Home
last modified time | relevance | path

Searched refs:algorithms (Results 1 – 25 of 32) sorted by relevance

12

/Zephyr-latest/subsys/demand_paging/eviction/
DKconfig4 # Demand paging sample eviction algorithms
7 prompt "Page frame eviction algorithms"
59 Selected by eviction algorithms which needs page tracking and need to
/Zephyr-latest/doc/services/crypto/
Dindex.rst8 behind the operation of the different algorithms and how they were implemented.
Dpsa_crypto.rst33 The PSA Crypto API supports a wide range of cryptographic algorithms,
36 security as new algorithms emerge and existing ones become obsolete.
89 to the algorithms commonly used for attestation.
/Zephyr-latest/doc/kernel/data_structures/
Dmpsc_lockfree.rst8 at `1024cores <https://www.1024cores.net/home/lock-free-algorithms/queues/intrusive-mpsc-node-based…
/Zephyr-latest/tests/benchmarks/sched_queues/
DREADME.rst5 algorithms: dumb, scalable and multiq. These different algorithms have
/Zephyr-latest/subsys/demand_paging/backing_store/
DKconfig5 prompt "Backing store algorithms"
/Zephyr-latest/subsys/bluetooth/mesh/
Dprovisioner.c211 caps.algorithms = sys_get_be16(&data[1]); in prov_capabilities()
212 LOG_DBG("Algorithms: 0x%02x", caps.algorithms); in prov_capabilities()
217 if ((caps.algorithms & BIT(BT_MESH_PROV_AUTH_CMAC_AES128_AES_CCM)) && in prov_capabilities()
222 if ((caps.algorithms & BIT(BT_MESH_PROV_AUTH_HMAC_SHA256_AES_CCM)) && in prov_capabilities()
/Zephyr-latest/include/zephyr/bluetooth/mesh/
Dmain.h93 uint16_t algorithms; member
/Zephyr-latest/modules/cmsis-dsp/
DKconfig202 support the following algorithms:
221 following distance computation algorithms:
/Zephyr-latest/doc/services/crypto/random/
Dindex.rst13 FIPS 140-2 [NIST02]_ recommended algorithms. Hardware based random-number
/Zephyr-latest/doc/security/
Dsecurity-overview.rst99 algorithms and protocols. Support for cryptographic hardware is
123 cryptographic algorithms, and on its monolithic system design.
129 Crypto, supports a wide range of cryptographic algorithms, making it
284 security measures, publicly accepted cryptographic algorithms and
585 investigations on cryptographic algorithms, critical OS tasks, and
596 invariance** of the cryptographic algorithms and modules is
Dsecure-coding.rst63 security measures, publicly accepted cryptographic algorithms and
/Zephyr-latest/boards/adi/max32655evkit/doc/
Dindex.rst8 algorithms, integrated power management (SIMO), and the newest generation
/Zephyr-latest/lib/posix/options/
DKconfig.pthread101 scheduling algorithms for different threads via functions such as pthread_setschedparam()
/Zephyr-latest/boards/adi/max32690evkit/doc/
Dindex.rst8 algorithms, and the latest generation Bluetooth® 5 Low Energy (Bluetooth LE) radio designed
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dprovisioning.rst81 methods and algorithms.
/Zephyr-latest/modules/mbedtls/
DKconfig171 Enable self test function for the crypto algorithms
DKconfig.tls-generic310 comment "Supported hash algorithms"
/Zephyr-latest/kernel/
DKconfig.vm166 algorithms and optimizing backing store.
/Zephyr-latest/doc/services/sensing/
Dindex.rst32 algorithms in user space with virtual sensor concepts. The existing
/Zephyr-latest/doc/kernel/memory_management/
Ddemand_paging.rst148 Two eviction algorithms are currently available:
/Zephyr-latest/boards/st/nucleo_wb55rg/doc/
Dnucleo_wb55rg.rst120 - Cryptographic algorithms: RSA, Diffie-Helman, ECC over GF(p)
/Zephyr-latest/boards/st/stm32wb5mmg/doc/
Dstm32wb5mmg.rst143 - Cryptographic algorithms: RSA, Diffie-Helman, ECC over GF(p)
/Zephyr-latest/scripts/
Dspelling.txt99 algoritms||algorithms
115 alogirhtms||algorithms
/Zephyr-latest/doc/releases/
Dmigration-guide-3.7.rst96 * TLS 1.2, RSA, AES, DES, and all the hash algorithms except SHA-256
103 enable all the available hash algorithms. Previously, it used to only enable the SHA-2 ones.

12