Searched full:asymmetric (Results 1 – 25 of 32) sorted by relevance
12
| /Documentation/crypto/ |
| D | asymmetric-keys.rst | 4 Asymmetric / Public-key Cryptography Key Type 11 - Accessing asymmetric keys. 13 - Asymmetric key subtypes. 21 The "asymmetric" key type is designed to be a container for the keys used in 25 The asymmetric key is given a subtype that defines what sort of data is 33 operations using that key. In such a case, the asymmetric key would then 56 The asymmetric key type's match function can then perform a wider range of 64 keyctl search @s asymmetric id:5acc2142 75 keyctl search @s asymmetric tpm:5acc2142 80 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 [] [all …]
|
| D | api-akcipher.rst | 1 Asymmetric Cipher Algorithm Definitions 7 Asymmetric Cipher API 16 Asymmetric Cipher Request Handle
|
| D | index.rst | 21 asymmetric-keys
|
| D | architecture.rst | 215 - CRYPTO_ALG_TYPE_AKCIPHER Asymmetric cipher
|
| /Documentation/arch/arm64/ |
| D | asymmetric-32bit.rst | 2 Asymmetric 32-bit SoCs 7 This document describes the impact of asymmetric 32-bit SoCs on the 38 allowing 32-bit tasks to run on an asymmetric 32-bit system requires an 42 For the remainder of this document we will refer to an *asymmetric 43 system* to mean an asymmetric 32-bit SoC running Linux with this kernel 49 32-bit tasks running on an asymmetric system behave in mostly the same 69 ``execve(2)``. This is not always possible on an asymmetric system, 106 (e.g. by calling ``sched_setattr(2)``) is rejected on an asymmetric 119 32-bit tasks on an asymmetric system. Failure to do so is likely to 125 The affinity of a 32-bit task on an asymmetric system may include CPUs [all …]
|
| D | index.rst | 13 asymmetric-32bit
|
| D | memory-tagging-extension.rst | 79 - *Asymmetric* - Reads are handled as for synchronous mode while writes 153 modes are requested then asymmetric mode may also be selected by the 160 2. Asymmetric 164 also disable asymmetric mode.
|
| /Documentation/ABI/testing/ |
| D | sysfs-driver-qat | 36 * asym: the device is configured for running asymmetric crypto 38 * asym;dc: the device is configured for running asymmetric 120 * asym: the ring pair is configured for running asymmetric crypto
|
| D | evm | 16 asymmetric key. These keys are loaded onto root's
|
| D | sysfs-bus-usb | 304 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per 313 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per
|
| /Documentation/devicetree/bindings/net/ |
| D | ethernet-controller.yaml | 191 Asymmetric pause configuration. 0 for no asymmetric 192 pause, 1 for asymmetric pause
|
| /Documentation/driver-api/cxl/ |
| D | access-coordinates.rst | 19 maximizes performance. When asymmetric topology is detected, the calculation 20 is aborted. An asymmetric topology is detected during topology walk where the
|
| /Documentation/scheduler/ |
| D | sched-capacity.rst | 18 asymmetric CPU capacity systems, as they contain CPUs of different capacities. 59 Consider an hypothetical dual-core asymmetric CPU capacity system where 146 asymmetric CPU capacities complexify this somewhat; the following sections will 284 whether the system exhibits asymmetric CPU capacities. Should that be the 294 cater to asymmetric CPU capacity systems. Do note however that said key is 324 asymmetric CPU capacities is to:
|
| D | sched-energy.rst | 325 6.1 - Asymmetric CPU topology 330 asymmetric CPU topologies for now. This requirement is checked at run-time by
|
| /Documentation/userspace-api/media/v4l/ |
| D | ext-ctrls-image-source.rst | 55 fields to take into consideration asymmetric pixels.
|
| /Documentation/security/keys/ |
| D | core.rst | 914 chains or individual certificate signatures using the asymmetric key type. 915 See Documentation/crypto/asymmetric-keys.rst for specific restrictions 916 applicable to the asymmetric key type. 919 * Query an asymmetric key:: 926 Get information about an asymmetric key. Specific algorithms and 954 If successful, 0 is returned. If the key is not an asymmetric key, 958 * Encrypt, decrypt, sign or verify a blob using an asymmetric key:: 984 Use an asymmetric key to perform a public-key cryptographic operation a 985 blob of data. For encryption and verification, the asymmetric key may 997 ``key_id`` is the ID of the asymmetric key to be used. ``in_len`` and [all …]
|
| D | trusted-encrypted.rst | 438 2.23.133.10.1.3 TPM Loadable key. This is an asymmetric key (Usually 442 2.23.133.10.1.4 TPM Importable Key. This is an asymmetric key (Usually
|
| /Documentation/security/tpm/ |
| D | tpm-security.rst | 80 asymmetric secret must be established which must also be unknown to 82 and storage seeds, which can be used to derive asymmetric keys.
|
| /Documentation/admin-guide/ |
| D | module-signing.rst | 205 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file] 209 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
|
| /Documentation/admin-guide/device-mapper/ |
| D | dm-raid.rst | 27 raid5_la RAID5 left asymmetric 30 raid5_ra RAID5 right asymmetric
|
| /Documentation/admin-guide/sysctl/ |
| D | net.rst | 148 dev_weight adaptable for asymmetric CPU needs on RX/TX side of the network stack. 158 Effective on a per CPU basis. Allows scaling of current dev_weight for asymmetric
|
| /Documentation/dev-tools/ |
| D | kasan.rst | 135 is configured in synchronous, asynchronous or asymmetric mode of 143 Asymmetric mode: a bad access is detected synchronously on reads and
|
| /Documentation/filesystems/ |
| D | directory-locking.rst | 123 on that filesystem" should be an asymmetric relation (or, if you will,
|
| /Documentation/staging/ |
| D | remoteproc.rst | 8 Modern SoCs typically have heterogeneous remote processor devices in asymmetric
|
| D | rpmsg.rst | 15 asymmetric multiprocessing (AMP) configurations, which may be running
|
12