Searched full:algorithms (Results 1 – 25 of 476) sorted by relevance
12345678910>>...20
/linux-6.15/arch/arm64/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (arm64)" 55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 65 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 74 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 84 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 95 SHA-3 secure hash algorithms (FIPS 202) 136 Block ciphers: AES cipher algorithms (FIPS-197) 150 Block ciphers: AES cipher algorithms (FIPS-197) 161 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 178 Length-preserving ciphers: AES cipher algorithms (FIPS-197) [all …]
|
/linux-6.15/drivers/crypto/ |
D | Kconfig | 23 operations with supported algorithms. 42 tristate "PadLock driver for SHA1 and SHA256 algorithms" 48 Use VIA PadLock for SHA1/SHA256 algorithms. 177 tristate "PAES cipher algorithms" 185 AES cipher algorithms for use with protected key. 307 you want to use the OMAP modules for any of the crypto algorithms. 322 want to use the OMAP module for MD5/SHA1/SHA2 algorithms. 336 want to use the OMAP module for AES algorithms. 346 want to use the OMAP module for DES and 3DES algorithms. Currently 387 algorithms execution. [all …]
|
/linux-6.15/crypto/ |
D | Kconfig | 3 # Generic algorithms support 61 This option provides the API for cryptographic algorithms. 187 Enable extra run-time self tests of registered crypto algorithms, 194 tristate "Null algorithms" 197 These are 'Null' algorithms, used by IPsec, which do nothing. 332 One of the Russian cryptographic standard algorithms (called GOST 333 algorithms). Only signature verification is implemented. 352 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3) 370 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3) 438 Camellia cipher algorithms (ISO/IEC 18033-3) [all …]
|
/linux-6.15/Documentation/admin-guide/blockdev/ |
D | zram.rst | 80 currently selected (shown in square brackets) compression algorithms, 86 #show supported compression algorithms 94 algorithms that are supported by zram. 99 Compression algorithms may support specific parameters which can be 103 For example, several compression algorithms support `level` parameter. 104 In addition, certain compression algorithms support pre-trained dictionaries, 105 which significantly change algorithms' characteristics. In order to configure 120 Parameters are algorithm specific: not all algorithms support pre-trained 121 dictionaries, not all algorithms support `level`. Furthermore, for certain 122 algorithms `level` controls the compression level (the higher the value the [all …]
|
/linux-6.15/arch/s390/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (s390)" 10 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 32 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 43 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 54 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202) 77 Block cipher: AES cipher algorithms (FIPS 197)
|
/linux-6.15/arch/arm/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (arm)" 126 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 136 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 146 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 156 Block ciphers: AES cipher algorithms (FIPS-197) 177 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 205 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 224 stream cipher algorithms
|
/linux-6.15/arch/sparc/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (sparc64)" 45 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 55 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 64 Block ciphers: AES cipher algorithms (FIPS-197) 75 Block ciphers: Camellia cipher algorithms
|
/linux-6.15/arch/x86/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (x86)" 28 Block cipher: AES cipher algorithms 57 Block cipher: Camellia cipher algorithms 206 Length-preserving ciphers: SM4 cipher algorithms 228 Length-preserving ciphers: SM4 cipher algorithms 304 Length-preserving cipher: ARIA cipher algorithms 323 Length-preserving cipher: ARIA cipher algorithms 343 Length-preserving cipher: ARIA cipher algorithms 361 stream cipher algorithms 456 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) [all …]
|
/linux-6.15/arch/mips/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (mips)" 42 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 52 SHA-384 and SHA-512 secure hash algorithms (FIPS 180) 64 stream cipher algorithms
|
/linux-6.15/Documentation/crypto/ |
D | api-intro.rst | 23 At the lowest level are algorithms, which register dynamically with the 28 abstraction to the underlying algorithms. However, at the user 35 [algorithm api] (for registering algorithms) 100 Adding New Algorithms 112 Algorithms submitted must also be generally patent-free (e.g. IDEA 117 Also check for any RFCs which may relate to the use of specific algorithms, 119 Cipher Algorithms"). 188 Original developers of the crypto algorithms:
|
/linux-6.15/arch/powerpc/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (powerpc)" 50 SHA-224 and SHA-256 secure hash algorithms (FIPS 180) 60 Block ciphers: AES cipher algorithms (FIPS-197) 86 AEAD cipher: AES cipher algorithms (FIPS-197) 104 stream cipher algorithms
|
/linux-6.15/net/ipv6/ |
D | Kconfig | 57 AH can be used with various authentication algorithms. Besides 59 implementations of the algorithms that RFC 8221 lists as MUST be 60 implemented. If you need any other algorithms, you'll need to enable 62 implementations of any needed algorithms when available. 72 ESP can be used with various encryption and authentication algorithms. 74 implementations of the algorithms that RFC 8221 lists as MUST be 75 implemented. If you need any other algorithms, you'll need to enable 77 implementations of any needed algorithms when available.
