Home
last modified time | relevance | path

Searched full:algorithms (Results 1 – 25 of 413) sorted by relevance

12345678910>>...17

/Linux-v5.15/drivers/crypto/
DKconfig23 operations with supported algorithms.
42 tristate "PadLock driver for SHA1 and SHA256 algorithms"
48 Use VIA PadLock for SHA1/SHA256 algorithms.
123 tristate "PAES cipher algorithms"
131 AES cipher algorithms for use with protected key.
187 tristate "DES and Triple DES cipher algorithms"
200 tristate "AES cipher algorithms"
206 AES cipher algorithms (FIPS-197).
240 tristate "CRC-32 algorithms"
246 implementations of CRC algorithms. With this option, you
[all …]
/Linux-v5.15/crypto/
DKconfig3 # Generic algorithms support
39 This option provides the API for cryptographic algorithms.
150 Enable extra run-time self tests of registered crypto algorithms,
160 tristate "Null algorithms"
163 These are 'Null' algorithms, used by IPsec, which do nothing.
265 standard algorithms (called GOST algorithms). Only signature verification
657 CRC32c and CRC32 CRC algorithms implemented using mips crypto
677 This module provides the following algorithms:
695 This module provides the following algorithms:
742 Stress test for CRC32c and CRC-T10DIF algorithms implemented with
[all …]
/Linux-v5.15/Documentation/crypto/
Dapi-intro.rst23 At the lowest level are algorithms, which register dynamically with the
28 abstraction to the underlying algorithms. However, at the user
35 [algorithm api] (for registering algorithms)
100 Adding New Algorithms
112 Algorithms submitted must also be generally patent-free (e.g. IDEA
117 Also check for any RFCs which may relate to the use of specific algorithms,
119 Cipher Algorithms").
188 Original developers of the crypto algorithms:
Ddevel-algos.rst1 Developing Cipher Algorithms
40 successfully registered all the given algorithms; if it fails partway
44 return value. Don't try to unregister algorithms that aren't
111 The registration of multi-block cipher algorithms is one of the most
Dintro.rst18 The kernel crypto API refers to all algorithms as "transformations".
34 transformations (such as CRC or even compression algorithms) that can
/Linux-v5.15/net/ipv6/
DKconfig56 AH can be used with various authentication algorithms. Besides
58 implementations of the algorithms that RFC 8221 lists as MUST be
59 implemented. If you need any other algorithms, you'll need to enable
61 implementations of any needed algorithms when available.
71 ESP can be used with various encryption and authentication algorithms.
73 implementations of the algorithms that RFC 8221 lists as MUST be
74 implemented. If you need any other algorithms, you'll need to enable
76 implementations of any needed algorithms when available.
/Linux-v5.15/fs/crypto/
DKconfig17 # allows the algorithms to be built as modules when all the filesystems are,
20 # Note: this option only pulls in the algorithms that filesystem encryption
26 # algorithms, not any per-architecture optimized implementations. It is
/Linux-v5.15/drivers/crypto/hisilicon/
DKconfig35 It provides AES, SM4, and 3DES algorithms with ECB
36 CBC, and XTS cipher mode, and AEAD algorithms.
75 accelerator, which can accelerate RSA and DH algorithms.
/Linux-v5.15/drivers/crypto/keembay/
DKconfig54 sm3, as well as the HMAC variant of these algorithms.
65 Enables support for sha224 and hmac(sha224) algorithms in the Intel
67 algorithms.
/Linux-v5.15/drivers/crypto/allwinner/
DKconfig22 and SHA1 and MD5 hash algorithms.
79 Say y to enable support for hash algorithms.
139 Say y to enable support for hash algorithms.
/Linux-v5.15/Documentation/filesystems/
Dbtrfs.rst21 * Checksums on data and metadata (multiple algorithms available)
23 * Integrated multiple device support, with several raid algorithms
/Linux-v5.15/arch/arm/crypto/
DKconfig4 bool "ARM Accelerated Cryptographic Algorithms"
7 Say Y here to choose from a selection of cryptographic algorithms
151 tristate "NEON and scalar accelerated ChaCha stream cipher algorithms"
/Linux-v5.15/include/linux/
Dcrc8.h46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically
64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically
95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
/Linux-v5.15/Documentation/ABI/testing/
Dsysfs-driver-uacce22 What: /sys/class/uacce/<dev_name>/algorithms
26 Description: Algorithms supported by this accelerator, separated by new line.
Dima_policy59 appraise_algos:= comma-separated list of hash algorithms
62 of these two algorithms.
144 restricts the hash algorithms allowed when writing to the
/Linux-v5.15/drivers/crypto/qce/
Dcore.h49 * @register_algs: invoked by core to register the algorithms
50 * @unregister_algs: invoked by core to unregister the algorithms
Dcommon.h35 /* cipher algorithms */
40 /* hash and hmac algorithms */
/Linux-v5.15/Documentation/userspace-api/media/
Dglossary.rst103 A specialized processor that implements a set of algorithms for
104 processing image data. ISPs may implement algorithms for lens
107 algorithms (e.g. automatic exposure, white balance and focus).
/Linux-v5.15/arch/arm64/crypto/
DKconfig4 bool "ARM64 Accelerated Cryptographic Algorithms"
7 Say Y here to choose from a selection of cryptographic algorithms
/Linux-v5.15/net/ipv4/
DKconfig347 AH can be used with various authentication algorithms. Besides
349 implementations of the algorithms that RFC 8221 lists as MUST be
350 implemented. If you need any other algorithms, you'll need to enable
352 implementations of any needed algorithms when available.
362 ESP can be used with various encryption and authentication algorithms.
364 implementations of the algorithms that RFC 8221 lists as MUST be
365 implemented. If you need any other algorithms, you'll need to enable
367 implementations of any needed algorithms when available.
/Linux-v5.15/Documentation/locking/
Dpi-futex.rst33 technique that often cannot be replaced with lockless algorithms. As we
38 algorithms often endangers to ability to do robust reviews of said code.
40 data structures, instead of lockless algorithms. Furthermore, there are
/Linux-v5.15/net/xfrm/
DKconfig81 # This option selects XFRM_ALGO along with the AH authentication algorithms that
91 # algorithms that RFC 8221 lists as MUST be implemented.
/Linux-v5.15/include/crypto/
Daes.h3 * Common values for AES algorithms
35 * validate key length for AES algorithms
/Linux-v5.15/drivers/mtd/
DKconfig85 You may find that the algorithms used in this code are patented
102 You may find that the algorithms used in this code are patented
127 You may find that the algorithms used in this code are patented
/Linux-v5.15/fs/f2fs/
DKconfig26 layout, but also for selecting allocation and cleaning algorithms.
99 multiple back-end compression algorithms are supported.

12345678910>>...17