Home
last modified time | relevance | path

Searched full:asymmetric (Results 1 – 25 of 32) sorted by relevance

12

/Documentation/crypto/
Dasymmetric-keys.rst4 Asymmetric / Public-key Cryptography Key Type
11 - Accessing asymmetric keys.
13 - Asymmetric key subtypes.
21 The "asymmetric" key type is designed to be a container for the keys used in
25 The asymmetric key is given a subtype that defines what sort of data is
33 operations using that key. In such a case, the asymmetric key would then
56 The asymmetric key type's match function can then perform a wider range of
64 keyctl search @s asymmetric id:5acc2142
75 keyctl search @s asymmetric tpm:5acc2142
80 1a39e171 I----- 1 perm 3f010000 0 0 asymmetric modsign.0: DSA 5acc2142 []
[all …]
Dapi-akcipher.rst1 Asymmetric Cipher Algorithm Definitions
7 Asymmetric Cipher API
16 Asymmetric Cipher Request Handle
Dindex.rst21 asymmetric-keys
Darchitecture.rst215 - CRYPTO_ALG_TYPE_AKCIPHER Asymmetric cipher
/Documentation/arch/arm64/
Dasymmetric-32bit.rst2 Asymmetric 32-bit SoCs
7 This document describes the impact of asymmetric 32-bit SoCs on the
38 allowing 32-bit tasks to run on an asymmetric 32-bit system requires an
42 For the remainder of this document we will refer to an *asymmetric
43 system* to mean an asymmetric 32-bit SoC running Linux with this kernel
49 32-bit tasks running on an asymmetric system behave in mostly the same
69 ``execve(2)``. This is not always possible on an asymmetric system,
106 (e.g. by calling ``sched_setattr(2)``) is rejected on an asymmetric
119 32-bit tasks on an asymmetric system. Failure to do so is likely to
125 The affinity of a 32-bit task on an asymmetric system may include CPUs
[all …]
Dindex.rst13 asymmetric-32bit
Dmemory-tagging-extension.rst79 - *Asymmetric* - Reads are handled as for synchronous mode while writes
153 modes are requested then asymmetric mode may also be selected by the
160 2. Asymmetric
164 also disable asymmetric mode.
/Documentation/ABI/testing/
Dsysfs-driver-qat36 * asym: the device is configured for running asymmetric crypto
38 * asym;dc: the device is configured for running asymmetric
120 * asym: the ring pair is configured for running asymmetric crypto
Devm16 asymmetric key. These keys are loaded onto root's
Dsysfs-bus-usb304 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per
313 Inter-Chip SSIC devices support asymmetric lanes up to 4 lanes per
/Documentation/devicetree/bindings/net/
Dethernet-controller.yaml191 Asymmetric pause configuration. 0 for no asymmetric
192 pause, 1 for asymmetric pause
/Documentation/driver-api/cxl/
Daccess-coordinates.rst19 maximizes performance. When asymmetric topology is detected, the calculation
20 is aborted. An asymmetric topology is detected during topology walk where the
/Documentation/scheduler/
Dsched-capacity.rst18 asymmetric CPU capacity systems, as they contain CPUs of different capacities.
59 Consider an hypothetical dual-core asymmetric CPU capacity system where
146 asymmetric CPU capacities complexify this somewhat; the following sections will
284 whether the system exhibits asymmetric CPU capacities. Should that be the
294 cater to asymmetric CPU capacity systems. Do note however that said key is
324 asymmetric CPU capacities is to:
Dsched-energy.rst325 6.1 - Asymmetric CPU topology
330 asymmetric CPU topologies for now. This requirement is checked at run-time by
/Documentation/userspace-api/media/v4l/
Dext-ctrls-image-source.rst55 fields to take into consideration asymmetric pixels.
/Documentation/security/keys/
Dcore.rst914 chains or individual certificate signatures using the asymmetric key type.
915 See Documentation/crypto/asymmetric-keys.rst for specific restrictions
916 applicable to the asymmetric key type.
919 * Query an asymmetric key::
926 Get information about an asymmetric key. Specific algorithms and
954 If successful, 0 is returned. If the key is not an asymmetric key,
958 * Encrypt, decrypt, sign or verify a blob using an asymmetric key::
984 Use an asymmetric key to perform a public-key cryptographic operation a
985 blob of data. For encryption and verification, the asymmetric key may
997 ``key_id`` is the ID of the asymmetric key to be used. ``in_len`` and
[all …]
Dtrusted-encrypted.rst438 2.23.133.10.1.3 TPM Loadable key. This is an asymmetric key (Usually
442 2.23.133.10.1.4 TPM Importable Key. This is an asymmetric key (Usually
/Documentation/security/tpm/
Dtpm-security.rst80 asymmetric secret must be established which must also be unknown to
82 and storage seeds, which can be used to derive asymmetric keys.
/Documentation/admin-guide/
Dmodule-signing.rst205 keyctl padd asymmetric "" [.builtin_trusted_keys-ID] <[key-file]
209 keyctl padd asymmetric "" 0x223c7853 <my_public_key.x509
/Documentation/admin-guide/device-mapper/
Ddm-raid.rst27 raid5_la RAID5 left asymmetric
30 raid5_ra RAID5 right asymmetric
/Documentation/admin-guide/sysctl/
Dnet.rst148 dev_weight adaptable for asymmetric CPU needs on RX/TX side of the network stack.
158 Effective on a per CPU basis. Allows scaling of current dev_weight for asymmetric
/Documentation/dev-tools/
Dkasan.rst135 is configured in synchronous, asynchronous or asymmetric mode of
143 Asymmetric mode: a bad access is detected synchronously on reads and
/Documentation/filesystems/
Ddirectory-locking.rst123 on that filesystem" should be an asymmetric relation (or, if you will,
/Documentation/staging/
Dremoteproc.rst8 Modern SoCs typically have heterogeneous remote processor devices in asymmetric
Drpmsg.rst15 asymmetric multiprocessing (AMP) configurations, which may be running

12