|
/linux-6.15/Documentation/filesystems/ |
D | btrfs.rst | 21 * Checksums on data and metadata (multiple algorithms available) 22 * Compression (multiple algorithms available) 26 * Integrated multiple device support, with several raid algorithms
|
/linux-6.15/fs/crypto/ |
D | Kconfig | 18 # allows the algorithms to be built as modules when all the filesystems are, 21 # Note: this option only pulls in the algorithms that filesystem encryption 27 # algorithms, not any per-architecture optimized implementations. It is
|
/linux-6.15/drivers/crypto/hisilicon/ |
D | Kconfig | 36 It provides AES, SM4, and 3DES algorithms with ECB 37 CBC, and XTS cipher mode, and AEAD algorithms. 76 accelerator, which can accelerate RSA and DH algorithms.
|
/linux-6.15/drivers/crypto/intel/keembay/ |
D | Kconfig | 73 sm3, as well as the HMAC variant of these algorithms. 84 Enables support for sha224 and hmac(sha224) algorithms in the Intel 86 algorithms.
|
/linux-6.15/drivers/crypto/allwinner/ |
D | Kconfig | 22 and SHA1 and MD5 hash algorithms. 79 Say y to enable support for hash algorithms. 139 Say y to enable support for hash algorithms.
|
/linux-6.15/include/linux/ |
D | crypto.h | 93 * This flag is currently only implemented for algorithms of type "skcipher", 94 * "aead", "ahash", "shash", and "cipher". Algorithms of other types might not 97 * In some edge cases, algorithms can allocate memory regardless of this flag. 122 * This is intended to be used by algorithms that are themselves 267 * @cra_alignmask: For cipher, skcipher, lskcipher, and aead algorithms this is 276 * preferred that algorithms do not set a nonzero alignmask. 280 * not supported for hash algorithms and is always 0 for them. 401 * Transforms: user-instantiated objects which encapsulate algorithms
|
D | crc8.h | 46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically 64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically 95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
|
/linux-6.15/Documentation/devicetree/bindings/crypto/ |
D | nvidia,tegra234-se-aes.yaml | 7 title: NVIDIA Tegra Security Engine for AES algorithms 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
|
/linux-6.15/drivers/crypto/qce/ |
D | core.h | 53 * @register_algs: invoked by core to register the algorithms 54 * @unregister_algs: invoked by core to unregister the algorithms
|
/linux-6.15/Documentation/ABI/testing/ |
D | sysfs-block-zram | 30 available and selected compression algorithms, change 138 or show secondary compression algorithms. 145 with secondary compression algorithms.
|
D | sysfs-driver-uacce | 40 What: /sys/class/uacce/<dev_name>/algorithms 44 Description: Algorithms supported by this accelerator, separated by new line.
|
/linux-6.15/arch/riscv/crypto/ |
D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (riscv)" 12 Block cipher: AES cipher algorithms
|
/linux-6.15/net/ipv4/ |
D | Kconfig | 346 AH can be used with various authentication algorithms. Besides 348 implementations of the algorithms that RFC 8221 lists as MUST be 349 implemented. If you need any other algorithms, you'll need to enable 351 implementations of any needed algorithms when available. 361 ESP can be used with various encryption and authentication algorithms. 363 implementations of the algorithms that RFC 8221 lists as MUST be 364 implemented. If you need any other algorithms, you'll need to enable 366 implementations of any needed algorithms when available.
|
12345678910>>...20