Lines Matching full:algorithm
170 tristate "Userspace cryptographic algorithm configuration"
183 The cryptographic self-tests run at boot time, or at algorithm
200 Enable the full set of cryptographic self-tests for each algorithm.
222 This converts an arbitrary crypto algorithm into a parallel
223 algorithm that executes in kernel threads.
232 converts an arbitrary synchronous software crypto algorithm
233 into an asynchronous algorithm that executes in a kernel thread.
287 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
294 DH (Diffie-Hellman) key exchange algorithm
318 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
322 tristate "ECDSA (Elliptic Curve Digital Signature Algorithm)"
327 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,
334 tristate "EC-RDSA (Elliptic Curve Russian Digital Signature Algorithm)"
341 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
395 Anubis cipher algorithm
408 ARIA cipher algorithm (RFC5794)
410 ARIA is a standard encryption algorithm of the Republic of Korea.
417 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
424 Blowfish cipher algorithm, by Bruce Schneier
435 Common parts of the Blowfish cipher algorithm shared by the
462 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
469 CAST6 (CAST-256) encryption algorithm (RFC2612)
485 FCrypt algorithm used by RxRPC
494 Khazad cipher algorithm
497 an algorithm optimized for 64-bit processors with good performance
508 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
512 national standard encryption algorithm of the Republic of Korea.
515 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
522 Serpent cipher algorithm, by Anderson, Biham & Knudsen
564 TEA (Tiny Encryption Algorithm) cipher algorithms
566 Tiny Encryption Algorithm is a simple cipher that uses
570 Xtendend Tiny Encryption Algorithm is a modification to
571 the TEA algorithm to address a potential key weakness
572 in the TEA algorithm.
574 Xtendend Encryption Tiny Algorithm is a mis-implementation
575 of the XTEA algorithm for compatibility purposes.
582 Twofish cipher algorithm
594 Common parts of the Twofish cipher algorithm shared by the
633 ARC4 cipher algorithm
636 bits in length. This algorithm is required for driver-based
638 weakness of the algorithm.
777 AEGIS-128 AEAD algorithm
784 AEGIS-128 AEAD algorithm
834 xoring it with a salt. This algorithm is mainly useful for CTR.
846 algorithm for CBC.
929 MD4 message digest algorithm (RFC1320)
936 MD5 message digest algorithm (RFC1321), including HMAC support.
947 This algorithm is required for TKIP, but it should not be used for
948 other purposes because of the weakness of the algorithm.
983 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3), including
1064 xxHash non-cryptographic hash algorithm
1079 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1094 CRC32 CRC algorithm (IEEE 802.3)
1109 Deflate compression algorithm (RFC1951)
1120 LZO compression algorithm
1131 842 compression algorithm by IBM
1142 LZ4 compression algorithm
1153 LZ4 high compression mode algorithm
1164 zstd compression algorithm
1179 This uses the AES cipher algorithm.
1213 This uses the AES cipher algorithm with the counter block mode.
1390 (Cryptographic Algorithm Validation Program) testing: