Searched full:implementations (Results 1 – 25 of 1629) sorted by relevance
12345678910>>...66
| /kernel/linux/linux-5.10/lib/crypto/ |
| D | Kconfig | 21 This symbol can be depended upon by arch implementations of the 23 fallback, e.g., for SIMD implementations. If no arch specific 37 This symbol can be depended upon by arch implementations of the 39 fallback, e.g., for SIMD implementations. If no arch specific 63 This symbol can be depended upon by arch implementations of the 65 fallback, e.g., for SIMD implementations. If no arch specific 99 This symbol can be depended upon by arch implementations of the 101 fallback, e.g., for SIMD implementations. If no arch specific
|
| /kernel/linux/linux-6.6/lib/crypto/ |
| D | Kconfig | 33 This symbol can be depended upon by arch implementations of the 35 fallback, e.g., for SIMD implementations. If no arch specific 50 This symbol can be depended upon by arch implementations of the 52 fallback, e.g., for SIMD implementations. If no arch specific 75 This symbol can be depended upon by arch implementations of the 77 fallback, e.g., for SIMD implementations. If no arch specific 111 This symbol can be depended upon by arch implementations of the 113 fallback, e.g., for SIMD implementations. If no arch specific
|
| /kernel/linux/linux-6.6/fs/crypto/ |
| D | Kconfig | 25 # Also note that this option only pulls in the generic implementations of the 26 # algorithms, not any per-architecture optimized implementations. It is 27 # strongly recommended to enable optimized implementations too. It is safe to 28 # disable these generic implementations if corresponding optimized 29 # implementations will always be available too; for this reason, these are soft 31 # implementations if you're sure they will never be needed, though.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/device-mapper/ |
| D | dm-log.rst | 15 implementations use to perform logging operations (see 17 logging implementations are available and provide different 43 so log implementations can be done there. This is done by forwarding most 53 There are currently two userspace log implementations that leverage this 54 framework - "clustered-disk" and "clustered-core". These implementations 56 can be used in a shared-storage environment when the cluster log implementations
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/device-mapper/ |
| D | dm-log.rst | 15 implementations use to perform logging operations (see 17 logging implementations are available and provide different 43 so log implementations can be done there. This is done by forwarding most 53 There are currently two userspace log implementations that leverage this 54 framework - "clustered-disk" and "clustered-core". These implementations 56 can be used in a shared-storage environment when the cluster log implementations
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/arm/ |
| D | psci.yaml | 41 For implementations complying to PSCI versions prior to 0.2. 45 For implementations complying to PSCI 0.2. 49 For implementations complying to PSCI 0.2. 59 For implementations complying to PSCI 1.0. 63 For implementations complying to PSCI 1.0. 124 helps to implement support for OSI mode and OS implementations may choose
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/mfd/ |
| D | google,cros-ec.yaml | 23 For implementations of the EC connected through I2C. 26 For implementations of the EC connected through SPI. 29 For implementations of the FPMCU connected through SPI. 34 For implementations of the EC connected through RPMSG. 37 For implementations of the EC connected through UART. 57 Some implementations of the EC include a small nvram space used to
|
| /kernel/linux/linux-6.6/Documentation/bpf/ |
| D | bpf_licensing.rst | 26 Implementations of eBPF 35 The reference implementations of the eBPF interpreter and various just-in-time 43 There are also implementations of eBPF runtime (interpreter, JITs, helper 58 Other kernels or user space implementations of eBPF instruction set and runtime
|
| /kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/ |
| D | iwl-drv.h | 36 * This component is also in charge of managing the several implementations of 38 * different implementations will differ in the way they implement mac80211's 62 * specific system flows implementations. For example, the bus specific probe 74 * implementations. For example, the bus specific remove function should first
|
| /kernel/linux/linux-5.10/mm/ |
| D | zpool.c | 7 * This is a common frontend for memory storage pool implementations. 150 * Implementations must guarantee this to be thread-safe. 209 * Implementations must guarantee this to be thread-safe, 234 * Implementations must guarantee this to be thread-safe. 250 * Implementations must guarantee this to be thread-safe. 271 * Implementations must guarantee this to be thread-safe. 290 * Implementations must guarantee this to be thread-safe, 313 * Implementations must guarantee this to be thread-safe.
