Searched full:algorithm (Results 1 – 25 of 3163) sorted by relevance
12345678910>>...127
| /kernel/linux/linux-5.10/crypto/ |
| D | Kconfig | 117 tristate "Cryptographic algorithm manager" 133 tristate "Userspace cryptographic algorithm configuration" 145 algorithm registration. 179 This converts an arbitrary crypto algorithm into a parallel 180 algorithm that executes in kernel threads. 189 converts an arbitrary synchronous software crypto algorithm 190 into an asynchronous algorithm that executes in a kernel thread. 225 tristate "RSA algorithm" 231 Generic implementation of the RSA public key algorithm. 234 tristate "Diffie-Hellman algorithm" [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | Kconfig | 144 tristate "Cryptographic algorithm manager" 162 tristate "Userspace cryptographic algorithm configuration" 174 algorithm registration. 205 This converts an arbitrary crypto algorithm into a parallel 206 algorithm that executes in kernel threads. 215 converts an arbitrary synchronous software crypto algorithm 216 into an asynchronous algorithm that executes in a kernel thread. 255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) 262 DH (Diffie-Hellman) key exchange algorithm 286 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm [all …]
|
| /kernel/linux/linux-6.6/net/batman-adv/ |
| D | bat_algo.c | 28 * batadv_algo_init() - Initialize batman-adv algorithm management data 37 * batadv_algo_get() - Search for algorithm with specific name 38 * @name: algorithm name to find 58 * batadv_algo_register() - Register callbacks for a mesh algorithm 59 * @bat_algo_ops: mesh algorithm callbacks to add 69 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register() 93 * batadv_algo_select() - Select algorithm of soft interface 95 * @name: name of the algorithm to select 97 * The algorithm callbacks for the soft interface will be set when the algorithm 98 * with the correct name was found. Any previous selected algorithm will not be [all …]
|
| /kernel/linux/linux-6.6/include/crypto/internal/ |
| D | acompress.h | 16 * struct acomp_alg - asynchronous compression algorithm 20 * @dst_free: Frees destination buffer if allocated inside the algorithm 34 * @stat: Statistics for compress algorithm 35 * @base: Common crypto API algorithm data structure 36 * @calg: Cmonn algorithm data structure shared with scomp 88 * crypto_register_acomp() -- Register asynchronous compression algorithm 91 * compression algorithm 93 * @alg: algorithm definition 100 * crypto_unregister_acomp() -- Unregister asynchronous compression algorithm 103 * compression algorithm [all …]
|
| D | scompress.h | 24 * struct scomp_alg - synchronous compression algorithm 26 * @alloc_ctx: Function allocates algorithm specific context 30 * @stat: Statistics for compress algorithm 31 * @base: Common crypto API algorithm data structure 32 * @calg: Cmonn algorithm data structure shared with acomp 103 * crypto_register_scomp() -- Register synchronous compression algorithm 106 * compression algorithm 108 * @alg: algorithm definition 115 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm 118 * compression algorithm [all …]
|
| D | kpp.h | 32 * struct crypto_kpp_spawn - KPP algorithm spawn 35 * Template instances can get a hold on some inner KPP algorithm by 150 * KPP algorithm (un)registration functions. 153 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm 156 * algorithm 158 * @alg: algorithm definition 166 * algorithm 169 * algorithm 171 * @alg: algorithm definition 188 * crypto_grab_kpp() - Look up a KPP algorithm and bind a spawn to it. [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | crypto.h | 21 * Algorithm masks and types. 48 * Set if the algorithm (or an algorithm which it uses) requires another 49 * algorithm of the same type to handle corner cases. 54 * Set if the algorithm has passed automated run-time testing. Note that 55 * if there is no run-time testing for a given algorithm it is considered 62 * Set if the algorithm is an instance that is built from templates. 66 /* Set this bit if the algorithm provided is hardware accelerated but 78 * Set if the algorithm has a ->setkey() method but can be used without 89 * The algorithm may allocate memory during request processing, i.e. during 90 * encryption, decryption, or hashing. Users can request an algorithm with this [all …]
|
| D | dim.h | 15 * Causes a moderation of the algorithm run. 89 * @state: Algorithm state (see below) 97 * @tune_state: Algorithm tuning state (see below) 131 * enum dim_state - DIM algorithm states 133 * These will determine if the algorithm is in a valid state to start an iteration. 136 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if 147 * enum dim_tune_state - DIM algorithm tune states 149 * These will determine which action the algorithm should perform. 151 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference 152 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0 [all …]
|
| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | api-intro.rst | 35 [algorithm api] (for registering algorithms) 37 The idea is to make the user interface and algorithm registration API 103 When submitting a new algorithm for inclusion, a mandatory requirement 204 SHA1 algorithm contributors: 207 DES algorithm contributors: 212 Blowfish algorithm contributors: 216 Twofish algorithm contributors: 220 SHA256/384/512 algorithm contributors: 225 AES algorithm contributors: 233 CAST5 algorithm contributors: [all …]
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | api-intro.rst | 35 [algorithm api] (for registering algorithms) 37 The idea is to make the user interface and algorithm registration API 103 When submitting a new algorithm for inclusion, a mandatory requirement 204 SHA1 algorithm contributors: 207 DES algorithm contributors: 212 Blowfish algorithm contributors: 216 Twofish algorithm contributors: 220 SHA256/384/512 algorithm contributors: 225 AES algorithm contributors: 233 CAST5 algorithm contributors: [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/crypto/ |
| D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 65 tristate "CRCT10DIF digest algorithm using PMULL instructions" 122 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | crypto.h | 37 * Algorithm masks and types. 63 * Set if the algorithm (or an algorithm which it uses) requires another 64 * algorithm of the same type to handle corner cases. 69 * Set if the algorithm has passed automated run-time testing. Note that 70 * if there is no run-time testing for a given algorithm it is considered 77 * Set if the algorithm is an instance that is built from templates. 81 /* Set this bit if the algorithm provided is hardware accelerated but 93 * Set if the algorithm has a ->setkey() method but can be used without 104 * The algorithm may allocate memory during request processing, i.e. during 105 * encryption, decryption, or hashing. Users can request an algorithm with this [all …]
|
| D | dim.h | 15 * Causes a moderation of the algorithm run. 89 * @state: Algorithm state (see below) 97 * @tune_state: Algorithm tuning state (see below) 131 * enum dim_state - DIM algorithm states 133 * These will determine if the algorithm is in a valid state to start an iteration. 136 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if 147 * enum dim_tune_state - DIM algorithm tune states 149 * These will determine which action the algorithm should perform. 151 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference 152 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0 [all …]
|
| /kernel/linux/linux-5.10/net/batman-adv/ |
| D | bat_algo.c | 29 * batadv_algo_init() - Initialize batman-adv algorithm management data 53 * batadv_algo_register() - Register callbacks for a mesh algorithm 54 * @bat_algo_ops: mesh algorithm callbacks to add 64 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register() 88 * batadv_algo_select() - Select algorithm of soft interface 90 * @name: name of the algorithm to select 92 * The algorithm callbacks for the soft interface will be set when the algorithm 93 * with the correct name was found. Any previous selected algorithm will not be 94 * deinitialized and the new selected algorithm will also not be initialized. 147 pr_err("Routing algorithm '%s' is not supported\n", algo_name); in batadv_param_set_ra() [all …]
|
| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | net_dim.rst | 21 processing. The mechanism includes an algorithm which decides if and how to 24 iteration of the algorithm, it analyses a given sample of the data, compares it 30 the algorithm might decide not to change anything. The configuration fields are 32 number of wanted packets per event. The Net DIM algorithm ascribes importance to 36 Net DIM Algorithm 39 Each iteration of the Net DIM algorithm follows these steps: 54 compared. Here the algorithm tries to optimize for lower interrupt rate so an 62 and the internal state of the algorithm. The states reflect the "direction" of 63 the algorithm: is it going left (reducing moderation), right (increasing 66 algorithm would increase in order to reduce calculation overhead. Also, after [all …]
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | net_dim.rst | 21 processing. The mechanism includes an algorithm which decides if and how to 24 iteration of the algorithm, it analyses a given sample of the data, compares it 30 the algorithm might decide not to change anything. The configuration fields are 32 number of wanted packets per event. The Net DIM algorithm ascribes importance to 36 Net DIM Algorithm 39 Each iteration of the Net DIM algorithm follows these steps: 54 compared. Here the algorithm tries to optimize for lower interrupt rate so an 62 and the internal state of the algorithm. The states reflect the "direction" of 63 the algorithm: is it going left (reducing moderation), right (increasing 66 algorithm would increase in order to reduce calculation overhead. Also, after [all …]
|
| /kernel/linux/linux-6.6/include/crypto/ |
| D | akcipher.h | 48 * @reqsize: Request context size required by algorithm implementation 49 * @base: Common crypto API algorithm data structure 58 * struct crypto_istat_akcipher - statistics for akcipher algorithm 78 * struct akcipher_alg - generic public key algorithm 81 * algorithm. In case of error, where the dst_len was insufficient, 85 * public key algorithm, returning verification status. Requires 88 * algorithm. In case of error, where the dst_len was insufficient, 92 * algorithm. In case of error, where the dst_len was insufficient, 95 * @set_pub_key: Function invokes the algorithm specific set public key 98 * @set_priv_key: Function invokes the algorithm specific set private key [all …]
|
| D | sig.h | 3 * Public Key Signature Algorithm 16 * @base: Common crypto API algorithm data structure 32 * signing algorithm e.g. "ecdsa" 33 * @type: specifies the type of the algorithm 34 * @mask: specifies the mask for the algorithm 36 * Allocate a handle for public key signature algorithm. The returned struct 77 * Function invokes the specific signing operation for a given algorithm 95 * for a given algorithm. 112 * Function invokes the algorithm specific set key function, which knows 128 * Function invokes the algorithm specific set key function, which knows
|
| /kernel/linux/linux-6.6/arch/x86/crypto/ |
| D | Kconfig | 11 Curve25519 algorithm 39 Block cipher: Blowfish cipher algorithm 89 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm 107 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm 122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 137 Length-preserving ciphers: Serpent cipher algorithm 153 Length-preserving ciphers: Serpent cipher algorithm 170 Length-preserving ciphers: Serpent cipher algorithm 183 Length-preserving ciphers: Serpent cipher algorithm 241 Block cipher: Twofish cipher algorithm [all …]
|
| /kernel/linux/linux-5.10/include/crypto/internal/ |
| D | scompress.h | 20 * struct scomp_alg - synchronous compression algorithm 22 * @alloc_ctx: Function allocates algorithm specific context 26 * @base: Common crypto API algorithm data structure 97 * crypto_register_scomp() -- Register synchronous compression algorithm 100 * compression algorithm 102 * @alg: algorithm definition 109 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm 112 * compression algorithm 114 * @alg: algorithm definition
|
| D | akcipher.h | 103 * crypto_register_akcipher() -- Register public key algorithm 105 * Function registers an implementation of a public key verify algorithm 107 * @alg: algorithm definition 114 * crypto_unregister_akcipher() -- Unregister public key algorithm 116 * Function unregisters an implementation of a public key verify algorithm 118 * @alg: algorithm definition 125 * Function registers an implementation of an asymmetric key algorithm 128 * @tmpl: the template from which the algorithm was created
|
| /kernel/linux/linux-5.10/include/crypto/ |
| D | akcipher.h | 46 * @base: Common crypto API algorithm data structure 53 * struct akcipher_alg - generic public key algorithm 56 * algorithm. In case of error, where the dst_len was insufficient, 60 * public key algorithm, returning verification status. Requires 63 * algorithm. In case of error, where the dst_len was insufficient, 67 * algorithm. In case of error, where the dst_len was insufficient, 70 * @set_pub_key: Function invokes the algorithm specific set public key 73 * @set_priv_key: Function invokes the algorithm specific set private key 89 * @reqsize: Request context size required by algorithm implementation 90 * @base: Common crypto API algorithm data structure [all …]
|
| D | acompress.h | 43 * algorithm 45 * @base: Common crypto API algorithm data structure 56 * struct acomp_alg - asynchronous compression algorithm 60 * @dst_free: Frees destination buffer if allocated inside the algorithm 74 * @base: Common crypto API algorithm data structure 96 * compression algorithm e.g. "deflate" 97 * @type: specifies the type of the algorithm 98 * @mask: specifies the mask for the algorithm 100 * Allocate a handle for a compression algorithm. The returned struct 112 * compression algorithm e.g. "deflate" [all …]
|
| /kernel/linux/linux-5.10/net/netfilter/ipvs/ |
| D | Kconfig | 117 The robin-robin scheduling algorithm simply directs network 126 The weighted robin-robin scheduling algorithm directs network 139 The least-connection scheduling algorithm directs network 149 The weighted least-connection scheduling algorithm directs network 159 The weighted failover scheduling algorithm directs network 169 The weighted overflow scheduling algorithm directs network 180 The locality-based least-connection scheduling algorithm is for 182 This algorithm usually directs packet destined for an IP address to 195 algorithm is also for destination IP load balancing. It is 212 The destination hashing scheduling algorithm assigns network [all …]
|
| /kernel/linux/linux-6.6/net/netfilter/ipvs/ |
| D | Kconfig | 118 The robin-robin scheduling algorithm simply directs network 127 The weighted robin-robin scheduling algorithm directs network 140 The least-connection scheduling algorithm directs network 150 The weighted least-connection scheduling algorithm directs network 160 The weighted failover scheduling algorithm directs network 170 The weighted overflow scheduling algorithm directs network 181 The locality-based least-connection scheduling algorithm is for 183 This algorithm usually directs packet destined for an IP address to 196 algorithm is also for destination IP load balancing. It is 213 The destination hashing scheduling algorithm assigns network [all …]
|
12345678910>>...127