Home
last modified time | relevance | path

Searched full:asymmetric (Results 1 – 19 of 19) sorted by relevance

/Documentation/crypto/
Dasymmetric-keys.txt2 ASYMMETRIC / PUBLIC-KEY CRYPTOGRAPHY KEY TYPE
9 - Accessing asymmetric keys.
11 - Asymmetric key subtypes.
20 The "asymmetric" key type is designed to be a container for the keys used in
24 The asymmetric key is given a subtype that defines what sort of data is
32 operations using that key. In such a case, the asymmetric key would then
56 The asymmetric key type's match function can then perform a wider range of
64 keyctl search @s asymmetric id:5acc2142
75 keyctl search @s asymmetric tpm:5acc2142
80 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 []
[all …]
Dapi-akcipher.rst1 Asymmetric Cipher Algorithm Definitions
7 Asymmetric Cipher API
16 Asymmetric Cipher Request Handle
Darchitecture.rst219 - CRYPTO_ALG_TYPE_AKCIPHER Asymmetric cipher
/Documentation/devicetree/bindings/net/
Dethernet-controller.yaml172 Asymmetric pause configuration. 0 for no asymmetric
173 pause, 1 for asymmetric pause
/Documentation/ABI/testing/
Devm15 asymmetric key. These keys are loaded onto root's
Dsysfs-bus-usb285 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per
294 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per
/Documentation/security/keys/
Dcore.rst914 chains or individual certificate signatures using the asymmetric key type.
915 See Documentation/crypto/asymmetric-keys.txt for specific restrictions
916 applicable to the asymmetric key type.
919 * Query an asymmetric key::
925 Get information about an asymmetric key. The information is returned in
950 If successful, 0 is returned. If the key is not an asymmetric key,
954 * Encrypt, decrypt, sign or verify a blob using an asymmetric key::
980 Use an asymmetric key to perform a public-key cryptographic operation a
981 blob of data. For encryption and verification, the asymmetric key may
993 ``key_id`` is the ID of the asymmetric key to be used. ``in_len`` and
[all …]
/Documentation/admin-guide/
Dmodule-signing.rst200 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file]
204 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
Dkernel-parameters.txt3812 for asymmetric multiprocessors.
/Documentation/admin-guide/sysctl/
Dnet.rst141 dev_weight adaptable for asymmetric CPU needs on RX/TX side of the network stack.
151 Effective on a per CPU basis. Allows scaling of current dev_weight for asymmetric
Dkernel.rst923 platforms with asymmetric CPU topologies and having an Energy
/Documentation/admin-guide/device-mapper/
Ddm-raid.rst27 raid5_la RAID5 left asymmetric
30 raid5_ra RAID5 right asymmetric
/Documentation/scheduler/
Dsched-energy.rst325 6.1 - Asymmetric CPU topology
330 asymmetric CPU topologies for now. This requirement is checked at run-time by
/Documentation/
Dremoteproc.txt8 Modern SoCs typically have heterogeneous remote processor devices in asymmetric
Drpmsg.txt15 asymmetric multiprocessing (AMP) configurations, which may be running
/Documentation/powerpc/
Dqe_firmware.rst73 asymmetric multiprocessing (AMP) system.
/Documentation/filesystems/
Dxfs-delayed-logging-design.txt580 For delayed logging, however, we have an asymmetric transaction commit to
/Documentation/networking/
Drxrpc.txt126 (*) Calls are two-phase and asymmetric: the client sends its request data,
Dip-sysctl.txt1250 to prevent IP spoofing from DDos attacks. If using asymmetric routing