Searched full:algorithms (Results 1 – 25 of 352) sorted by relevance
12345678910>>...15
/Linux-v5.4/drivers/crypto/ |
D | Kconfig | 21 operations with supported algorithms. 40 tristate "PadLock driver for SHA1 and SHA256 algorithms" 46 Use VIA PadLock for SHA1/SHA256 algorithms. 105 tristate "PAES cipher algorithms" 113 AES cipher algorithms for use with protected key. 169 tristate "DES and Triple DES cipher algorithms" 182 tristate "AES cipher algorithms" 188 AES cipher algorithms (FIPS-197). 222 tristate "CRC-32 algorithms" 228 implementations of CRC algorithms. With this option, you [all …]
|
/Linux-v5.4/crypto/ |
D | Kconfig | 3 # Generic algorithms support 39 This option provides the API for cryptographic algorithms. 152 Enable extra run-time self tests of registered crypto algorithms, 164 tristate "Null algorithms" 167 These are 'Null' algorithms, used by IPsec, which do nothing. 264 standard algorithms (called GOST algorithms). Only signature verification 629 CRC32c and CRC32 CRC algorithms implemented using mips crypto 673 Stress test for CRC32c and CRC-T10DIF algorithms implemented with 675 Unless you are testing these algorithms, you don't need this. 924 tristate "SHA384 and SHA512 digest algorithms" [all …]
|
D | des_generic.c | 5 * DES & Triple DES EDE Cipher Algorithms. 135 MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms");
|
/Linux-v5.4/Documentation/crypto/ |
D | api-intro.txt | 18 At the lowest level are algorithms, which register dynamically with the 23 abstraction to the underlying algorithms. However, at the user 30 [algorithm api] (for registering algorithms) 94 ADDING NEW ALGORITHMS 105 Algorithms submitted must also be generally patent-free (e.g. IDEA 110 Also check for any RFCs which may relate to the use of specific algorithms, 112 Cipher Algorithms"). 175 Original developers of the crypto algorithms:
|
D | intro.rst | 18 The kernel crypto API refers to all algorithms as "transformations". 34 transformations (such as CRC or even compression algorithms) that can
|
/Linux-v5.4/net/batman-adv/ |
D | bat_algo.c | 69 /* all algorithms must implement all ops (for now) */ in batadv_algo_register() 116 * batadv_algo_seq_print_text() - Print the supported algorithms in a seq file 126 seq_puts(seq, "Available routing algorithms:\n"); in batadv_algo_seq_print_text() 200 * algorithms
|
/Linux-v5.4/arch/arm/crypto/ |
D | Kconfig | 4 bool "ARM Accelerated Cryptographic Algorithms" 7 Say Y here to choose from a selection of cryptographic algorithms 130 tristate "NEON accelerated ChaCha stream cipher algorithms"
|
/Linux-v5.4/Documentation/filesystems/ |
D | btrfs.txt | 18 * Checksums on data and metadata (multiple algorithms available) 20 * Integrated multiple device support, with several raid algorithms
|
/Linux-v5.4/include/linux/ |
D | crc8.h | 46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically 64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically 95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | sysfs-class-backlight-adp5520 | 19 algorithms. 31 between 0 mA and 30 mA using linear or non-linear algorithms.
|
D | sysfs-class-backlight-adp8860 | 41 algorithms. 54 between 0 mA and 30 mA using linear or non-linear algorithms.
|
/Linux-v5.4/drivers/crypto/qce/ |
D | core.h | 49 * @register_algs: invoked by core to register the algorithms 50 * @unregister_algs: invoked by core to unregister the algorithms
|
D | common.h | 30 /* cipher algorithms */ 35 /* hash and hmac algorithms */
|
/Linux-v5.4/arch/arm64/crypto/ |
D | Kconfig | 4 bool "ARM64 Accelerated Cryptographic Algorithms" 7 Say Y here to choose from a selection of cryptographic algorithms
|
/Linux-v5.4/Documentation/ |
D | pi-futex.txt | 33 technique that often cannot be replaced with lockless algorithms. As we 38 algorithms often endangers to ability to do robust reviews of said code. 40 data structures, instead of lockless algorithms. Furthermore, there are
|
/Linux-v5.4/include/crypto/ |
D | aes.h | 3 * Common values for AES algorithms 35 * validate key length for AES algorithms
|
D | null.h | 2 /* Values for NULL algorithms */
|
/Linux-v5.4/drivers/mtd/ |
D | Kconfig | 83 You may find that the algorithms used in this code are patented 100 You may find that the algorithms used in this code are patented 125 You may find that the algorithms used in this code are patented
|
/Linux-v5.4/arch/ia64/lib/ |
D | idiv32.S | 9 * and Remainder Algorithms for the IA-64 Architecture". This document 13 * For more details on the theory behind these algorithms, see "IA-64
|
D | idiv64.S | 9 * and Remainder Algorithms for the IA-64 Architecture". This document 13 * For more details on the theory behind these algorithms, see "IA-64
|
/Linux-v5.4/include/uapi/linux/ |
D | pfkeyv2.h | 303 /* Authentication algorithms */ 315 /* Encryption algorithms */ 337 /* Compression algorithms */
|
/Linux-v5.4/fs/verity/ |
D | hash_algs.c | 3 * fs/verity/hash_algs.c: fs-verity hash algorithms 13 /* The hash algorithms supported by fs-verity */ 261 * Sanity check the hash algorithms (could be a build-time check, but in fsverity_check_hash_algs()
|
/Linux-v5.4/drivers/crypto/caam/ |
D | caamhash_desc.c | 3 * Shared descriptors for ahash algorithms 80 * hash algorithms
|
/Linux-v5.4/drivers/i2c/algos/ |
D | Kconfig | 6 menu "I2C Algorithms"
|
/Linux-v5.4/drivers/crypto/cavium/nitrox/ |
D | nitrox_sriov.c | 85 /* unregister crypto algorithms */ in nitrox_pf_cleanup() 122 /* register crypto algorithms */ in nitrox_pf_reinit()
|
12345678910>>...15