Lines Matching full:algorithm
117 tristate "Cryptographic algorithm manager"
133 tristate "Userspace cryptographic algorithm configuration"
145 algorithm registration.
179 This converts an arbitrary crypto algorithm into a parallel
180 algorithm that executes in kernel threads.
189 converts an arbitrary synchronous software crypto algorithm
190 into an asynchronous algorithm that executes in a kernel thread.
225 tristate "RSA algorithm"
231 Generic implementation of the RSA public key algorithm.
234 tristate "Diffie-Hellman algorithm"
238 Generic implementation of the Diffie-Hellman algorithm.
245 tristate "ECDH algorithm"
249 Generic implementation of the ECDH algorithm
252 tristate "ECDSA (NIST P192, P256 etc.) algorithm"
257 Elliptic Curve Digital Signature Algorithm (NIST P192, P256 etc.)
258 is A NIST cryptographic standard algorithm. Only signature verification
262 tristate "EC-RDSA (GOST 34.10) algorithm"
269 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
275 tristate "SM2 algorithm"
282 Generic implementation of the SM2 public key algorithm. It was
292 tristate "Curve25519 algorithm"
338 tristate "AEGIS-128 AEAD algorithm"
342 Support for the AEGIS-128 dedicated AEAD algorithm.
350 tristate "AEGIS-128 AEAD algorithm (x86_64 AESNI+SSE2 implementation)"
355 AESNI+SSE2 implementation of the AEGIS-128 dedicated AEAD algorithm.
366 xoring it with a salt. This algorithm is mainly useful for CTR
377 algorithm for CBC.
387 This block cipher algorithm is required for IPSec.
395 This block cipher algorithm is required for TPM2 Cryptography.
403 This block cipher algorithm is required for IPSec.
426 This is the simplest block cipher algorithm. It simply encrypts
459 This block cipher algorithm is required for RxRPC.
578 XCBC: Keyed-Hashing with encryption algorithm
588 VMAC is a message authentication algorithm designed for
597 tristate "CRC32c CRC algorithm"
601 Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
618 tristate "CRC32c CRC algorithm (powerpc64)"
623 CRC32c algorithm implemented using vector polynomial multiply-sum
629 tristate "CRC32c CRC algorithm (SPARC64)"
634 CRC32c CRC algorithm implemented using sparc64 crypto instructions,
638 tristate "CRC32 CRC algorithm"
642 CRC-32-IEEE 802.3 cyclic redundancy-check algorithm.
659 tristate "CRC32c and CRC32 CRC algorithm (MIPS)"
667 tristate "CRC32c and CRC32 CRC algorithm (LoongArch)"
676 tristate "xxHash hash algorithm"
680 xxHash non-cryptographic hash algorithm. Extremely fast, working at
684 tristate "BLAKE2b digest algorithm"
701 tristate "BLAKE2s digest algorithm"
719 tristate "BLAKE2s digest algorithm (x86 accelerated version)"
725 tristate "CRCT10DIF algorithm"
748 CRC10T10DIF algorithm implemented using vector polynomial
769 tristate "Poly1305 authenticator algorithm"
773 Poly1305 authenticator algorithm, RFC7539.
775 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
780 tristate "Poly1305 authenticator algorithm (x86_64/SSE2/AVX2)"
785 Poly1305 authenticator algorithm, RFC7539.
787 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
793 tristate "Poly1305 authenticator algorithm (MIPS optimized)"
798 tristate "MD4 digest algorithm"
801 MD4 message digest algorithm (RFC1320).
804 tristate "MD5 digest algorithm"
807 MD5 message digest algorithm (RFC1321).
810 tristate "MD5 digest algorithm (OCTEON)"
815 MD5 message digest algorithm (RFC1321) implemented
819 tristate "MD5 digest algorithm (PPC)"
823 MD5 message digest algorithm (RFC1321) implemented
827 tristate "MD5 digest algorithm (SPARC64)"
832 MD5 message digest algorithm (RFC1321) implemented
836 tristate "Michael MIC keyed digest algorithm"
840 (IEEE 802.11i). This algorithm is required for TKIP, but it
842 of the algorithm.
845 tristate "RIPEMD-128 digest algorithm"
858 tristate "RIPEMD-160 digest algorithm"
875 tristate "RIPEMD-256 digest algorithm"
887 tristate "RIPEMD-320 digest algorithm"
899 tristate "SHA1 digest algorithm"
905 tristate "SHA1 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
916 tristate "SHA256 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
928 tristate "SHA512 digest algorithm (SSSE3/AVX/AVX2)"
939 tristate "SHA1 digest algorithm (OCTEON)"
948 tristate "SHA1 digest algorithm (SPARC64)"
957 tristate "SHA1 digest algorithm (powerpc)"
964 tristate "SHA1 digest algorithm (PPC SPE)"
971 tristate "SHA224 and SHA256 digest algorithm"
984 tristate "SHA224 and SHA256 digest algorithm (PPC SPE)"
993 tristate "SHA224 and SHA256 digest algorithm (OCTEON)"
1002 tristate "SHA224 and SHA256 digest algorithm (SPARC64)"
1032 tristate "SHA384 and SHA512 digest algorithm (SPARC64)"
1041 tristate "SHA3 digest algorithm"
1051 tristate "SM3 digest algorithm"
1077 Tiger hash algorithm 192, 160 and 128-bit hashes
1090 Whirlpool hash algorithm 512, 384 and 256-bit hashes
1114 algorithm.
