• Home
  • Raw
  • Download

Lines Matching full:algorithms

3 # Generic algorithms support
40 This option provides the API for cryptographic algorithms.
151 Enable extra run-time self tests of registered crypto algorithms,
161 tristate "Null algorithms"
164 These are 'Null' algorithms, used by IPsec, which do nothing.
271 standard algorithms (called GOST algorithms). Only signature verification
663 CRC32c and CRC32 CRC algorithms implemented using mips crypto
683 This module provides the following algorithms:
701 This module provides the following algorithms:
748 Stress test for CRC32c and CRC-T10DIF algorithms implemented with
750 Unless you are testing these algorithms, you don't need this.
1003 tristate "SHA384 and SHA512 digest algorithms"
1015 tristate "SHA384 and SHA512 digest algorithms (OCTEON)"
1058 cryptographic standard algorithms (called GOST algorithms).
1059 This setting enables two hash algorithms with 256 and 512 bits output.
1066 tristate "Tiger digest algorithms"
1079 tristate "Whirlpool digest algorithms"
1101 tristate "AES cipher algorithms"
1105 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1141 tristate "AES cipher algorithms (AES-NI)"
1152 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1174 tristate "AES cipher algorithms (SPARC64)"
1180 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1201 tristate "AES cipher algorithms (PPC SPE)"
1205 AES cipher algorithms (FIPS-197). Additionally the acceleration
1281 tristate "Camellia cipher algorithms"
1285 Camellia cipher algorithms module.
1368 Common parts of the CAST cipher algorithms shared by the
1418 tristate "DES and Triple DES EDE cipher algorithms"
1425 tristate "DES and Triple DES EDE cipher algorithms (SPARC64)"
1481 tristate "ChaCha stream cipher algorithms"
1485 The ChaCha20, XChaCha20, and XChaCha12 stream cipher algorithms.
1503 tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
1513 tristate "ChaCha stream cipher algorithms (MIPS 32r2 optimized)"
1624 SM4 cipher algorithms (OSCCA GB/T 32907-2016).
1628 as an authorized cryptographic algorithms for the use within China.
1646 tristate "TEA, XTEA and XETA cipher algorithms"
1685 tristate "Twofish cipher algorithms (i586)"
1880 tristate "User-space interface for hash algorithms"
1886 algorithms.
1889 tristate "User-space interface for symmetric key cipher algorithms"
1895 key cipher algorithms.
1898 tristate "User-space interface for random number generator algorithms"
1904 number generator algorithms.
1916 tristate "User-space interface for AEAD cipher algorithms"
1924 cipher algorithms.
1927 bool "Enable obsolete cryptographic algorithms for userspace"
1931 Allow obsolete cryptographic algorithms to be selected that have