Lines Matching refs:algorithm
145 tristate "Cryptographic algorithm manager"
163 tristate "Userspace cryptographic algorithm configuration"
175 algorithm registration.
206 This converts an arbitrary crypto algorithm into a parallel
207 algorithm that executes in kernel threads.
216 converts an arbitrary synchronous software crypto algorithm
217 into an asynchronous algorithm that executes in a kernel thread.
256 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
263 DH (Diffie-Hellman) key exchange algorithm
287 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
324 SM2 (ShangMi 2) public key algorithm
389 Anubis cipher algorithm
402 ARIA cipher algorithm (RFC5794)
404 ARIA is a standard encryption algorithm of the Republic of Korea.
411 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
418 Blowfish cipher algorithm, by Bruce Schneier
429 Common parts of the Blowfish cipher algorithm shared by the
456 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
463 CAST6 (CAST-256) encryption algorithm (RFC2612)
479 FCrypt algorithm used by RxRPC
488 Khazad cipher algorithm
491 an algorithm optimized for 64-bit processors with good performance
502 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
506 national standard encryption algorithm of the Republic of Korea.
509 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
516 Serpent cipher algorithm, by Anderson, Biham & Knudsen
565 the TEA algorithm to address a potential key weakness
566 in the TEA algorithm.
569 of the XTEA algorithm for compatibility purposes.
576 Twofish cipher algorithm
588 Common parts of the Twofish cipher algorithm shared by the
626 ARC4 cipher algorithm
629 bits in length. This algorithm is required for driver-based
631 weakness of the algorithm.
777 AEGIS-128 AEAD algorithm
784 AEGIS-128 AEAD algorithm
836 xoring it with a salt. This algorithm is mainly useful for CTR.
848 algorithm for CBC.
931 MD4 message digest algorithm (RFC1320)
937 MD5 message digest algorithm (RFC1321)
948 This algorithm is required for TKIP, but it should not be used for
949 other purposes because of the weakness of the algorithm.
966 Poly1305 authenticator algorithm (RFC7539)
968 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
995 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)
1054 VMAC is a message authentication algorithm designed for
1085 xxHash non-cryptographic hash algorithm
1100 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1115 CRC32 CRC algorithm (IEEE 802.3)
1123 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
1125 CRC algorithm used by the SCSI Block Commands standard.
1128 tristate "CRC64 based on Rocksoft Model algorithm"
1132 CRC64 CRC algorithm based on the Rocksoft Model CRC Algorithm
1149 Deflate compression algorithm (RFC1951)
1160 LZO compression algorithm
1171 842 compression algorithm by IBM
1182 LZ4 compression algorithm
1193 LZ4 high compression mode algorithm
1204 zstd compression algorithm
1219 This uses the AES cipher algorithm.
1253 This uses the AES cipher algorithm with the counter block mode.