |
D | Kconfig | 17 # allows the algorithms to be built as modules when all the filesystems are, 20 # Note: this option only pulls in the algorithms that filesystem encryption 26 # algorithms, not any per-architecture optimized implementations. It is
|
/Linux-v5.15/drivers/crypto/hisilicon/ |
D | Kconfig | 35 It provides AES, SM4, and 3DES algorithms with ECB 36 CBC, and XTS cipher mode, and AEAD algorithms. 75 accelerator, which can accelerate RSA and DH algorithms.
|
/Linux-v5.15/drivers/crypto/keembay/ |
D | Kconfig | 54 sm3, as well as the HMAC variant of these algorithms. 65 Enables support for sha224 and hmac(sha224) algorithms in the Intel 67 algorithms.
|
/Linux-v5.15/drivers/crypto/allwinner/ |
D | Kconfig | 22 and SHA1 and MD5 hash algorithms. 79 Say y to enable support for hash algorithms. 139 Say y to enable support for hash algorithms.
|
/Linux-v5.15/Documentation/filesystems/ |
D | btrfs.rst | 21 * Checksums on data and metadata (multiple algorithms available) 23 * Integrated multiple device support, with several raid algorithms
|
/Linux-v5.15/arch/arm/crypto/ |
D | Kconfig | 4 bool "ARM Accelerated Cryptographic Algorithms" 7 Say Y here to choose from a selection of cryptographic algorithms 151 tristate "NEON and scalar accelerated ChaCha stream cipher algorithms"
|
/Linux-v5.15/include/linux/ |
D | crc8.h | 46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically 64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically 95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
|
/Linux-v5.15/Documentation/ABI/testing/ |
D | sysfs-driver-uacce | 22 What: /sys/class/uacce/<dev_name>/algorithms 26 Description: Algorithms supported by this accelerator, separated by new line.
|
D | ima_policy | 59 appraise_algos:= comma-separated list of hash algorithms 62 of these two algorithms. 144 restricts the hash algorithms allowed when writing to the
|
/Linux-v5.15/drivers/crypto/qce/ |
D | core.h | 49 * @register_algs: invoked by core to register the algorithms 50 * @unregister_algs: invoked by core to unregister the algorithms
|
D | common.h | 35 /* cipher algorithms */ 40 /* hash and hmac algorithms */
|
/Linux-v5.15/Documentation/userspace-api/media/ |
D | glossary.rst | 103 A specialized processor that implements a set of algorithms for 104 processing image data. ISPs may implement algorithms for lens 107 algorithms (e.g. automatic exposure, white balance and focus).
|
/Linux-v5.15/arch/arm64/crypto/ |
D | Kconfig | 4 bool "ARM64 Accelerated Cryptographic Algorithms" 7 Say Y here to choose from a selection of cryptographic algorithms
|
/Linux-v5.15/net/ipv4/ |
D | Kconfig | 347 AH can be used with various authentication algorithms. Besides 349 implementations of the algorithms that RFC 8221 lists as MUST be 350 implemented. If you need any other algorithms, you'll need to enable 352 implementations of any needed algorithms when available. 362 ESP can be used with various encryption and authentication algorithms. 364 implementations of the algorithms that RFC 8221 lists as MUST be 365 implemented. If you need any other algorithms, you'll need to enable 367 implementations of any needed algorithms when available.
|
/Linux-v5.15/Documentation/locking/ |
D | pi-futex.rst | 33 technique that often cannot be replaced with lockless algorithms. As we 38 algorithms often endangers to ability to do robust reviews of said code. 40 data structures, instead of lockless algorithms. Furthermore, there are
|
/Linux-v5.15/net/xfrm/ |
D | Kconfig | 81 # This option selects XFRM_ALGO along with the AH authentication algorithms that 91 # algorithms that RFC 8221 lists as MUST be implemented.
|
/Linux-v5.15/include/crypto/ |
D | aes.h | 3 * Common values for AES algorithms 35 * validate key length for AES algorithms
|
/Linux-v5.15/drivers/mtd/ |
D | Kconfig | 85 You may find that the algorithms used in this code are patented 102 You may find that the algorithms used in this code are patented 127 You may find that the algorithms used in this code are patented
|
/Linux-v5.15/fs/f2fs/ |
D | Kconfig | 26 layout, but also for selecting allocation and cleaning algorithms. 99 multiple back-end compression algorithms are supported.
|
12345678910>>...17