Lines Matching full:algorithm

170 	tristate "Userspace cryptographic algorithm configuration"
183 The cryptographic self-tests run at boot time, or at algorithm
200 Enable the full set of cryptographic self-tests for each algorithm.
222 This converts an arbitrary crypto algorithm into a parallel
223 algorithm that executes in kernel threads.
232 converts an arbitrary synchronous software crypto algorithm
233 into an asynchronous algorithm that executes in a kernel thread.
287 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
294 DH (Diffie-Hellman) key exchange algorithm
318 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
322 tristate "ECDSA (Elliptic Curve Digital Signature Algorithm)"
327 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,
334 tristate "EC-RDSA (Elliptic Curve Russian Digital Signature Algorithm)"
341 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
348 tristate "ML-DSA (Module-Lattice-Based Digital Signature Algorithm)"
352 ML-DSA (Module-Lattice-Based Digital Signature Algorithm) (FIPS-204).
383 Anubis cipher algorithm
396 ARIA cipher algorithm (RFC5794)
398 ARIA is a standard encryption algorithm of the Republic of Korea.
405 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
412 Blowfish cipher algorithm, by Bruce Schneier
423 Common parts of the Blowfish cipher algorithm shared by the
450 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
457 CAST6 (CAST-256) encryption algorithm (RFC2612)
473 FCrypt algorithm used by RxRPC
482 Khazad cipher algorithm
485 an algorithm optimized for 64-bit processors with good performance
496 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
500 national standard encryption algorithm of the Republic of Korea.
503 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
510 Serpent cipher algorithm, by Anderson, Biham & Knudsen
552 TEA (Tiny Encryption Algorithm) cipher algorithms
554 Tiny Encryption Algorithm is a simple cipher that uses
558 Xtendend Tiny Encryption Algorithm is a modification to
559 the TEA algorithm to address a potential key weakness
560 in the TEA algorithm.
562 Xtendend Encryption Tiny Algorithm is a mis-implementation
563 of the XTEA algorithm for compatibility purposes.
570 Twofish cipher algorithm
582 Common parts of the Twofish cipher algorithm shared by the
621 ARC4 cipher algorithm
624 bits in length. This algorithm is required for driver-based
626 weakness of the algorithm.
759 AEGIS-128 AEAD algorithm
766 AEGIS-128 AEAD algorithm
816 xoring it with a salt. This algorithm is mainly useful for CTR.
828 algorithm for CBC.
910 MD4 message digest algorithm (RFC1320)
917 MD5 message digest algorithm (RFC1321), including HMAC support.
928 This algorithm is required for TKIP, but it should not be used for
929 other purposes because of the weakness of the algorithm.
954 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3), including
1035 xxHash non-cryptographic hash algorithm
1048 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1061 CRC32 CRC algorithm (IEEE 802.3)
1074 Deflate compression algorithm (RFC1951)
1085 LZO compression algorithm
1096 842 compression algorithm by IBM
1107 LZ4 compression algorithm
1118 LZ4 high compression mode algorithm
1129 zstd compression algorithm
1166 This uses the AES cipher algorithm with the counter block mode.
1348 (Cryptographic Algorithm Validation Program) testing: