Home
last modified time | relevance | path

Searched full:algorithms (Results 1 – 25 of 448) sorted by relevance

12345678910>>...18

/linux-6.8/arch/arm64/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (arm64)"
54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
94 SHA-3 secure hash algorithms (FIPS 202)
135 Block ciphers: AES cipher algorithms (FIPS-197)
149 Block ciphers: AES cipher algorithms (FIPS-197)
160 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
177 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
[all …]
/linux-6.8/drivers/crypto/
DKconfig23 operations with supported algorithms.
42 tristate "PadLock driver for SHA1 and SHA256 algorithms"
48 Use VIA PadLock for SHA1/SHA256 algorithms.
111 tristate "PAES cipher algorithms"
119 AES cipher algorithms for use with protected key.
258 you want to use the OMAP modules for any of the crypto algorithms.
273 want to use the OMAP module for MD5/SHA1/SHA2 algorithms.
287 want to use the OMAP module for AES algorithms.
297 want to use the OMAP module for DES and 3DES algorithms. Currently
338 algorithms execution.
[all …]
/linux-6.8/arch/s390/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (s390)"
11 CRC32c and CRC32 CRC algorithms
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)
66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)
89 Block cipher: AES cipher algorithms (FIPS 197)
/linux-6.8/crypto/
DKconfig3 # Generic algorithms support
61 This option provides the API for cryptographic algorithms.
181 Enable extra run-time self tests of registered crypto algorithms,
188 tristate "Null algorithms"
191 These are 'Null' algorithms, used by IPsec, which do nothing.
313 One of the Russian cryptographic standard algorithms (called GOST
314 algorithms). Only signature verification is implemented.
350 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)
368 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)
436 Camellia cipher algorithms (ISO/IEC 18033-3)
[all …]
/linux-6.8/arch/powerpc/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (powerpc)"
34 Stress test for CRC32c and CRCT10DIF algorithms implemented with
36 Unless you are testing these algorithms, you don't need this.
70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
80 Block ciphers: AES cipher algorithms (FIPS-197)
105 AEAD cipher: AES cipher algorithms (FIPS-197)
122 stream cipher algorithms
/linux-6.8/arch/mips/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (mips)"
10 CRC32c and CRC32 CRC algorithms
49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
70 stream cipher algorithms
/linux-6.8/arch/sparc/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (sparc64)"
55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
74 Block ciphers: AES cipher algorithms (FIPS-197)
85 Block ciphers: Camellia cipher algorithms
/linux-6.8/arch/arm/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (arm)"
123 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
133 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
143 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
153 Block ciphers: AES cipher algorithms (FIPS-197)
175 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
196 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
214 stream cipher algorithms
/linux-6.8/Documentation/crypto/
Dapi-intro.rst23 At the lowest level are algorithms, which register dynamically with the
28 abstraction to the underlying algorithms. However, at the user
35 [algorithm api] (for registering algorithms)
100 Adding New Algorithms
112 Algorithms submitted must also be generally patent-free (e.g. IDEA
117 Also check for any RFCs which may relate to the use of specific algorithms,
119 Cipher Algorithms").
188 Original developers of the crypto algorithms:
/linux-6.8/arch/x86/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (x86)"
25 Block cipher: AES cipher algorithms
50 Block cipher: Camellia cipher algorithms
199 Length-preserving ciphers: SM4 cipher algorithms
221 Length-preserving ciphers: SM4 cipher algorithms
297 Length-preserving cipher: ARIA cipher algorithms
316 Length-preserving cipher: ARIA cipher algorithms
336 Length-preserving cipher: ARIA cipher algorithms
353 stream cipher algorithms
446 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
[all …]
/linux-6.8/net/ipv6/
DKconfig57 AH can be used with various authentication algorithms. Besides
59 implementations of the algorithms that RFC 8221 lists as MUST be
60 implemented. If you need any other algorithms, you'll need to enable