|
| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | architecture.rst | 23 The kernel crypto API provides implementations of single block ciphers 101 The kernel crypto API may provide multiple implementations of a template 103 the following implementations: AES-NI, assembler implementation, or 109 implementations providing an implementation with that name and selects 243 existing cipher implementations. The first section addresses the most 258 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c, 262 It is possible that some streamlined cipher implementations (like 263 AES-NI) provide implementations merging aspects which in the view of the 374 Keyed message digest implementations again follow the same concept as
|
| D | intro.rst | 27 - data transformation implementations (typically ciphers) that can be 33 implementations (i.e. implementations of ciphers and other
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | architecture.rst | 23 The kernel crypto API provides implementations of single block ciphers 101 The kernel crypto API may provide multiple implementations of a template 103 the following implementations: AES-NI, assembler implementation, or 109 implementations providing an implementation with that name and selects 243 existing cipher implementations. The first section addresses the most 258 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c, 262 It is possible that some streamlined cipher implementations (like 263 AES-NI) provide implementations merging aspects which in the view of the 374 Keyed message digest implementations again follow the same concept as
|
| D | intro.rst | 27 - data transformation implementations (typically ciphers) that can be 33 implementations (i.e. implementations of ciphers and other
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/ibm/emac/ |
| D | emac.h | 28 /* Common registers across all EMAC implementations. */ 42 /* Registers unique to EMAC4 implementations */ 53 /* Registers unique to EMAC4SYNC implementations */ 62 /* Common registers across all EMAC implementations. */ 72 /* Registers unique to EMAC4 implementations */ 76 /* Registers unique to EMAC4SYNC implementations */
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/ibm/emac/ |
| D | emac.h | 28 /* Common registers across all EMAC implementations. */ 42 /* Registers unique to EMAC4 implementations */ 53 /* Registers unique to EMAC4SYNC implementations */ 62 /* Common registers across all EMAC implementations. */ 72 /* Registers unique to EMAC4 implementations */ 76 /* Registers unique to EMAC4SYNC implementations */
|
| /kernel/linux/linux-6.6/mm/ |
| D | zpool.c | 7 * This is a common frontend for memory storage pool implementations. 141 * Implementations must guarantee this to be thread-safe. 192 * Implementations must guarantee this to be thread-safe, 214 * Implementations must guarantee this to be thread-safe. 230 * Implementations must guarantee this to be thread-safe. 251 * Implementations must guarantee this to be thread-safe. 270 * Implementations must guarantee this to be thread-safe,
|
| /kernel/linux/linux-5.10/Documentation/netlabel/ |
| D | draft-ietf-cipso-ipsecurity-01.txt | 117 not appear as the DOI identifier in any CIPSO option. Implementations 150 identifier field in the CIPSO header, implementations should assume that 160 types, implementations will require the DOI identifier as well as the tag 163 interoperability with other networks will not be an issue. Implementations 237 speed many implementations including router implementations. 334 speed many implementations including router implementations. 386 speed many implementations including router implementations. 447 parameters are required for CIPSO implementations: 543 CIPSO implementations that support only one label are not required to 544 support the parameters described above. These limited implementations are
|
| /kernel/linux/linux-6.6/Documentation/netlabel/ |
| D | draft-ietf-cipso-ipsecurity-01.txt | 117 not appear as the DOI identifier in any CIPSO option. Implementations 150 identifier field in the CIPSO header, implementations should assume that 160 types, implementations will require the DOI identifier as well as the tag 163 interoperability with other networks will not be an issue. Implementations 237 speed many implementations including router implementations. 334 speed many implementations including router implementations. 386 speed many implementations including router implementations. 447 parameters are required for CIPSO implementations: 543 CIPSO implementations that support only one label are not required to 544 support the parameters described above. These limited implementations are
|
| /kernel/linux/linux-5.10/Documentation/core-api/ |
| D | genericirq.rst | 67 Analysing a couple of architecture's IRQ subsystem implementations 75 which is normally one of the generic implementations. (This high-level 86 of existing implementations, the __do_IRQ() super-handler is still 177 Default flow implementations 184 default flow implementations. The following helper functions are 219 Default flow handler implementations 349 implementations. 392 To avoid copies of identical implementations of IRQ chips the core
|
| /kernel/linux/linux-6.6/Documentation/core-api/ |
| D | genericirq.rst | 67 Analysing a couple of architecture's IRQ subsystem implementations 75 which is normally one of the generic implementations. (This high-level 86 of existing implementations, the __do_IRQ() super-handler is still 177 Default flow implementations 184 default flow implementations. The following helper functions are 219 Default flow handler implementations 349 implementations. 392 To avoid copies of identical implementations of IRQ chips the core
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/mfd/ |
| D | google,cros-ec.yaml | 24 For implementations of the EC is connected through I2C. 27 For implementations of the EC is connected through SPI. 30 For implementations of the EC is connected through RPMSG. 57 Some implementations of the EC include a small nvram space used to
|
| /kernel/linux/linux-6.6/Documentation/nvme/ |
| D | feature-and-quirk-policy.rst | 62 Sometimes implementations of open standards fail to correctly implement parts 66 Typically these implementations are not or only superficially tested with Linux 69 The Linux NVMe maintainers decide ad hoc whether to quirk implementations
|
| /kernel/linux/linux-5.10/drivers/crypto/caam/ |
| D | Kconfig | 97 bool "Register algorithm implementations with the Crypto API" 128 bool "Register hash algorithm implementations with Crypto API" 137 bool "Register public key cryptography implementations with Crypto API"
|
| /kernel/linux/linux-6.6/drivers/crypto/caam/ |
| D | Kconfig | 97 bool "Register algorithm implementations with the Crypto API" 128 bool "Register hash algorithm implementations with Crypto API" 137 bool "Register public key cryptography implementations with Crypto API"
|
12345678910>>...66