Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 1689) sorted by relevance

12345678910>>...68

/linux/crypto/
H A DKconfig145 tristate "Cryptographic algorithm manager"
163 tristate "Userspace cryptographic algorithm configuration"
175 algorithm registration.
206 This converts an arbitrary crypto algorithm into a parallel
207 algorithm that executes in kernel threads.
216 converts an arbitrary synchronous software crypto algorithm
217 into an asynchronous algorithm that executes in a kernel thread.
256 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
263 DH (Diffie-Hellman) key exchange algorithm
287 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
[all …]
/linux/include/linux/
H A Dcrypto.h21 * Algorithm masks and types.
47 * Set if the algorithm (or an algorithm which it uses) requires another
48 * algorithm of the same type to handle corner cases.
53 * Set if the algorithm has passed automated run-time testing. Note that
54 * if there is no run-time testing for a given algorithm it is considered
61 * Set if the algorithm is an instance that is built from templates.
65 /* Set this bit if the algorithm provided is hardware accelerated but
77 * Set if the algorithm has a ->setkey() method but can be used without
88 * The algorithm may allocate memory during request processing, i.e. during
89 * encryption, decryption, or hashing. Users can request an algorithm with this
[all …]
H A Ddim.h24 * Causes a moderation of the algorithm run.
131 * @state: Algorithm state (see below)
139 * @tune_state: Algorithm tuning state (see below)
173 * enum dim_state - DIM algorithm states
175 * These will determine if the algorithm is in a valid state to start an iteration.
178 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if
189 * enum dim_tune_state - DIM algorithm tune states
191 * These will determine which action the algorithm should perform.
193 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference
194 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0
[all …]
/linux/net/batman-adv/
H A Dbat_algo.c28 * batadv_algo_init() - Initialize batman-adv algorithm management data
37 * batadv_algo_get() - Search for algorithm with specific name
38 * @name: algorithm name to find
58 * batadv_algo_register() - Register callbacks for a mesh algorithm
59 * @bat_algo_ops: mesh algorithm callbacks to add
69 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register()
93 * batadv_algo_select() - Select algorithm of soft interface
95 * @name: name of the algorithm to select
97 * The algorithm callbacks for the soft interface will be set when the algorithm
98 * with the correct name was found. Any previous selected algorithm will not be
[all …]
/linux/Documentation/crypto/
H A Dapi-intro.rst35 [algorithm api] (for registering algorithms)
37 The idea is to make the user interface and algorithm registration API
103 When submitting a new algorithm for inclusion, a mandatory requirement
204 SHA1 algorithm contributors:
207 DES algorithm contributors:
212 Blowfish algorithm contributors:
216 Twofish algorithm contributors:
220 SHA256/384/512 algorithm contributors:
225 AES algorithm contributors:
233 CAST5 algorithm contributors:
[all …]
/linux/include/crypto/
H A Dakcipher.h48 * @reqsize: Request context size required by algorithm implementation
49 * @base: Common crypto API algorithm data structure
58 * struct akcipher_alg - generic public key algorithm
61 * algorithm. In case of error, where the dst_len was insufficient,
65 * public key algorithm, returning verification status. Requires
68 * algorithm. In case of error, where the dst_len was insufficient,
72 * algorithm. In case of error, where the dst_len was insufficient,
75 * @set_pub_key: Function invokes the algorithm specific set public key
78 * @set_priv_key: Function invokes the algorithm specific set private key
94 * @base: Common crypto API algorithm data structure
[all …]
H A Dsig.h3 * Public Key Signature Algorithm
16 * @base: Common crypto API algorithm data structure
32 * signing algorithm e.g. "ecdsa"
33 * @type: specifies the type of the algorithm
34 * @mask: specifies the mask for the algorithm
36 * Allocate a handle for public key signature algorithm. The returned struct
77 * Function invokes the specific signing operation for a given algorithm
95 * for a given algorithm.
112 * Function invokes the algorithm specific set key function, which knows
128 * Function invokes the algorithm specific set key function, which knows
H A Dacompress.h47 * algorithm
49 * @base: Common crypto API algorithm data structure
74 * compression algorithm e.g. "deflate"
75 * @type: specifies the type of the algorithm
76 * @mask: specifies the mask for the algorithm
78 * Allocate a handle for a compression algorithm. The returned struct
90 * compression algorithm e.g. "deflate"
91 * @type: specifies the type of the algorithm
92 * @mask: specifies the mask for the algorithm
95 * Allocate a handle for a compression algorithm. Drivers should try to use
[all …]
H A Dkpp.h44 * @reqsize: Request context size required by algorithm
46 * @base: Common crypto API algorithm data structure
65 * the algorithm. The result is given back to the user.
75 * @base: Common crypto API algorithm data structure
94 * The KPP API is used with the algorithm type
100 * @alg_name: is the name of the kpp algorithm (e.g. "dh", "ecdh")
101 * @type: specifies the type of the algorithm
102 * @mask: specifies the mask for the algorithm
104 * Allocate a handle for kpp algorithm. The returned struct crypto_kpp
300 * for a given kpp algorithm.
[all …]
/linux/arch/x86/crypto/
H A DKconfig11 Curve25519 algorithm
34 Some algorithm implementations are supported only in 64-bit builds,
44 Block cipher: Blowfish cipher algorithm
94 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm
112 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm
127 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
142 Length-preserving ciphers: Serpent cipher algorithm
158 Length-preserving ciphers: Serpent cipher algorithm
175 Length-preserving ciphers: Serpent cipher algorithm
188 Length-preserving ciphers: Serpent cipher algorithm
[all …]
/linux/include/crypto/internal/
H A Dscompress.h24 * struct scomp_alg - synchronous compression algorithm
26 * @alloc_ctx: Function allocates algorithm specific context
30 * @base: Common crypto API algorithm data structure
31 * @calg: Cmonn algorithm data structure shared with acomp
102 * crypto_register_scomp() -- Register synchronous compression algorithm
105 * compression algorithm
107 * @alg: algorithm definition
114 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm
117 * compression algorithm
119 * @alg: algorithm definition
H A Dkpp.h32 * struct crypto_kpp_spawn - KPP algorithm spawn
35 * Template instances can get a hold on some inner KPP algorithm by
150 * KPP algorithm (un)registration functions.
153 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm
156 * algorithm
158 * @alg: algorithm definition
166 * algorithm
169 * algorithm
171 * @alg: algorithm definition
188 * crypto_grab_kpp() - Look up a KPP algorithm and bind a spawn to it.
[all …]
H A Dakcipher.h125 * crypto_register_akcipher() -- Register public key algorithm
127 * Function registers an implementation of a public key verify algorithm
129 * @alg: algorithm definition
136 * crypto_unregister_akcipher() -- Unregister public key algorithm
138 * Function unregisters an implementation of a public key verify algorithm
140 * @alg: algorithm definition
147 * Function registers an implementation of an asymmetric key algorithm
150 * @tmpl: the template from which the algorithm was created
/linux/Documentation/networking/
H A Dnet_dim.rst21 processing. The mechanism includes an algorithm which decides if and how to
24 iteration of the algorithm, it analyses a given sample of the data, compares it
30 the algorithm might decide not to change anything. The configuration fields are
32 number of wanted packets per event. The Net DIM algorithm ascribes importance to
36 Net DIM Algorithm
39 Each iteration of the Net DIM algorithm follows these steps:
54 compared. Here the algorithm tries to optimize for lower interrupt rate so an
62 and the internal state of the algorithm. The states reflect the "direction" of
63 the algorithm: is it going left (reducing moderation), right (increasing
66 algorithm would increase in order to reduce calculation overhead. Also, after
[all …]
/linux/net/netfilter/ipvs/
H A DKconfig118 The robin-robin scheduling algorithm simply directs network
127 The weighted robin-robin scheduling algorithm directs network
140 The least-connection scheduling algorithm directs network
150 The weighted least-connection scheduling algorithm directs network
160 The weighted failover scheduling algorithm directs network
170 The weighted overflow scheduling algorithm directs network
181 The locality-based least-connection scheduling algorithm is for
183 This algorithm usually directs packet destined for an IP address to
196 algorithm is also for destination IP load balancing. It is
213 The destination hashing scheduling algorithm assigns network
[all …]
/linux/Documentation/admin-guide/blockdev/
H A Dzram.rst88 3) Select compression algorithm
93 or change the selected compression algorithm (once the device is initialised
94 there is no way to change compression algorithm).
102 #select lzo compression algorithm
108 4) Set compression algorithm parameters: Optional
113 attribute which provides a per-algorithm params configuration.
