| /kernel/linux/linux-5.10/crypto/ |
| D | Kconfig | 117 tristate "Cryptographic algorithm manager" 133 tristate "Userspace cryptographic algorithm configuration" 145 algorithm registration. 179 This converts an arbitrary crypto algorithm into a parallel 180 algorithm that executes in kernel threads. 189 converts an arbitrary synchronous software crypto algorithm 190 into an asynchronous algorithm that executes in a kernel thread. 225 tristate "RSA algorithm" 231 Generic implementation of the RSA public key algorithm. 234 tristate "Diffie-Hellman algorithm" [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/crypto/ |
| D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 65 tristate "CRCT10DIF digest algorithm using PMULL instructions" 122 tristate "AES in ECB/CBC/CTR/XTS modes using bit-sliced NEON algorithm"
|
| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | api-intro.rst | 35 [algorithm api] (for registering algorithms) 37 The idea is to make the user interface and algorithm registration API 103 When submitting a new algorithm for inclusion, a mandatory requirement 204 SHA1 algorithm contributors: 207 DES algorithm contributors: 212 Blowfish algorithm contributors: 216 Twofish algorithm contributors: 220 SHA256/384/512 algorithm contributors: 225 AES algorithm contributors: 233 CAST5 algorithm contributors: [all …]
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | api-intro.rst | 35 [algorithm api] (for registering algorithms) 37 The idea is to make the user interface and algorithm registration API 103 When submitting a new algorithm for inclusion, a mandatory requirement 204 SHA1 algorithm contributors: 207 DES algorithm contributors: 212 Blowfish algorithm contributors: 216 Twofish algorithm contributors: 220 SHA256/384/512 algorithm contributors: 225 AES algorithm contributors: 233 CAST5 algorithm contributors: [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | Kconfig | 144 tristate "Cryptographic algorithm manager" 162 tristate "Userspace cryptographic algorithm configuration" 174 algorithm registration. 205 This converts an arbitrary crypto algorithm into a parallel 206 algorithm that executes in kernel threads. 215 converts an arbitrary synchronous software crypto algorithm 216 into an asynchronous algorithm that executes in a kernel thread. 255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) 262 DH (Diffie-Hellman) key exchange algorithm 286 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm [all …]
|
| /kernel/linux/linux-6.6/arch/arm64/boot/dts/qcom/ |
| D | sa8540p-ride.dts | 201 snps,dcb-algorithm; 208 snps,dcb-algorithm; 214 snps,avb-algorithm; 220 snps,avb-algorithm; 231 snps,dcb-algorithm; 235 snps,dcb-algorithm; 239 snps,avb-algorithm; 247 snps,avb-algorithm; 278 snps,dcb-algorithm; 285 snps,dcb-algorithm; [all …]
|
| D | sa8775p-ride.dtsi | 286 snps,dcb-algorithm; 293 snps,dcb-algorithm; 299 snps,avb-algorithm; 305 snps,avb-algorithm; 316 snps,dcb-algorithm; 320 snps,dcb-algorithm; 324 snps,avb-algorithm; 332 snps,avb-algorithm; 355 snps,dcb-algorithm; 362 snps,dcb-algorithm; [all …]
|
| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | net_dim.rst | 21 processing. The mechanism includes an algorithm which decides if and how to 24 iteration of the algorithm, it analyses a given sample of the data, compares it 30 the algorithm might decide not to change anything. The configuration fields are 32 number of wanted packets per event. The Net DIM algorithm ascribes importance to 39 Each iteration of the Net DIM algorithm follows these steps: 54 compared. Here the algorithm tries to optimize for lower interrupt rate so an 62 and the internal state of the algorithm. The states reflect the "direction" of 63 the algorithm: is it going left (reducing moderation), right (increasing 66 algorithm would increase in order to reduce calculation overhead. Also, after 67 "parking" on one of the most left or most right decisions, the algorithm may [all …]
