Searched full:transformation (Results 1 – 25 of 223) sorted by relevance
123456789
| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | intro.rst | 8 as other data transformation mechanisms and methods to invoke these. 27 - data transformation implementations (typically ciphers) that can be 32 however, does not discuss all API calls available to data transformation 37 Note: The terms "transformation" and cipher algorithm are used 43 The transformation implementation is an actual code or interface to 44 hardware which implements a certain transformation with precisely 47 The transformation object (TFM) is an instance of a transformation 48 implementation. There can be multiple transformation objects associated 49 with a single transformation implementation. Each of those 50 transformation objects is held by a crypto API consumer or another [all …]
|
| D | devel-algos.rst | 4 Registering And Unregistering Transformation 8 API. One is used to register a generic cryptographic transformation, 19 former function registers a single transformation, while the latter 20 works on an array of transformation descriptions. The latter is useful 52 This section describes the simplest of all transformation 62 filled in with proper callbacks to implement this transformation. 103 This section describes the multi-block cipher transformation 105 which operate on scatterlists of data supplied to the transformation 141 Registering And Unregistering The Transformation 144 There are multiple ways to register a HASH transformation, depending on [all …]
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | intro.rst | 8 as other data transformation mechanisms and methods to invoke these. 27 - data transformation implementations (typically ciphers) that can be 32 however, does not discuss all API calls available to data transformation 37 Note: The terms "transformation" and cipher algorithm are used 43 The transformation implementation is an actual code or interface to 44 hardware which implements a certain transformation with precisely 47 The transformation object (TFM) is an instance of a transformation 48 implementation. There can be multiple transformation objects associated 49 with a single transformation implementation. Each of those 50 transformation objects is held by a crypto API consumer or another [all …]
|
| D | devel-algos.rst | 4 Registering And Unregistering Transformation 8 API. One is used to register a generic cryptographic transformation, 19 former function registers a single transformation, while the latter 20 works on an array of transformation descriptions. The latter is useful 52 This section describes the simplest of all transformation 62 filled in with proper callbacks to implement this transformation. 103 This section describes the multi-block cipher transformation 105 which operate on scatterlists of data supplied to the transformation 141 Registering And Unregistering The Transformation 144 There are multiple ways to register a HASH transformation, depending on [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | crypto.h | 190 * @cia_min_keysize: Minimum key size supported by the transformation. This is 191 * the smallest key length supported by this transformation 196 * @cia_max_keysize: Maximum key size supported by the transformation. This is 197 * the largest key length supported by this transformation 202 * @cia_setkey: Set key for the transformation. This function is used to either 204 * transformation context for programming it later. Note that this 205 * function does modify the transformation context. This function 207 * transformation object, so one must make sure the key is properly 226 * transformation context, the key might need to be re-programmed 228 * modify the transformation context, as this function may be [all …]
|
| /kernel/linux/linux-6.6/net/xfrm/ |
| D | Kconfig | 23 tristate "Transformation user configuration interface" 26 Support for Transformation(XFRM) user configuration interface 37 Transformation(XFRM) user configuration interface like IPsec 43 tristate "Transformation virtual interface" 51 bool "Transformation sub policy support" 61 bool "Transformation migrate database" 72 bool "Transformation statistics" 76 statistics about transformation error (or almost error) factor
|
| /kernel/linux/linux-5.10/net/xfrm/ |
| D | Kconfig | 23 tristate "Transformation user configuration interface" 26 Support for Transformation(XFRM) user configuration interface 37 Transformation(XFRM) user configuration interface like IPsec 43 tristate "Transformation virtual interface" 51 bool "Transformation sub policy support" 61 bool "Transformation migrate database" 72 bool "Transformation statistics" 76 statistics about transformation error (or almost error) factor
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | crypto.h | 197 * @cia_min_keysize: Minimum key size supported by the transformation. This is 198 * the smallest key length supported by this transformation 203 * @cia_max_keysize: Maximum key size supported by the transformation. This is 204 * the largest key length supported by this transformation 209 * @cia_setkey: Set key for the transformation. This function is used to either 211 * transformation context for programming it later. Note that this 212 * function does modify the transformation context. This function 214 * transformation object, so one must make sure the key is properly 233 * transformation context, the key might need to be re-programmed 235 * modify the transformation context, as this function may be [all …]
|
| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | xfrm_proc.rst | 10 Transformation Statistics 14 dropped by the transformation code and why. These counters are defined 36 Transformation protocol specific error 40 Transformation mode specific error 91 Transformation protocol specific error 94 Transformation mode specific error
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | xfrm_proc.rst | 10 Transformation Statistics 14 dropped by the transformation code and why. These counters are defined 36 Transformation protocol specific error 40 Transformation mode specific error 91 Transformation protocol specific error 94 Transformation mode specific error
|
| /kernel/linux/linux-5.10/include/crypto/ |
| D | hash.h | 27 * @digestsize: Size of the result of the transformation. A buffer of this size 32 * @statesize: Size of the block for partial state of the transformation. A 34 * will save the partial state of the transformation into it. On the 64 * @init: **[mandatory]** Initialize the transformation context. Intended only to initialize the 65 * state of the HASH transformation at the beginning. This shall fill in 67 * transformation. No data processing happens at this point. Driver code 69 * @update: **[mandatory]** Push a chunk of data into the driver for transformation. This 72 * function must not finalize the HASH transformation by calculating the 74 * transformation. This function shall not modify the transformation 76 * transformation object. Data processing can happen synchronously [all …]
|
| D | skcipher.h | 49 * @min_keysize: Minimum key size supported by the transformation. This is the 50 * smallest key length supported by this transformation algorithm. 54 * @max_keysize: Maximum key size supported by the transformation. This is the 55 * largest key length supported by this transformation algorithm. 59 * @setkey: Set key for the transformation. This function is used to either 61 * transformation context for programming it later. Note that this 62 * function does modify the transformation context. This function can 63 * be called multiple times during the existence of the transformation 76 * key was stored in transformation context, the key might need to be 78 * shall not modify the transformation context, as this function may [all …]
|
| D | aead.h | 104 * transformation. A transformation may support smaller tag sizes. 109 * @setauthsize: Set authentication size for the AEAD transformation. This 111 * authentication tag to be either generated by the transformation 121 * @init: Initialize the cryptographic transformation object. This function 122 * is used to initialize the cryptographic transformation object. 124 * after the transformation context was allocated. In case the 127 * requirement of the transformation and put any software fallbacks 129 * @exit: Deinitialize the cryptographic transformation object. This is a
|
| D | acompress.h | 61 * @init: Initialize the cryptographic transformation object. 63 * transformation object. This function is called only once at 64 * the instantiation time, right after the transformation context 68 * transformation and put any software fallbacks in place. 69 * @exit: Deinitialize the cryptographic transformation object. This is a
|
| D | akcipher.h | 77 * @init: Initialize the cryptographic transformation object. 79 * transformation object. This function is called only once at 80 * the instantiation time, right after the transformation context 84 * transformation and put any software fallbacks in place. 85 * @exit: Deinitialize the cryptographic transformation object. This is a 264 * Function assumes that the key is already set in the transformation. If this
|
| /kernel/linux/linux-6.6/include/crypto/ |
| D | hash.h | 47 * @digestsize: Size of the result of the transformation. A buffer of this size 52 * @statesize: Size of the block for partial state of the transformation. A 54 * will save the partial state of the transformation into it. On the 87 * @init: **[mandatory]** Initialize the transformation context. Intended only to initialize the 88 * state of the HASH transformation at the beginning. This shall fill in 90 * transformation. No data processing happens at this point. Driver code 92 * @update: **[mandatory]** Push a chunk of data into the driver for transformation. This 95 * function must not finalize the HASH transformation by calculating the 97 * transformation. This function shall not modify the transformation 99 * transformation object. Data processing can happen synchronously [all …]
|
| D | skcipher.h | 70 * @min_keysize: Minimum key size supported by the transformation. This is the 71 * smallest key length supported by this transformation algorithm. 75 * @max_keysize: Maximum key size supported by the transformation. This is the 76 * largest key length supported by this transformation algorithm. 80 * @setkey: Set key for the transformation. This function is used to either 82 * transformation context for programming it later. Note that this 83 * function does modify the transformation context. This function can 84 * be called multiple times during the existence of the transformation 97 * key was stored in transformation context, the key might need to be 99 * shall not modify the transformation context, as this function may [all …]
|
| D | aead.h | 123 * transformation. A transformation may support smaller tag sizes. 128 * @setauthsize: Set authentication size for the AEAD transformation. This 130 * authentication tag to be either generated by the transformation 141 * @init: Initialize the cryptographic transformation object. This function 142 * is used to initialize the cryptographic transformation object. 144 * after the transformation context was allocated. In case the 147 * requirement of the transformation and put any software fallbacks 149 * @exit: Deinitialize the cryptographic transformation object. This is a
|
| D | akcipher.h | 102 * @init: Initialize the cryptographic transformation object. 104 * transformation object. This function is called only once at 105 * the instantiation time, right after the transformation context 109 * transformation and put any software fallbacks in place. 110 * @exit: Deinitialize the cryptographic transformation object. This is a 292 * Function assumes that the key is already set in the transformation. If this
|
| /kernel/linux/linux-5.10/include/sound/sof/ |
| D | channel_map.h | 16 * \brief Channel map, specifies transformation of one-to-many or many-to-one. 26 * Ext ID is the identifier of external part of the transformation. Depending 49 * More than one transformation per a single channel is allowed (in case 51 * A channel may be skipped in the transformation list, then it is filled 52 * with 0's by the transformation function.
|
| /kernel/linux/linux-6.6/include/sound/sof/ |
| D | channel_map.h | 16 * \brief Channel map, specifies transformation of one-to-many or many-to-one. 26 * Ext ID is the identifier of external part of the transformation. Depending 49 * More than one transformation per a single channel is allowed (in case 51 * A channel may be skipped in the transformation list, then it is filled 52 * with 0's by the transformation function.
|
| /kernel/linux/linux-6.6/include/crypto/internal/ |
| D | acompress.h | 21 * @init: Initialize the cryptographic transformation object. 23 * transformation object. This function is called only once at 24 * the instantiation time, right after the transformation context 28 * transformation and put any software fallbacks in place. 29 * @exit: Deinitialize the cryptographic transformation object. This is a
|
| /kernel/linux/linux-6.6/net/ipv6/ |
| D | Kconfig | 52 tristate "IPv6: AH transformation" 67 tristate "IPv6: ESP transformation" 82 tristate "IPv6: ESP transformation offload" 87 Support for ESP transformation offload. This makes sense 107 tristate "IPv6: IPComp transformation"
|
| /kernel/linux/linux-5.10/net/ipv6/ |
| D | Kconfig | 51 tristate "IPv6: AH transformation" 66 tristate "IPv6: ESP transformation" 81 tristate "IPv6: ESP transformation offload" 86 Support for ESP transformation offload. This makes sense 106 tristate "IPv6: IPComp transformation"
|
| /kernel/linux/linux-6.6/Documentation/userspace-api/media/drivers/ |
| D | dw100.rst | 7 programmable geometrical transformation on the input image to correct distortion 10 The transformation function is exposed by the hardware as a grid map with 16x16
|
123456789