118 compression algorithm to use external pre-trained dictionary, pass full
124 #same, but using algorithm priority
132 Parameters are algorithm specific: not all algorithms support pre-trained
231 comp_algorithm RW show and change the compression algorithm
[all …]
/linux/fs/verity/
H A Dhash_algs.c31 * fsverity_get_hash_alg() - validate and prepare a hash algorithm
33 * @num: the hash algorithm number
35 * Get the struct fsverity_hash_alg for the given hash algorithm number, and
51 fsverity_warn(inode, "Unknown hash algorithm number: %u", num); in fsverity_get_hash_alg()
69 "Missing crypto API support for hash algorithm \"%s\"", in fsverity_get_hash_alg()
75 "Error allocating hash algorithm \"%s\": %ld", in fsverity_get_hash_alg()
104 * @alg: hash algorithm
131 * algorithm's compression function, e.g. 64 bytes for SHA-256 or 128 in fsverity_prepare_hash_state()
132 * bytes for SHA-512. This ensures that the hash algorithm won't have in fsverity_prepare_hash_state()
202 * @alg: the hash algorithm to use
[all …]
/linux/net/sched/
H A DKconfig52 packet scheduling algorithm. See
57 different properties and different algorithm.
66 (HFSC) packet scheduling algorithm.
93 packet scheduling algorithm.
104 packet scheduling algorithm.
115 packet scheduling algorithm.
126 scheduling algorithm. This queueing discipline allows the combination
138 scheduling algorithm.
149 scheduling algorithm.
160 scheduling algorithm.
[all …]
/linux/arch/arm/crypto/
H A DKconfig11 Curve25519 algorithm
52 Poly1305 authenticator algorithm (RFC7539)
80 BLAKE2b digest algorithm optimized with ARM NEON instructions.
91 SHA-1 secure hash algorithm (FIPS 180)
102 SHA-1 secure hash algorithm (FIPS 180)
113 SHA-1 secure hash algorithm (FIPS 180)
231 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
232 and CRC32 CRC algorithm (IEEE 802.3)
245 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
/linux/arch/arm64/boot/dts/qcom/
H A Dsa8540p-ride.dts201 snps,dcb-algorithm;
208 snps,dcb-algorithm;
214 snps,avb-algorithm;
220 snps,avb-algorithm;
231 snps,dcb-algorithm;
235 snps,dcb-algorithm;
239 snps,avb-algorithm;
247 snps,avb-algorithm;
278 snps,dcb-algorithm;
285 snps,dcb-algorithm;
[all …]
/linux/arch/powerpc/crypto/
H A DKconfig11 Curve25519 algorithm
22 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
34 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
54 MD5 message digest algorithm (RFC1321)
62 SHA-1 secure hash algorithm (FIPS 180)
70 SHA-1 secure hash algorithm (FIPS 180)
146 Poly1305 authenticator algorithm (RFC7539)
/linux/lib/
H A Dtextsearch.c27 * | | Algorithm | |
39 * the search parameters such as the pattern and algorithm name.
40 * (2) Core requests the algorithm to allocate and initialize a search
44 * is provided to the algorithm to store persistent variables.
46 * request to the algorithm.
47 * (5) Algorithm calls get_next_block() provided by the user continuously
49 * (6) Algorithm invokes finish() after the last call to get_next_block
52 * (8) Core notifies the algorithm to destroy algorithm specific
58 * by calling textsearch_prepare() specifying the searching algorithm,
61 * performance of algorithm, so you should use it at own your risk.
[all …]
/linux/Documentation/devicetree/bindings/sound/
H A Dcs35l33.txt43 Optional H/G Algorithm sub-node:
46 the internal H/G Algorithm.
48 - cirrus,hg-algo : Sub-node for internal Class H/G algorithm that
53 - cirrus,mem-depth : Memory depth for the Class H/G algorithm measured in
67 algorithm uses the max detection path. If not present, the LDO
71 algorithm switches to the LDO voltage. This property can be set to values
78 - cirrus,vp-hg : Class H/G algorithm VPhg. Controls the H/G algorithm's
/linux/Documentation/ABI/testing/
H A Dsysfs-bus-iio-adc-mcp356422 auto-zeroing algorithm (the input multiplexer and the ADC
23 include an offset cancellation algorithm that cancels the offset
24 contribution of the ADC). When the offset cancellation algorithm
28 case where the algorithm is disabled. This technique allows the
41 This attribute is used to enable the chopping algorithm for the
48 limitation, the buffer includes an auto-zeroing algorithm that
/linux/arch/sparc/crypto/
H A DKconfig12 Block cipher: DES (FIPS 46-2) cipher algorithm
13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
25 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
35 MD5 message digest algorithm (RFC1321)
45 SHA-1 secure hash algorithm (FIPS 180)

12345678910>>...68