Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 213) sorted by relevance

123456789

/Documentation/crypto/
Dapi-intro.rst35 [algorithm api] (for registering algorithms)
37 The idea is to make the user interface and algorithm registration API
103 When submitting a new algorithm for inclusion, a mandatory requirement
204 SHA1 algorithm contributors:
207 DES algorithm contributors:
212 Blowfish algorithm contributors:
216 Twofish algorithm contributors:
220 SHA256/384/512 algorithm contributors:
225 AES algorithm contributors:
233 CAST5 algorithm contributors:
[all …]
Dapi-skcipher.rst1 Block Cipher Algorithm Definitions
5 :doc: Block Cipher Algorithm Definitions
Dapi-digest.rst1 Message Digest Algorithm Definitions
5 :doc: Message Digest Algorithm Definitions
/Documentation/ABI/testing/
Dsysfs-bus-iio-adc-mcp356422 auto-zeroing algorithm (the input multiplexer and the ADC
23 include an offset cancellation algorithm that cancels the offset
24 contribution of the ADC). When the offset cancellation algorithm
28 case where the algorithm is disabled. This technique allows the
41 This attribute is used to enable the chopping algorithm for the
48 limitation, the buffer includes an auto-zeroing algorithm that
Dsysfs-kernel-mm-swap11 If set to true, the VMA based swap readahead algorithm
13 VMA, and the global swap readahead algorithm will be
15 false, the global swap readahead algorithm will be
/Documentation/networking/
Dnet_dim.rst21 processing. The mechanism includes an algorithm which decides if and how to
24 iteration of the algorithm, it analyses a given sample of the data, compares it
30 the algorithm might decide not to change anything. The configuration fields are
32 number of wanted packets per event. The Net DIM algorithm ascribes importance to
36 Net DIM Algorithm
39 Each iteration of the Net DIM algorithm follows these steps:
54 compared. Here the algorithm tries to optimize for lower interrupt rate so an
62 and the internal state of the algorithm. The states reflect the "direction" of
63 the algorithm: is it going left (reducing moderation), right (increasing
66 algorithm would increase in order to reduce calculation overhead. Also, after
[all …]
Dnexthop-group-resilient.rst13 algorithm, described in RFC 2992.
15 To select a next hop, hash-threshold algorithm first assigns a range of
29 under the hash-threshold algorithm.
48 constituent next hops: a hash table. The selection algorithm uses SKB hash
53 algorithm, the range of hashes associated with a next hop must be
67 under the resilient hashing algorithm.
76 Algorithm chapter
79 In a nutshell, the algorithm works as follows. Each next hop deserves a
97 After assigning wants counts to next hops, an "upkeep" algorithm runs. For
127 When offloading resilient groups, the algorithm that distributes buckets
[all …]
Ddctcp.rst7 DCTCP is an enhancement to the TCP congestion control algorithm for data
26 The algorithm is further described in detail in the following two
/Documentation/devicetree/bindings/sound/
Dcs35l33.txt43 Optional H/G Algorithm sub-node:
46 the internal H/G Algorithm.
48 - cirrus,hg-algo : Sub-node for internal Class H/G algorithm that
53 - cirrus,mem-depth : Memory depth for the Class H/G algorithm measured in
67 algorithm uses the max detection path. If not present, the LDO
71 algorithm switches to the LDO voltage. This property can be set to values
78 - cirrus,vp-hg : Class H/G algorithm VPhg. Controls the H/G algorithm's
Dcs35l35.txt69 Optional H/G Algorithm sub-node:
72 that will disable automatic control of the internal H/G Algorithm.
75 or using these Class H Algorithm controls over the internal Algorithm.
78 - cirrus,classh-internal-algo : Sub-node for the Internal Class H Algorithm
79 See Section 4.3 Internal Class H Algorithm in the Datasheet.
80 If not used, the device manages the ClassH Algorithm internally.
/Documentation/admin-guide/blockdev/
Dzram.rst90 3) Select compression algorithm
95 or change the selected compression algorithm (once the device is initialised
96 there is no way to change compression algorithm).
104 #select lzo compression algorithm
110 4) Set compression algorithm parameters: Optional
115 attribute which provides a per-algorithm params configuration.
120 compression algorithm to use external pre-trained dictionary, pass full
126 #same, but using algorithm priority
134 Parameters are algorithm specific: not all algorithms support pre-trained
233 comp_algorithm RW show and change the compression algorithm
[all …]
/Documentation/devicetree/bindings/net/
Dintel,dwmac-plat.yaml72 snps,dcb-algorithm;
78 snps,dcb-algorithm;
89 snps,dcb-algorithm;
95 snps,dcb-algorithm;
Dsnps,dwmac.yaml222 snps,dcb-algorithm:
225 snps,avb-algorithm:
253 - snps,dcb-algorithm
256 snps,avb-algorithm: false
259 - snps,avb-algorithm
262 snps,dcb-algorithm: false
362 description: TX queue weight (if using a DCB weight algorithm)
363 snps,dcb-algorithm:
366 snps,avb-algorithm:
400 - snps,dcb-algorithm
[all …]
/Documentation/devicetree/bindings/power/supply/
Dstericsson,ab8500-chargalg.yaml8 title: AB8500 Charging Algorithm
37 charging-algorithm {
/Documentation/admin-guide/device-mapper/
Ddm-integrity.rst71 the internal-hash algorithm)
128 internal_hash:algorithm(:key) (the key is optional)
134 You can use a crc algorithm (such as crc32), then integrity target
136 You can also use a hmac algorithm (for example
148 journal_crypt:algorithm(:key) (the key is optional)
149 Encrypt the journal using given algorithm to make sure that the
160 journal_mac:algorithm(:key) (the key is optional)
163 crc algorithm, to protect against malicious modification, use a
164 hmac algorithm with a key.
Dverity.rst17 <algorithm> <digest> <salt>
58 <algorithm>
59 The cryptographic hash algorithm used for this device. This should
60 be the name of the algorithm, like "sha1".
188 selected cryptographic digest algorithm. The hashes are linearly-ordered in
/Documentation/core-api/
Dgenalloc.rst97 Allocations with gen_pool_alloc_algo() specify an algorithm to be
98 used to choose the memory to be allocated; the default algorithm can be set
100 algorithm; most ignore it, but it is occasionally needed. One can,
101 naturally, write a special-purpose algorithm, but there is a fair set
105 algorithm if none other has been specified.
/Documentation/arch/arm/
Dcluster-pm-race-avoidance.rst2 Cluster-wide Power-up/power-down race avoidance algorithm
5 This file documents the algorithm which is used to coordinate CPU and
9 The section "Rationale" explains what the algorithm is for and why it is
12 algorithm in use.
103 In this algorithm, each individual core in a multi-core processor is
109 The algorithm defines the following states for each CPU in the system:
187 race avoidance algorithm.
271 The race avoidance algorithm does not provide a way to determine
452 The race avoidance algorithm documented above does not provide a
517 As currently described and implemented, the algorithm does not
[all …]
Dvlocks.rst27 Algorithm chapter
30 The easiest way to explain the vlocks algorithm is with some pseudo-code::
70 "entering" array in Lamport's bakery algorithm [1].
123 the basic algorithm:
172 when executing the algorithm in cached memory.
/Documentation/admin-guide/
Dmodule-signing.rst34 sizes 256, 384, and 512 (the algorithm is selected by data in the signature).
78 (3) :menuselection:`Which hash algorithm should modules be signed with?`
80 This presents a choice of which hash algorithm the installation phase will
92 The algorithm selected here will also be built into the kernel (rather
93 than being a module) so that modules signed with that algorithm can have
223 1. The hash algorithm (e.g., sha256)
233 The hash algorithm used does not have to match the one configured, but if it
234 doesn't, you should make sure that hash algorithm is either built into the
/Documentation/RCU/
Drculist_nulls.rst32 1) Lookup algorithm
97 2) Insertion algorithm
120 3) Removal algorithm
159 1) lookup algorithm
195 2) Insert algorithm
/Documentation/userspace-api/media/drivers/
Daspeed-video.rst10 options. The adopted compressing algorithm is a modified JPEG algorithm.
/Documentation/networking/device_drivers/hamradio/
Dbaycom.rst114 to use the software DCD algorithm (see below)::
132 utilise a software DCD algorithm (options=1) or use a DCD signal from
137 open. It is highly recommended to use the software DCD algorithm,
141 par96 the software DCD algorithm for this type of modem is rather poor.
143 a reasonable DCD algorithm in software. Therefore, if your radio
/Documentation/filesystems/ext4/
Dchecksums.rst8 The desired checksum algorithm is indicated in the superblock, though as
9 of October 2012 the only supported algorithm is crc32c. Some data
/Documentation/filesystems/
Didmappings.rst63 straightforward algorithm to use is to apply the inverse of the first idmapping,
83 The algorithm to calculate what a given id maps to is pretty simple. First, we
199 This translation algorithm is used by the kernel in quite a few places. For
219 the algorithm::
227 This algorithm allows us to answer the question what userspace id a given
284 inverting the algorithm:
372 crossmapping algorithm we mentioned above in a previous section. First, the
496 algorithm introduced in a previous section:
507 The crossmapping algorithm fails in this case because the kernel id in the
522 algorithm introduced in a previous section:
[all …]

123456789