Searched full:asymmetric (Results 1 – 19 of 19) sorted by relevance
| /Documentation/crypto/ |
| D | asymmetric-keys.txt | 2 ASYMMETRIC / PUBLIC-KEY CRYPTOGRAPHY KEY TYPE 9 - Accessing asymmetric keys. 11 - Asymmetric key subtypes. 20 The "asymmetric" key type is designed to be a container for the keys used in 24 The asymmetric key is given a subtype that defines what sort of data is 32 operations using that key. In such a case, the asymmetric key would then 56 The asymmetric key type's match function can then perform a wider range of 64 keyctl search @s asymmetric id:5acc2142 75 keyctl search @s asymmetric tpm:5acc2142 80 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 [] [all …]
|
| D | api-akcipher.rst | 1 Asymmetric Cipher Algorithm Definitions 7 Asymmetric Cipher API 16 Asymmetric Cipher Request Handle
|
| D | architecture.rst | 219 - CRYPTO_ALG_TYPE_AKCIPHER Asymmetric cipher
|
| /Documentation/devicetree/bindings/net/ |
| D | ethernet-controller.yaml | 172 Asymmetric pause configuration. 0 for no asymmetric 173 pause, 1 for asymmetric pause
|
| /Documentation/ABI/testing/ |
| D | evm | 15 asymmetric key. These keys are loaded onto root's
|
| D | sysfs-bus-usb | 285 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per 294 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per
|
| /Documentation/security/keys/ |
| D | core.rst | 914 chains or individual certificate signatures using the asymmetric key type. 915 See Documentation/crypto/asymmetric-keys.txt for specific restrictions 916 applicable to the asymmetric key type. 919 * Query an asymmetric key:: 925 Get information about an asymmetric key. The information is returned in 950 If successful, 0 is returned. If the key is not an asymmetric key, 954 * Encrypt, decrypt, sign or verify a blob using an asymmetric key:: 980 Use an asymmetric key to perform a public-key cryptographic operation a 981 blob of data. For encryption and verification, the asymmetric key may 993 ``key_id`` is the ID of the asymmetric key to be used. ``in_len`` and [all …]
|
| /Documentation/admin-guide/ |
| D | module-signing.rst | 200 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file] 204 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
|
| D | kernel-parameters.txt | 3812 for asymmetric multiprocessors.
|
| /Documentation/admin-guide/sysctl/ |
| D | net.rst | 141 dev_weight adaptable for asymmetric CPU needs on RX/TX side of the network stack. 151 Effective on a per CPU basis. Allows scaling of current dev_weight for asymmetric
|
| D | kernel.rst | 923 platforms with asymmetric CPU topologies and having an Energy
|
| /Documentation/admin-guide/device-mapper/ |
| D | dm-raid.rst | 27 raid5_la RAID5 left asymmetric 30 raid5_ra RAID5 right asymmetric
|
| /Documentation/scheduler/ |
| D | sched-energy.rst | 325 6.1 - Asymmetric CPU topology 330 asymmetric CPU topologies for now. This requirement is checked at run-time by
|
| /Documentation/ |
| D | remoteproc.txt | 8 Modern SoCs typically have heterogeneous remote processor devices in asymmetric
|
| D | rpmsg.txt | 15 asymmetric multiprocessing (AMP) configurations, which may be running
|
| /Documentation/powerpc/ |
| D | qe_firmware.rst | 73 asymmetric multiprocessing (AMP) system.
|
| /Documentation/filesystems/ |
| D | xfs-delayed-logging-design.txt | 580 For delayed logging, however, we have an asymmetric transaction commit to
|
| /Documentation/networking/ |
| D | rxrpc.txt | 126 (*) Calls are two-phase and asymmetric: the client sends its request data,
|
| D | ip-sysctl.txt | 1250 to prevent IP spoofing from DDos attacks. If using asymmetric routing
|