1158 Use Intel AES-NI instructions for AES algorithm.
1161 algorithm.
1176 In addition to AES cipher algorithm support, the acceleration
1186 Use SPARC64 crypto opcodes for AES algorithm.
1189 algorithm.
1204 In addition to AES cipher algorithm support, the acceleration
1223 tristate "Anubis cipher algorithm"
1227 Anubis cipher algorithm.
1238 tristate "ARC4 cipher algorithm"
1243 ARC4 cipher algorithm.
1246 bits in length. This algorithm is required for driver-based
1248 weakness of the algorithm.
1251 tristate "Blowfish cipher algorithm"
1255 Blowfish cipher algorithm, by Bruce Schneier.
1267 Common parts of the Blowfish cipher algorithm shared by the
1274 tristate "Blowfish cipher algorithm (x86_64)"
1279 Blowfish cipher algorithm (x86_64), by Bruce Schneier.
1304 tristate "Camellia cipher algorithm (x86_64)"
1310 Camellia cipher algorithm module (x86_64).
1321 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
1330 Camellia cipher algorithm module (x86_64/AES-NI/AVX).
1341 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
1346 Camellia cipher algorithm module (x86_64/AES-NI/AVX2).
1357 tristate "Camellia cipher algorithm (SPARC64)"
1363 Camellia cipher algorithm module (SPARC64).
1380 tristate "CAST5 (CAST-128) cipher algorithm"
1384 The CAST5 encryption algorithm (synonymous with CAST-128) is
1388 tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
1395 The CAST5 encryption algorithm (synonymous with CAST-128) is
1398 This module provides the Cast5 cipher algorithm that processes
1402 tristate "CAST6 (CAST-256) cipher algorithm"
1406 The CAST6 encryption algorithm (synonymous with CAST-256) is
1410 tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
1419 The CAST6 encryption algorithm (synonymous with CAST-256) is
1422 This module provides the Cast6 cipher algorithm that processes
1430 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1439 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3),
1443 tristate "Triple DES EDE cipher algorithm (x86-64)"
1448 Triple DES EDE (FIPS 46-3) algorithm.
1451 algorithm that is optimized for x86-64 processors. Two versions of
1452 algorithm are provided; regular processing one input block and
1456 tristate "FCrypt cipher algorithm"
1460 FCrypt algorithm used by RxRPC.
1463 tristate "Khazad cipher algorithm"
1467 Khazad cipher algorithm.
1470 an algorithm optimized for 64-bit processors with good performance
1477 tristate "Salsa20 stream cipher algorithm"
1480 Salsa20 stream cipher algorithm.
1485 The Salsa20 stream cipher algorithm is designed by Daniel J.
1527 tristate "SEED cipher algorithm"
1531 SEED cipher algorithm (RFC4269).
1535 national standard encryption algorithm of the Republic of Korea.
1542 tristate "Serpent cipher algorithm"
1545 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1548 of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
1555 tristate "Serpent cipher algorithm (x86_64/SSE2)"
1562 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1567 This module provides Serpent cipher algorithm that processes eight
1574 tristate "Serpent cipher algorithm (i586/SSE2)"
1581 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1586 This module provides Serpent cipher algorithm that processes four
1593 tristate "Serpent cipher algorithm (x86_64/AVX)"
1601 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1606 This module provides the Serpent cipher algorithm that processes
1613 tristate "Serpent cipher algorithm (x86_64/AVX2)"
1617 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
1622 This module provides Serpent cipher algorithm that processes 16
1629 tristate "SM4 cipher algorithm"
1658 TEA cipher algorithm.
1660 Tiny Encryption Algorithm is a simple cipher that uses
1664 Xtendend Tiny Encryption Algorithm is a modification to
1665 the TEA algorithm to address a potential key weakness
1666 in the TEA algorithm.
1668 Xtendend Encryption Tiny Algorithm is a mis-implementation
1669 of the XTEA algorithm for compatibility purposes.
1672 tristate "Twofish cipher algorithm"
1676 Twofish cipher algorithm.
1689 Common parts of the Twofish cipher algorithm shared by the
1698 Twofish cipher algorithm.
1709 tristate "Twofish cipher algorithm (x86_64)"
1714 Twofish cipher algorithm (x86_64).
1725 tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
1732 Twofish cipher algorithm (x86_64, 3-way parallel).
1739 This module provides Twofish cipher algorithm that processes three
1746 tristate "Twofish cipher algorithm (x86_64/AVX)"
1755 Twofish cipher algorithm (x86_64/AVX).
1762 This module provides the Twofish cipher algorithm that processes
1771 tristate "Deflate compression algorithm"
1777 This is the Deflate algorithm (RFC1951), specified for use in
1783 tristate "LZO compression algorithm"
1789 This is the LZO algorithm.
1792 tristate "842 compression algorithm"
1798 This is the 842 algorithm.
1801 tristate "LZ4 compression algorithm"
1807 This is the LZ4 algorithm.
1810 tristate "LZ4HC compression algorithm"
1816 This is the LZ4 high compression mode algorithm.
1819 tristate "Zstd compression algorithm"
1825 This is the zstd algorithm.
1835 for cryptographic modules. Uses the Algorithm specified in