Lines Matching full:algorithm
145 tristate "Cryptographic algorithm manager"
163 tristate "Userspace cryptographic algorithm configuration"
175 algorithm registration.
206 This converts an arbitrary crypto algorithm into a parallel
207 algorithm that executes in kernel threads.
216 converts an arbitrary synchronous software crypto algorithm
217 into an asynchronous algorithm that executes in a kernel thread.
256 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
263 DH (Diffie-Hellman) key exchange algorithm
287 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
291 tristate "ECDSA (Elliptic Curve Digital Signature Algorithm)"
296 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,
303 tristate "EC-RDSA (Elliptic Curve Russian Digital Signature Algorithm)"
310 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
371 Anubis cipher algorithm
384 ARIA cipher algorithm (RFC5794)
386 ARIA is a standard encryption algorithm of the Republic of Korea.
393 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
400 Blowfish cipher algorithm, by Bruce Schneier
411 Common parts of the Blowfish cipher algorithm shared by the
438 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
445 CAST6 (CAST-256) encryption algorithm (RFC2612)
461 FCrypt algorithm used by RxRPC
470 Khazad cipher algorithm
473 an algorithm optimized for 64-bit processors with good performance
484 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
488 national standard encryption algorithm of the Republic of Korea.
491 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
498 Serpent cipher algorithm, by Anderson, Biham & Knudsen
540 TEA (Tiny Encryption Algorithm) cipher algorithms
542 Tiny Encryption Algorithm is a simple cipher that uses
546 Xtendend Tiny Encryption Algorithm is a modification to
547 the TEA algorithm to address a potential key weakness
548 in the TEA algorithm.
550 Xtendend Encryption Tiny Algorithm is a mis-implementation
551 of the XTEA algorithm for compatibility purposes.
558 Twofish cipher algorithm
570 Common parts of the Twofish cipher algorithm shared by the
608 ARC4 cipher algorithm
611 bits in length. This algorithm is required for driver-based
613 weakness of the algorithm.
759 AEGIS-128 AEAD algorithm
766 AEGIS-128 AEAD algorithm
818 xoring it with a salt. This algorithm is mainly useful for CTR.
830 algorithm for CBC.
913 MD4 message digest algorithm (RFC1320)
919 MD5 message digest algorithm (RFC1321)
930 This algorithm is required for TKIP, but it should not be used for
931 other purposes because of the weakness of the algorithm.
948 Poly1305 authenticator algorithm (RFC7539)
950 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
977 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)
1036 VMAC is a message authentication algorithm designed for
1067 xxHash non-cryptographic hash algorithm
1082 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1097 CRC32 CRC algorithm (IEEE 802.3)
1105 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
1107 CRC algorithm used by the SCSI Block Commands standard.
1110 tristate "CRC64 based on Rocksoft Model algorithm"
1114 CRC64 CRC algorithm based on the Rocksoft Model CRC Algorithm
1131 Deflate compression algorithm (RFC1951)
1142 LZO compression algorithm
1153 842 compression algorithm by IBM
1164 LZ4 compression algorithm
1175 LZ4 high compression mode algorithm
1186 zstd compression algorithm
1201 This uses the AES cipher algorithm.
1235 This uses the AES cipher algorithm with the counter block mode.
1412 (Cryptographic Algorithm Validation Program) testing: