Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 3163) sorted by relevance

12345678910>>...127

/kernel/linux/linux-5.10/crypto/
DKconfig117 tristate "Cryptographic algorithm manager"
133 tristate "Userspace cryptographic algorithm configuration"
145 algorithm registration.
179 This converts an arbitrary crypto algorithm into a parallel
180 algorithm that executes in kernel threads.
189 converts an arbitrary synchronous software crypto algorithm
190 into an asynchronous algorithm that executes in a kernel thread.
225 tristate "RSA algorithm"
231 Generic implementation of the RSA public key algorithm.
234 tristate "Diffie-Hellman algorithm"
[all …]
/kernel/linux/linux-6.6/crypto/
DKconfig144 tristate "Cryptographic algorithm manager"
162 tristate "Userspace cryptographic algorithm configuration"
174 algorithm registration.
205 This converts an arbitrary crypto algorithm into a parallel
206 algorithm that executes in kernel threads.
215 converts an arbitrary synchronous software crypto algorithm
216 into an asynchronous algorithm that executes in a kernel thread.
255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
262 DH (Diffie-Hellman) key exchange algorithm
286 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
[all …]
/kernel/linux/linux-6.6/net/batman-adv/
Dbat_algo.c28 * batadv_algo_init() - Initialize batman-adv algorithm management data
37 * batadv_algo_get() - Search for algorithm with specific name
38 * @name: algorithm name to find
58 * batadv_algo_register() - Register callbacks for a mesh algorithm
59 * @bat_algo_ops: mesh algorithm callbacks to add
69 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register()
93 * batadv_algo_select() - Select algorithm of soft interface
95 * @name: name of the algorithm to select
97 * The algorithm callbacks for the soft interface will be set when the algorithm
98 * with the correct name was found. Any previous selected algorithm will not be
[all …]
/kernel/linux/linux-6.6/include/crypto/internal/
Dacompress.h16 * struct acomp_alg - asynchronous compression algorithm
20 * @dst_free: Frees destination buffer if allocated inside the algorithm
34 * @stat: Statistics for compress algorithm
35 * @base: Common crypto API algorithm data structure
36 * @calg: Cmonn algorithm data structure shared with scomp
88 * crypto_register_acomp() -- Register asynchronous compression algorithm
91 * compression algorithm
93 * @alg: algorithm definition
100 * crypto_unregister_acomp() -- Unregister asynchronous compression algorithm
103 * compression algorithm
[all …]
Dscompress.h24 * struct scomp_alg - synchronous compression algorithm
26 * @alloc_ctx: Function allocates algorithm specific context
30 * @stat: Statistics for compress algorithm
31 * @base: Common crypto API algorithm data structure
32 * @calg: Cmonn algorithm data structure shared with acomp
103 * crypto_register_scomp() -- Register synchronous compression algorithm
106 * compression algorithm
108 * @alg: algorithm definition
115 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm
118 * compression algorithm
[all …]
Dkpp.h32 * struct crypto_kpp_spawn - KPP algorithm spawn
35 * Template instances can get a hold on some inner KPP algorithm by
150 * KPP algorithm (un)registration functions.
153 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm
156 * algorithm
158 * @alg: algorithm definition
166 * algorithm
169 * algorithm
171 * @alg: algorithm definition
188 * crypto_grab_kpp() - Look up a KPP algorithm and bind a spawn to it.
[all …]
/kernel/linux/linux-6.6/include/linux/
Dcrypto.h21 * Algorithm masks and types.
48 * Set if the algorithm (or an algorithm which it uses) requires another
49 * algorithm of the same type to handle corner cases.
54 * Set if the algorithm has passed automated run-time testing. Note that
55 * if there is no run-time testing for a given algorithm it is considered
62 * Set if the algorithm is an instance that is built from templates.
66 /* Set this bit if the algorithm provided is hardware accelerated but
78 * Set if the algorithm has a ->setkey() method but can be used without
89 * The algorithm may allocate memory during request processing, i.e. during
90 * encryption, decryption, or hashing. Users can request an algorithm with this
[all …]
Ddim.h15 * Causes a moderation of the algorithm run.
89 * @state: Algorithm state (see below)
97 * @tune_state: Algorithm tuning state (see below)
131 * enum dim_state - DIM algorithm states
133 * These will determine if the algorithm is in a valid state to start an iteration.
136 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if
147 * enum dim_tune_state - DIM algorithm tune states
149 * These will determine which action the algorithm should perform.
151 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference
152 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0
[all …]
/kernel/linux/linux-6.6/Documentation/crypto/
Dapi-intro.rst35 [algorithm api] (for registering algorithms)
37 The idea is to make the user interface and algorithm registration API
103 When submitting a new algorithm for inclusion, a mandatory requirement
204 SHA1 algorithm contributors:
207 DES algorithm contributors:
212 Blowfish algorithm contributors:
216 Twofish algorithm contributors:
220 SHA256/384/512 algorithm contributors:
225 AES algorithm contributors:
233 CAST5 algorithm contributors:
[all …]
/kernel/linux/linux-5.10/Documentation/crypto/
Dapi-intro.rst35 [algorithm api] (for registering algorithms)
37 The idea is to make the user interface and algorithm registration API
103 When submitting a new algorithm for inclusion, a mandatory requirement
204 SHA1 algorithm contributors:
207 DES algorithm contributors:
212 Blowfish algorithm contributors:
216 Twofish algorithm contributors:
220 SHA256/384/512 algorithm contributors:
225 AES algorithm contributors:
233 CAST5 algorithm contributors:
[all …]
/kernel/linux/linux-5.10/arch/arm64/crypto/
DKconfig13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)"
45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)"
65 tristate "CRCT10DIF digest algorithm using PMULL instructions"
122 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
/kernel/linux/linux-5.10/include/linux/
Dcrypto.h37 * Algorithm masks and types.
63 * Set if the algorithm (or an algorithm which it uses) requires another
64 * algorithm of the same type to handle corner cases.
69 * Set if the algorithm has passed automated run-time testing. Note that
70 * if there is no run-time testing for a given algorithm it is considered
77 * Set if the algorithm is an instance that is built from templates.
81 /* Set this bit if the algorithm provided is hardware accelerated but
93 * Set if the algorithm has a ->setkey() method but can be used without
104 * The algorithm may allocate memory during request processing, i.e. during
105 * encryption, decryption, or hashing. Users can request an algorithm with this
[all …]
Ddim.h15 * Causes a moderation of the algorithm run.
89 * @state: Algorithm state (see below)
97 * @tune_state: Algorithm tuning state (see below)
131 * enum dim_state - DIM algorithm states
133 * These will determine if the algorithm is in a valid state to start an iteration.
136 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if
147 * enum dim_tune_state - DIM algorithm tune states
149 * These will determine which action the algorithm should perform.
151 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference
152 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0
[all …]
/kernel/linux/linux-5.10/net/batman-adv/
Dbat_algo.c29 * batadv_algo_init() - Initialize batman-adv algorithm management data
53 * batadv_algo_register() - Register callbacks for a mesh algorithm
54 * @bat_algo_ops: mesh algorithm callbacks to add
64 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register()
88 * batadv_algo_select() - Select algorithm of soft interface
90 * @name: name of the algorithm to select
92 * The algorithm callbacks for the soft interface will be set when the algorithm
93 * with the correct name was found. Any previous selected algorithm will not be
94 * deinitialized and the new selected algorithm will also not be initialized.
147 pr_err("Routing algorithm '%s' is not supported\n", algo_name); in batadv_param_set_ra()
[all …]
/kernel/linux/linux-6.6/Documentation/networking/
Dnet_dim.rst21 processing. The mechanism includes an algorithm which decides if and how to
24 iteration of the algorithm, it analyses a given sample of the data, compares it
30 the algorithm might decide not to change anything. The configuration fields are
32 number of wanted packets per event. The Net DIM algorithm ascribes importance to
36 Net DIM Algorithm
39 Each iteration of the Net DIM algorithm follows these steps:
54 compared. Here the algorithm tries to optimize for lower interrupt rate so an
62 and the internal state of the algorithm. The states reflect the "direction" of
63 the algorithm: is it going left (reducing moderation), right (increasing
66 algorithm would increase in order to reduce calculation overhead. Also, after
[all …]
/kernel/linux/linux-5.10/Documentation/networking/
Dnet_dim.rst21 processing. The mechanism includes an algorithm which decides if and how to
24 iteration of the algorithm, it analyses a given sample of the data, compares it
30 the algorithm might decide not to change anything. The configuration fields are
32 number of wanted packets per event. The Net DIM algorithm ascribes importance to
36 Net DIM Algorithm
39 Each iteration of the Net DIM algorithm follows these steps:
54 compared. Here the algorithm tries to optimize for lower interrupt rate so an
62 and the internal state of the algorithm. The states reflect the "direction" of
63 the algorithm: is it going left (reducing moderation), right (increasing
66 algorithm would increase in order to reduce calculation overhead. Also, after
[all …]
/kernel/linux/linux-6.6/include/crypto/
Dakcipher.h48 * @reqsize: Request context size required by algorithm implementation
49 * @base: Common crypto API algorithm data structure
58 * struct crypto_istat_akcipher - statistics for akcipher algorithm
78 * struct akcipher_alg - generic public key algorithm
81 * algorithm. In case of error, where the dst_len was insufficient,
85 * public key algorithm, returning verification status. Requires
88 * algorithm. In case of error, where the dst_len was insufficient,
92 * algorithm. In case of error, where the dst_len was insufficient,
95 * @set_pub_key: Function invokes the algorithm specific set public key
98 * @set_priv_key: Function invokes the algorithm specific set private key
[all …]
Dsig.h3 * Public Key Signature Algorithm
16 * @base: Common crypto API algorithm data structure
32 * signing algorithm e.g. "ecdsa"
33 * @type: specifies the type of the algorithm
34 * @mask: specifies the mask for the algorithm
36 * Allocate a handle for public key signature algorithm. The returned struct
77 * Function invokes the specific signing operation for a given algorithm
95 * for a given algorithm.
112 * Function invokes the algorithm specific set key function, which knows
128 * Function invokes the algorithm specific set key function, which knows
/kernel/linux/linux-6.6/arch/x86/crypto/
DKconfig11 Curve25519 algorithm
39 Block cipher: Blowfish cipher algorithm
89 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm
107 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm
122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
137 Length-preserving ciphers: Serpent cipher algorithm
153 Length-preserving ciphers: Serpent cipher algorithm
170 Length-preserving ciphers: Serpent cipher algorithm
183 Length-preserving ciphers: Serpent cipher algorithm
241 Block cipher: Twofish cipher algorithm
[all …]
/kernel/linux/linux-5.10/include/crypto/internal/
Dscompress.h20 * struct scomp_alg - synchronous compression algorithm
22 * @alloc_ctx: Function allocates algorithm specific context
26 * @base: Common crypto API algorithm data structure
97 * crypto_register_scomp() -- Register synchronous compression algorithm
100 * compression algorithm
102 * @alg: algorithm definition
109 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm
112 * compression algorithm
114 * @alg: algorithm definition
Dakcipher.h103 * crypto_register_akcipher() -- Register public key algorithm
105 * Function registers an implementation of a public key verify algorithm
107 * @alg: algorithm definition
114 * crypto_unregister_akcipher() -- Unregister public key algorithm
116 * Function unregisters an implementation of a public key verify algorithm
118 * @alg: algorithm definition
125 * Function registers an implementation of an asymmetric key algorithm
128 * @tmpl: the template from which the algorithm was created
/kernel/linux/linux-5.10/include/crypto/
Dakcipher.h46 * @base: Common crypto API algorithm data structure
53 * struct akcipher_alg - generic public key algorithm
56 * algorithm. In case of error, where the dst_len was insufficient,
60 * public key algorithm, returning verification status. Requires
63 * algorithm. In case of error, where the dst_len was insufficient,
67 * algorithm. In case of error, where the dst_len was insufficient,
70 * @set_pub_key: Function invokes the algorithm specific set public key
73 * @set_priv_key: Function invokes the algorithm specific set private key
89 * @reqsize: Request context size required by algorithm implementation
90 * @base: Common crypto API algorithm data structure
[all …]
Dacompress.h43 * algorithm
45 * @base: Common crypto API algorithm data structure
56 * struct acomp_alg - asynchronous compression algorithm
60 * @dst_free: Frees destination buffer if allocated inside the algorithm
74 * @base: Common crypto API algorithm data structure
96 * compression algorithm e.g. "deflate"
97 * @type: specifies the type of the algorithm
98 * @mask: specifies the mask for the algorithm
100 * Allocate a handle for a compression algorithm. The returned struct
112 * compression algorithm e.g. "deflate"
[all …]
/kernel/linux/linux-5.10/net/netfilter/ipvs/
DKconfig117 The robin-robin scheduling algorithm simply directs network
126 The weighted robin-robin scheduling algorithm directs network
139 The least-connection scheduling algorithm directs network
149 The weighted least-connection scheduling algorithm directs network
159 The weighted failover scheduling algorithm directs network
169 The weighted overflow scheduling algorithm directs network
180 The locality-based least-connection scheduling algorithm is for
182 This algorithm usually directs packet destined for an IP address to
195 algorithm is also for destination IP load balancing. It is
212 The destination hashing scheduling algorithm assigns network
[all …]
/kernel/linux/linux-6.6/net/netfilter/ipvs/
DKconfig118 The robin-robin scheduling algorithm simply directs network
127 The weighted robin-robin scheduling algorithm directs network
140 The least-connection scheduling algorithm directs network
150 The weighted least-connection scheduling algorithm directs network
160 The weighted failover scheduling algorithm directs network
170 The weighted overflow scheduling algorithm directs network
181 The locality-based least-connection scheduling algorithm is for
183 This algorithm usually directs packet destined for an IP address to
196 algorithm is also for destination IP load balancing. It is
213 The destination hashing scheduling algorithm assigns network
[all …]

12345678910>>...127