Home
last modified time | relevance | path

Searched full:algorithms (Results 1 – 25 of 352) sorted by relevance

12345678910>>...15

/Linux-v5.4/drivers/crypto/
DKconfig21 operations with supported algorithms.
40 tristate "PadLock driver for SHA1 and SHA256 algorithms"
46 Use VIA PadLock for SHA1/SHA256 algorithms.
105 tristate "PAES cipher algorithms"
113 AES cipher algorithms for use with protected key.
169 tristate "DES and Triple DES cipher algorithms"
182 tristate "AES cipher algorithms"
188 AES cipher algorithms (FIPS-197).
222 tristate "CRC-32 algorithms"
228 implementations of CRC algorithms. With this option, you
[all …]
/Linux-v5.4/crypto/
DKconfig3 # Generic algorithms support
39 This option provides the API for cryptographic algorithms.
152 Enable extra run-time self tests of registered crypto algorithms,
164 tristate "Null algorithms"
167 These are 'Null' algorithms, used by IPsec, which do nothing.
264 standard algorithms (called GOST algorithms). Only signature verification
629 CRC32c and CRC32 CRC algorithms implemented using mips crypto
673 Stress test for CRC32c and CRC-T10DIF algorithms implemented with
675 Unless you are testing these algorithms, you don't need this.
924 tristate "SHA384 and SHA512 digest algorithms"
[all …]
Ddes_generic.c5 * DES & Triple DES EDE Cipher Algorithms.
135 MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms");
/Linux-v5.4/Documentation/crypto/
Dapi-intro.txt18 At the lowest level are algorithms, which register dynamically with the
23 abstraction to the underlying algorithms. However, at the user
30 [algorithm api] (for registering algorithms)
94 ADDING NEW ALGORITHMS
105 Algorithms submitted must also be generally patent-free (e.g. IDEA
110 Also check for any RFCs which may relate to the use of specific algorithms,
112 Cipher Algorithms").
175 Original developers of the crypto algorithms:
Dintro.rst18 The kernel crypto API refers to all algorithms as "transformations".
34 transformations (such as CRC or even compression algorithms) that can
/Linux-v5.4/net/batman-adv/
Dbat_algo.c69 /* all algorithms must implement all ops (for now) */ in batadv_algo_register()
116 * batadv_algo_seq_print_text() - Print the supported algorithms in a seq file
126 seq_puts(seq, "Available routing algorithms:\n"); in batadv_algo_seq_print_text()
200 * algorithms
/Linux-v5.4/arch/arm/crypto/
DKconfig4 bool "ARM Accelerated Cryptographic Algorithms"
7 Say Y here to choose from a selection of cryptographic algorithms
130 tristate "NEON accelerated ChaCha stream cipher algorithms"
/Linux-v5.4/Documentation/filesystems/
Dbtrfs.txt18 * Checksums on data and metadata (multiple algorithms available)
20 * Integrated multiple device support, with several raid algorithms
/Linux-v5.4/include/linux/
Dcrc8.h46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically
64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically
95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-class-backlight-adp552019 algorithms.
31 between 0 mA and 30 mA using linear or non-linear algorithms.
Dsysfs-class-backlight-adp886041 algorithms.
54 between 0 mA and 30 mA using linear or non-linear algorithms.
/Linux-v5.4/drivers/crypto/qce/
Dcore.h49 * @register_algs: invoked by core to register the algorithms
50 * @unregister_algs: invoked by core to unregister the algorithms
Dcommon.h30 /* cipher algorithms */
35 /* hash and hmac algorithms */
/Linux-v5.4/arch/arm64/crypto/
DKconfig4 bool "ARM64 Accelerated Cryptographic Algorithms"
7 Say Y here to choose from a selection of cryptographic algorithms
/Linux-v5.4/Documentation/
Dpi-futex.txt33 technique that often cannot be replaced with lockless algorithms. As we
38 algorithms often endangers to ability to do robust reviews of said code.
40 data structures, instead of lockless algorithms. Furthermore, there are
/Linux-v5.4/include/crypto/
Daes.h3 * Common values for AES algorithms
35 * validate key length for AES algorithms
Dnull.h2 /* Values for NULL algorithms */
/Linux-v5.4/drivers/mtd/
DKconfig83 You may find that the algorithms used in this code are patented
100 You may find that the algorithms used in this code are patented
125 You may find that the algorithms used in this code are patented
/Linux-v5.4/arch/ia64/lib/
Didiv32.S9 * and Remainder Algorithms for the IA-64 Architecture". This document
13 * For more details on the theory behind these algorithms, see "IA-64
Didiv64.S9 * and Remainder Algorithms for the IA-64 Architecture". This document
13 * For more details on the theory behind these algorithms, see "IA-64
/Linux-v5.4/include/uapi/linux/
Dpfkeyv2.h303 /* Authentication algorithms */
315 /* Encryption algorithms */
337 /* Compression algorithms */
/Linux-v5.4/fs/verity/
Dhash_algs.c3 * fs/verity/hash_algs.c: fs-verity hash algorithms
13 /* The hash algorithms supported by fs-verity */
261 * Sanity check the hash algorithms (could be a build-time check, but in fsverity_check_hash_algs()
/Linux-v5.4/drivers/crypto/caam/
Dcaamhash_desc.c3 * Shared descriptors for ahash algorithms
80 * hash algorithms
/Linux-v5.4/drivers/i2c/algos/
DKconfig6 menu "I2C Algorithms"
/Linux-v5.4/drivers/crypto/cavium/nitrox/
Dnitrox_sriov.c85 /* unregister crypto algorithms */ in nitrox_pf_cleanup()
122 /* register crypto algorithms */ in nitrox_pf_reinit()

12345678910>>...15