62 implementations of any needed algorithms when available.
72 ESP can be used with various encryption and authentication algorithms.
74 implementations of the algorithms that RFC 8221 lists as MUST be
75 implemented. If you need any other algorithms, you'll need to enable
77 implementations of any needed algorithms when available.
/linux-6.8/Documentation/admin-guide/blockdev/
Dzram.rst92 currently selected (shown in square brackets) compression algorithms,
98 #show supported compression algorithms
110 and, if some of the algorithms were built as modules, it's impossible
352 algorithms can compress) this can be accomplished with::
413 (secondary) compression algorithms. The basic idea is that alternative
421 With CONFIG_ZRAM_MULTI_COMP, zram supports up to 4 compression algorithms:
423 in "3) Select compression algorithm", secondary algorithms are configured
428 #show supported recompression algorithms
433 Alternative compression algorithms are sorted by priority. In the example
436 Alternative compression algorithm's priority is provided during algorithms
[all …]
/linux-6.8/Documentation/filesystems/
Dbtrfs.rst21 * Checksums on data and metadata (multiple algorithms available)
22 * Compression (multiple algorithms available)
26 * Integrated multiple device support, with several raid algorithms
/linux-6.8/fs/crypto/
DKconfig17 # allows the algorithms to be built as modules when all the filesystems are,
20 # Note: this option only pulls in the algorithms that filesystem encryption
26 # algorithms, not any per-architecture optimized implementations. It is
/linux-6.8/drivers/crypto/hisilicon/
DKconfig36 It provides AES, SM4, and 3DES algorithms with ECB
37 CBC, and XTS cipher mode, and AEAD algorithms.
76 accelerator, which can accelerate RSA and DH algorithms.
/linux-6.8/arch/loongarch/crypto/
DKconfig3 menu "Accelerated Cryptographic Algorithms for CPU (loongarch)"
10 CRC32c and CRC32 CRC algorithms
/linux-6.8/drivers/crypto/intel/keembay/
DKconfig73 sm3, as well as the HMAC variant of these algorithms.
84 Enables support for sha224 and hmac(sha224) algorithms in the Intel
86 algorithms.
/linux-6.8/drivers/crypto/allwinner/
DKconfig22 and SHA1 and MD5 hash algorithms.
79 Say y to enable support for hash algorithms.
139 Say y to enable support for hash algorithms.
/linux-6.8/include/linux/
Dcrypto.h92 * This flag is currently only implemented for algorithms of type "skcipher",
93 * "aead", "ahash", "shash", and "cipher". Algorithms of other types might not
96 * In some edge cases, algorithms can allocate memory regardless of this flag.
121 * This is intended to be used by algorithms that are themselves
280 * @cra_alignmask: For cipher, skcipher, lskcipher, and aead algorithms this is
289 * preferred that algorithms do not set a nonzero alignmask.
293 * not supported for hash algorithms and is always 0 for them.
417 * Transforms: user-instantiated objects which encapsulate algorithms
Dcrc8.h46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically
64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically
95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
/linux-6.8/drivers/crypto/qce/
Dcore.h50 * @register_algs: invoked by core to register the algorithms
51 * @unregister_algs: invoked by core to unregister the algorithms
/linux-6.8/Documentation/userspace-api/media/
Dglossary.rst103 A specialized processor that implements a set of algorithms for
104 processing image data. ISPs may implement algorithms for lens
107 algorithms (e.g. automatic exposure, white balance and focus).
/linux-6.8/Documentation/ABI/testing/
Dsysfs-block-zram38 available and selected compression algorithms, change
146 or show secondary compression algorithms.
153 with secondary compression algorithms.
Dsysfs-driver-uacce40 What: /sys/class/uacce/<dev_name>/algorithms
44 Description: Algorithms supported by this accelerator, separated by new line.
/linux-6.8/net/ipv4/
DKconfig346 AH can be used with various authentication algorithms. Besides
348 implementations of the algorithms that RFC 8221 lists as MUST be
349 implemented. If you need any other algorithms, you'll need to enable
351 implementations of any needed algorithms when available.
361 ESP can be used with various encryption and authentication algorithms.
363 implementations of the algorithms that RFC 8221 lists as MUST be
364 implemented. If you need any other algorithms, you'll need to enable
366 implementations of any needed algorithms when available.

12345678910>>...18