Home
last modified time | relevance | path

Searched full:transformation (Results 1 – 25 of 223) sorted by relevance

123456789

/kernel/linux/linux-6.6/Documentation/crypto/
Dintro.rst8 as other data transformation mechanisms and methods to invoke these.
27 - data transformation implementations (typically ciphers) that can be
32 however, does not discuss all API calls available to data transformation
37 Note: The terms "transformation" and cipher algorithm are used
43 The transformation implementation is an actual code or interface to
44 hardware which implements a certain transformation with precisely
47 The transformation object (TFM) is an instance of a transformation
48 implementation. There can be multiple transformation objects associated
49 with a single transformation implementation. Each of those
50 transformation objects is held by a crypto API consumer or another
[all …]
Ddevel-algos.rst4 Registering And Unregistering Transformation
8 API. One is used to register a generic cryptographic transformation,
19 former function registers a single transformation, while the latter
20 works on an array of transformation descriptions. The latter is useful
52 This section describes the simplest of all transformation
62 filled in with proper callbacks to implement this transformation.
103 This section describes the multi-block cipher transformation
105 which operate on scatterlists of data supplied to the transformation
141 Registering And Unregistering The Transformation
144 There are multiple ways to register a HASH transformation, depending on
[all …]
/kernel/linux/linux-5.10/Documentation/crypto/
Dintro.rst8 as other data transformation mechanisms and methods to invoke these.
27 - data transformation implementations (typically ciphers) that can be
32 however, does not discuss all API calls available to data transformation
37 Note: The terms "transformation" and cipher algorithm are used
43 The transformation implementation is an actual code or interface to
44 hardware which implements a certain transformation with precisely
47 The transformation object (TFM) is an instance of a transformation
48 implementation. There can be multiple transformation objects associated
49 with a single transformation implementation. Each of those
50 transformation objects is held by a crypto API consumer or another
[all …]
Ddevel-algos.rst4 Registering And Unregistering Transformation
8 API. One is used to register a generic cryptographic transformation,
19 former function registers a single transformation, while the latter
20 works on an array of transformation descriptions. The latter is useful
52 This section describes the simplest of all transformation
62 filled in with proper callbacks to implement this transformation.
103 This section describes the multi-block cipher transformation
105 which operate on scatterlists of data supplied to the transformation
141 Registering And Unregistering The Transformation
144 There are multiple ways to register a HASH transformation, depending on
[all …]
/kernel/linux/linux-6.6/include/linux/
Dcrypto.h190 * @cia_min_keysize: Minimum key size supported by the transformation. This is
191 * the smallest key length supported by this transformation
196 * @cia_max_keysize: Maximum key size supported by the transformation. This is
197 * the largest key length supported by this transformation
202 * @cia_setkey: Set key for the transformation. This function is used to either
204 * transformation context for programming it later. Note that this
205 * function does modify the transformation context. This function
207 * transformation object, so one must make sure the key is properly
226 * transformation context, the key might need to be re-programmed
228 * modify the transformation context, as this function may be
[all …]
/kernel/linux/linux-6.6/net/xfrm/
DKconfig23 tristate "Transformation user configuration interface"
26 Support for Transformation(XFRM) user configuration interface
37 Transformation(XFRM) user configuration interface like IPsec
43 tristate "Transformation virtual interface"
51 bool "Transformation sub policy support"
61 bool "Transformation migrate database"
72 bool "Transformation statistics"
76 statistics about transformation error (or almost error) factor
/kernel/linux/linux-5.10/net/xfrm/
DKconfig23 tristate "Transformation user configuration interface"
26 Support for Transformation(XFRM) user configuration interface
37 Transformation(XFRM) user configuration interface like IPsec
43 tristate "Transformation virtual interface"
51 bool "Transformation sub policy support"
61 bool "Transformation migrate database"
72 bool "Transformation statistics"
76 statistics about transformation error (or almost error) factor
/kernel/linux/linux-5.10/include/linux/
Dcrypto.h197 * @cia_min_keysize: Minimum key size supported by the transformation. This is
198 * the smallest key length supported by this transformation
203 * @cia_max_keysize: Maximum key size supported by the transformation. This is
204 * the largest key length supported by this transformation
209 * @cia_setkey: Set key for the transformation. This function is used to either
211 * transformation context for programming it later. Note that this
212 * function does modify the transformation context. This function
214 * transformation object, so one must make sure the key is properly
233 * transformation context, the key might need to be re-programmed
235 * modify the transformation context, as this function may be
[all …]
/kernel/linux/linux-6.6/Documentation/networking/
Dxfrm_proc.rst10 Transformation Statistics
14 dropped by the transformation code and why. These counters are defined
36 Transformation protocol specific error
40 Transformation mode specific error
91 Transformation protocol specific error
94 Transformation mode specific error
/kernel/linux/linux-5.10/Documentation/networking/
Dxfrm_proc.rst10 Transformation Statistics
14 dropped by the transformation code and why. These counters are defined
36 Transformation protocol specific error
40 Transformation mode specific error
91 Transformation protocol specific error
94 Transformation mode specific error
/kernel/linux/linux-5.10/include/crypto/
Dhash.h27 * @digestsize: Size of the result of the transformation. A buffer of this size
32 * @statesize: Size of the block for partial state of the transformation. A
34 * will save the partial state of the transformation into it. On the
64 * @init: **[mandatory]** Initialize the transformation context. Intended only to initialize the
65 * state of the HASH transformation at the beginning. This shall fill in
67 * transformation. No data processing happens at this point. Driver code
69 * @update: **[mandatory]** Push a chunk of data into the driver for transformation. This
72 * function must not finalize the HASH transformation by calculating the
74 * transformation. This function shall not modify the transformation
76 * transformation object. Data processing can happen synchronously
[all …]
Dskcipher.h49 * @min_keysize: Minimum key size supported by the transformation. This is the
50 * smallest key length supported by this transformation algorithm.
54 * @max_keysize: Maximum key size supported by the transformation. This is the
55 * largest key length supported by this transformation algorithm.
59 * @setkey: Set key for the transformation. This function is used to either
61 * transformation context for programming it later. Note that this
62 * function does modify the transformation context. This function can
63 * be called multiple times during the existence of the transformation
76 * key was stored in transformation context, the key might need to be
78 * shall not modify the transformation context, as this function may
[all …]
Daead.h104 * transformation. A transformation may support smaller tag sizes.
109 * @setauthsize: Set authentication size for the AEAD transformation. This
111 * authentication tag to be either generated by the transformation
121 * @init: Initialize the cryptographic transformation object. This function
122 * is used to initialize the cryptographic transformation object.
124 * after the transformation context was allocated. In case the
127 * requirement of the transformation and put any software fallbacks
129 * @exit: Deinitialize the cryptographic transformation object. This is a
Dacompress.h61 * @init: Initialize the cryptographic transformation object.
63 * transformation object. This function is called only once at
64 * the instantiation time, right after the transformation context
68 * transformation and put any software fallbacks in place.
69 * @exit: Deinitialize the cryptographic transformation object. This is a
Dakcipher.h77 * @init: Initialize the cryptographic transformation object.
79 * transformation object. This function is called only once at
80 * the instantiation time, right after the transformation context
84 * transformation and put any software fallbacks in place.
85 * @exit: Deinitialize the cryptographic transformation object. This is a
264 * Function assumes that the key is already set in the transformation. If this
/kernel/linux/linux-6.6/include/crypto/
Dhash.h47 * @digestsize: Size of the result of the transformation. A buffer of this size
52 * @statesize: Size of the block for partial state of the transformation. A
54 * will save the partial state of the transformation into it. On the
87 * @init: **[mandatory]** Initialize the transformation context. Intended only to initialize the
88 * state of the HASH transformation at the beginning. This shall fill in
90 * transformation. No data processing happens at this point. Driver code
92 * @update: **[mandatory]** Push a chunk of data into the driver for transformation. This
95 * function must not finalize the HASH transformation by calculating the
97 * transformation. This function shall not modify the transformation
99 * transformation object. Data processing can happen synchronously
[all …]
Dskcipher.h70 * @min_keysize: Minimum key size supported by the transformation. This is the
71 * smallest key length supported by this transformation algorithm.
75 * @max_keysize: Maximum key size supported by the transformation. This is the
76 * largest key length supported by this transformation algorithm.
80 * @setkey: Set key for the transformation. This function is used to either
82 * transformation context for programming it later. Note that this
83 * function does modify the transformation context. This function can
84 * be called multiple times during the existence of the transformation
97 * key was stored in transformation context, the key might need to be
99 * shall not modify the transformation context, as this function may
[all …]
Daead.h123 * transformation. A transformation may support smaller tag sizes.
128 * @setauthsize: Set authentication size for the AEAD transformation. This
130 * authentication tag to be either generated by the transformation
141 * @init: Initialize the cryptographic transformation object. This function
142 * is used to initialize the cryptographic transformation object.
144 * after the transformation context was allocated. In case the
147 * requirement of the transformation and put any software fallbacks
149 * @exit: Deinitialize the cryptographic transformation object. This is a
Dakcipher.h102 * @init: Initialize the cryptographic transformation object.
104 * transformation object. This function is called only once at
105 * the instantiation time, right after the transformation context
109 * transformation and put any software fallbacks in place.
110 * @exit: Deinitialize the cryptographic transformation object. This is a
292 * Function assumes that the key is already set in the transformation. If this
/kernel/linux/linux-5.10/include/sound/sof/
Dchannel_map.h16 * \brief Channel map, specifies transformation of one-to-many or many-to-one.
26 * Ext ID is the identifier of external part of the transformation. Depending
49 * More than one transformation per a single channel is allowed (in case
51 * A channel may be skipped in the transformation list, then it is filled
52 * with 0's by the transformation function.
/kernel/linux/linux-6.6/include/sound/sof/
Dchannel_map.h16 * \brief Channel map, specifies transformation of one-to-many or many-to-one.
26 * Ext ID is the identifier of external part of the transformation. Depending
49 * More than one transformation per a single channel is allowed (in case
51 * A channel may be skipped in the transformation list, then it is filled
52 * with 0's by the transformation function.
/kernel/linux/linux-6.6/include/crypto/internal/
Dacompress.h21 * @init: Initialize the cryptographic transformation object.
23 * transformation object. This function is called only once at
24 * the instantiation time, right after the transformation context
28 * transformation and put any software fallbacks in place.
29 * @exit: Deinitialize the cryptographic transformation object. This is a
/kernel/linux/linux-6.6/net/ipv6/
DKconfig52 tristate "IPv6: AH transformation"
67 tristate "IPv6: ESP transformation"
82 tristate "IPv6: ESP transformation offload"
87 Support for ESP transformation offload. This makes sense
107 tristate "IPv6: IPComp transformation"
/kernel/linux/linux-5.10/net/ipv6/
DKconfig51 tristate "IPv6: AH transformation"
66 tristate "IPv6: ESP transformation"
81 tristate "IPv6: ESP transformation offload"
86 Support for ESP transformation offload. This makes sense
106 tristate "IPv6: IPComp transformation"
/kernel/linux/linux-6.6/Documentation/userspace-api/media/drivers/
Ddw100.rst7 programmable geometrical transformation on the input image to correct distortion
10 The transformation function is exposed by the hardware as a grid map with 16x16

123456789