Lines Matching refs:algorithm
158 tristate "Userspace cryptographic algorithm configuration"
172 The cryptographic self-tests run at boot time, or at algorithm
189 Enable the full set of cryptographic self-tests for each algorithm.
211 This converts an arbitrary crypto algorithm into a parallel
212 algorithm that executes in kernel threads.
222 converts an arbitrary synchronous software crypto algorithm
223 into an asynchronous algorithm that executes in a kernel thread.
286 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
293 DH (Diffie-Hellman) key exchange algorithm
315 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
382 Anubis cipher algorithm
395 ARIA cipher algorithm (RFC5794)
397 ARIA is a standard encryption algorithm of the Republic of Korea.
404 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
411 Blowfish cipher algorithm, by Bruce Schneier
422 Common parts of the Blowfish cipher algorithm shared by the
449 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
456 CAST6 (CAST-256) encryption algorithm (RFC2612)
472 FCrypt algorithm used by RxRPC
481 Khazad cipher algorithm
484 an algorithm optimized for 64-bit processors with good performance
495 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
499 national standard encryption algorithm of the Republic of Korea.
502 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
509 Serpent cipher algorithm, by Anderson, Biham & Knudsen
558 the TEA algorithm to address a potential key weakness
559 in the TEA algorithm.
562 of the XTEA algorithm for compatibility purposes.
569 Twofish cipher algorithm
581 Common parts of the Twofish cipher algorithm shared by the
620 ARC4 cipher algorithm
623 bits in length. This algorithm is required for driver-based
625 weakness of the algorithm.
758 AEGIS-128 AEAD algorithm
765 AEGIS-128 AEAD algorithm
814 xoring it with a salt. This algorithm is mainly useful for CTR.
826 algorithm for CBC.
901 MD4 message digest algorithm (RFC1320)
908 MD5 message digest algorithm (RFC1321), including HMAC support.
933 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3), including
1014 xxHash non-cryptographic hash algorithm
1027 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1040 CRC32 CRC algorithm (IEEE 802.3)
1053 Deflate compression algorithm (RFC1951)
1064 LZO compression algorithm
1075 842 compression algorithm by IBM
1086 LZ4 compression algorithm
1097 LZ4 high compression mode algorithm
1108 zstd compression algorithm
1145 This uses the AES cipher algorithm with the counter block mode.