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | net_dim.rst | 21 processing. The mechanism includes an algorithm which decides if and how to 24 iteration of the algorithm, it analyses a given sample of the data, compares it 30 the algorithm might decide not to change anything. The configuration fields are 32 number of wanted packets per event. The Net DIM algorithm ascribes importance to 39 Each iteration of the Net DIM algorithm follows these steps: 54 compared. Here the algorithm tries to optimize for lower interrupt rate so an 62 and the internal state of the algorithm. The states reflect the "direction" of 63 the algorithm: is it going left (reducing moderation), right (increasing 66 algorithm would increase in order to reduce calculation overhead. Also, after 67 "parking" on one of the most left or most right decisions, the algorithm may [all …]
|
| /kernel/linux/linux-6.6/arch/x86/crypto/ |
| D | Kconfig | 11 Curve25519 algorithm 39 Block cipher: Blowfish cipher algorithm 89 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm 107 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm 122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 137 Length-preserving ciphers: Serpent cipher algorithm 153 Length-preserving ciphers: Serpent cipher algorithm 170 Length-preserving ciphers: Serpent cipher algorithm 183 Length-preserving ciphers: Serpent cipher algorithm 241 Block cipher: Twofish cipher algorithm [all …]
|
| /kernel/linux/linux-5.10/arch/arm/crypto/ |
| D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 122 tristate "CRCT10DIF digest algorithm using PMULL instructions" 128 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
|
| /kernel/linux/linux-6.6/arch/sparc/crypto/ |
| D | Kconfig | 12 Block cipher: DES (FIPS 46-2) cipher algorithm 13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 25 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720) 35 MD5 message digest algorithm (RFC1321) 45 SHA-1 secure hash algorithm (FIPS 180)
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | sysfs-kernel-mm-swap | 11 If set to true, the VMA based swap readahead algorithm 13 VMA, and the global swap readahead algorithm will be 15 false, the global swap readahead algorithm will be
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | sysfs-kernel-mm-swap | 11 If set to true, the VMA based swap readahead algorithm 13 VMA, and the global swap readahead algorithm will be 15 false, the global swap readahead algorithm will be
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| D | Kconfig | 11 Curve25519 algorithm 52 Poly1305 authenticator algorithm (RFC7539) 80 BLAKE2b digest algorithm optimized with ARM NEON instructions. 91 SHA-1 secure hash algorithm (FIPS 180) 102 SHA-1 secure hash algorithm (FIPS 180) 113 SHA-1 secure hash algorithm (FIPS 180) 225 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720) 226 and CRC32 CRC algorithm (IEEE 802.3) 239 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
|
| /kernel/linux/linux-6.6/arch/powerpc/crypto/ |
| D | Kconfig | 11 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720) 23 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF) 43 MD5 message digest algorithm (RFC1321) 51 SHA-1 secure hash algorithm (FIPS 180) 59 SHA-1 secure hash algorithm (FIPS 180) 136 Poly1305 authenticator algorithm (RFC7539)
|
| /kernel/linux/linux-5.10/drivers/crypto/ux500/hash/ |
| D | hash_core.c | 229 if (HASH_ALGO_SHA1 == ctx->config.algorithm) { in get_empty_message_digest() 235 ctx->config.algorithm) { in get_empty_message_digest() 248 if (HASH_ALGO_SHA1 == ctx->config.algorithm) { in get_empty_message_digest() 253 } else if (HASH_ALGO_SHA256 == ctx->config.algorithm) { in get_empty_message_digest() 680 if (config->algorithm != HASH_ALGO_SHA1 && in hash_setconfiguration() 681 config->algorithm != HASH_ALGO_SHA256) in hash_setconfiguration() 693 switch (config->algorithm) { in hash_setconfiguration() 942 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_dma_final() 1045 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_hw_final() 1268 u8 *digest, int algorithm) in hash_get_digest() argument [all …]
|
| /kernel/linux/linux-6.6/net/netfilter/ipvs/ |
| D | Kconfig | 118 The robin-robin scheduling algorithm simply directs network 127 The weighted robin-robin scheduling algorithm directs network 140 The least-connection scheduling algorithm directs network 150 The weighted least-connection scheduling algorithm directs network 160 The weighted failover scheduling algorithm directs network 170 The weighted overflow scheduling algorithm directs network 181 The locality-based least-connection scheduling algorithm is for 183 This algorithm usually directs packet destined for an IP address to 196 algorithm is also for destination IP load balancing. It is 213 The destination hashing scheduling algorithm assigns network [all …]
|
| /kernel/linux/linux-6.6/drivers/staging/rtl8723bs/hal/ |
| D | HalBtc8723b1Ant.c | 491 u8 algorithm = BT_8723B_1ANT_COEX_ALGO_UNDEFINED; in halbtc8723b1ant_ActionAlgorithm() local 497 return algorithm; in halbtc8723b1ant_ActionAlgorithm() 510 algorithm = BT_8723B_1ANT_COEX_ALGO_SCO; in halbtc8723b1ant_ActionAlgorithm() 513 algorithm = BT_8723B_1ANT_COEX_ALGO_HID; in halbtc8723b1ant_ActionAlgorithm() 515 algorithm = BT_8723B_1ANT_COEX_ALGO_A2DP; in halbtc8723b1ant_ActionAlgorithm() 518 algorithm = BT_8723B_1ANT_COEX_ALGO_PANHS; in halbtc8723b1ant_ActionAlgorithm() 520 algorithm = BT_8723B_1ANT_COEX_ALGO_PANEDR; in halbtc8723b1ant_ActionAlgorithm() 526 algorithm = BT_8723B_1ANT_COEX_ALGO_HID; in halbtc8723b1ant_ActionAlgorithm() 528 algorithm = BT_8723B_1ANT_COEX_ALGO_SCO; in halbtc8723b1ant_ActionAlgorithm() 531 algorithm = BT_8723B_1ANT_COEX_ALGO_SCO; in halbtc8723b1ant_ActionAlgorithm() [all …]
|
| D | HalBtc8723b2Ant.c | 292 u8 algorithm = BT_8723B_2ANT_COEX_ALGO_UNDEFINED; in halbtc8723b2ant_ActionAlgorithm() local 298 return algorithm; in halbtc8723b2ant_ActionAlgorithm() 315 algorithm = BT_8723B_2ANT_COEX_ALGO_SCO; in halbtc8723b2ant_ActionAlgorithm() 318 algorithm = BT_8723B_2ANT_COEX_ALGO_HID; in halbtc8723b2ant_ActionAlgorithm() 320 algorithm = BT_8723B_2ANT_COEX_ALGO_A2DP; in halbtc8723b2ant_ActionAlgorithm() 323 algorithm = BT_8723B_2ANT_COEX_ALGO_PANHS; in halbtc8723b2ant_ActionAlgorithm() 325 algorithm = BT_8723B_2ANT_COEX_ALGO_PANEDR; in halbtc8723b2ant_ActionAlgorithm() 332 algorithm = BT_8723B_2ANT_COEX_ALGO_PANEDR_HID; in halbtc8723b2ant_ActionAlgorithm() 334 algorithm = BT_8723B_2ANT_COEX_ALGO_PANEDR_HID; in halbtc8723b2ant_ActionAlgorithm() 337 algorithm = BT_8723B_2ANT_COEX_ALGO_SCO; in halbtc8723b2ant_ActionAlgorithm() [all …]
|
| /kernel/linux/linux-6.6/arch/mips/crypto/ |
| D | Kconfig | 19 Poly1305 authenticator algorithm (RFC7539) 29 MD5 message digest algorithm (RFC1321) 39 SHA-1 secure hash algorithm (FIPS 180)
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/blockdev/ |
| D | zram.rst | 88 3) Select compression algorithm 93 or change the selected compression algorithm (once the device is initialised 94 there is no way to change compression algorithm). 102 #select lzo compression algorithm 106 show every compression algorithm supported by the kernel. We keep this 108 a new device with a compression algorithm that is not listed in 207 comp_algorithm RW show and change the compression algorithm 414 compression algorithm can provide better compression ratio at a price of 416 algorithm can, for example, be more successful compressing huge pages (those 417 that default algorithm failed to compress). Another application is idle pages [all …]
|
| /kernel/linux/linux-5.10/net/netfilter/ipvs/ |
| D | Kconfig | 117 The robin-robin scheduling algorithm simply directs network 126 The weighted robin-robin scheduling algorithm directs network 139 The least-connection scheduling algorithm directs network 149 The weighted least-connection scheduling algorithm directs network 159 The weighted failover scheduling algorithm directs network 169 The weighted overflow scheduling algorithm directs network 180 The locality-based least-connection scheduling algorithm is for 182 This algorithm usually directs packet destined for an IP address to 195 algorithm is also for destination IP load balancing. It is 212 The destination hashing scheduling algorithm assigns network [all …]
|
| /kernel/linux/linux-6.6/lib/math/ |
| D | Kconfig | 3 tristate "CORDIC algorithm" 5 This option provides an implementation of the CORDIC algorithm;
|
| /kernel/linux/linux-5.10/lib/math/ |
| D | Kconfig | 3 tristate "CORDIC algorithm" 5 This option provides an implementation of the CORDIC algorithm;
|