Lines Matching full:algorithms
3 # Generic algorithms support
39 This option provides the API for cryptographic algorithms.
150 Enable extra run-time self tests of registered crypto algorithms,
160 tristate "Null algorithms"
163 These are 'Null' algorithms, used by IPsec, which do nothing.
260 standard algorithms (called GOST algorithms). Only signature verification
652 CRC32c and CRC32 CRC algorithms implemented using mips crypto
672 This module provides the following algorithms:
690 This module provides the following algorithms:
737 Stress test for CRC32c and CRC-T10DIF algorithms implemented with
739 Unless you are testing these algorithms, you don't need this.
992 tristate "SHA384 and SHA512 digest algorithms"
1004 tristate "SHA384 and SHA512 digest algorithms (OCTEON)"
1047 cryptographic standard algorithms (called GOST algorithms).
1048 This setting enables two hash algorithms with 256 and 512 bits output.
1055 tristate "Tiger digest algorithms"
1068 tristate "Whirlpool digest algorithms"
1090 tristate "AES cipher algorithms"
1094 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1130 tristate "AES cipher algorithms (AES-NI)"
1141 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1163 tristate "AES cipher algorithms (SPARC64)"
1169 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1190 tristate "AES cipher algorithms (PPC SPE)"
1194 AES cipher algorithms (FIPS-197). Additionally the acceleration
1270 tristate "Camellia cipher algorithms"
1274 Camellia cipher algorithms module.
1357 Common parts of the CAST cipher algorithms shared by the
1407 tristate "DES and Triple DES EDE cipher algorithms"
1414 tristate "DES and Triple DES EDE cipher algorithms (SPARC64)"
1470 tristate "ChaCha stream cipher algorithms"
1474 The ChaCha20, XChaCha20, and XChaCha12 stream cipher algorithms.
1492 tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
1502 tristate "ChaCha stream cipher algorithms (MIPS 32r2 optimized)"
1613 SM4 cipher algorithms (OSCCA GB/T 32907-2016).
1617 as an authorized cryptographic algorithms for the use within China.
1635 tristate "TEA, XTEA and XETA cipher algorithms"
1674 tristate "Twofish cipher algorithms (i586)"
1869 tristate "User-space interface for hash algorithms"
1875 algorithms.
1878 tristate "User-space interface for symmetric key cipher algorithms"
1884 key cipher algorithms.
1887 tristate "User-space interface for random number generator algorithms"
1893 number generator algorithms.
1905 tristate "User-space interface for AEAD cipher algorithms"
1913 cipher algorithms.
1916 bool "Enable obsolete cryptographic algorithms for userspace"
1920 Allow obsolete cryptographic algorithms to be selected that have