/linux/crypto/ |
H A D | Kconfig | 170 tristate "Userspace cryptographic algorithm configuration" 183 The cryptographic self-tests run at boot time, or at algorithm 200 Enable the full set of cryptographic self-tests for each algorithm. 222 This converts an arbitrary crypto algorithm into a parallel 223 algorithm that executes in kernel threads. 232 converts an arbitrary synchronous software crypto algorithm 233 into an asynchronous algorithm that executes in a kernel thread. 287 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) 294 DH (Diffie-Hellman) key exchange algorithm 318 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm [all …]
|
/linux/net/batman-adv/ |
H A D | bat_algo.c | 28 * batadv_algo_init() - Initialize batman-adv algorithm management data 37 * batadv_algo_get() - Search for algorithm with specific name 38 * @name: algorithm name to find 58 * batadv_algo_register() - Register callbacks for a mesh algorithm 59 * @bat_algo_ops: mesh algorithm callbacks to add 69 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register() 93 * batadv_algo_select() - Select algorithm of mesh interface 95 * @name: name of the algorithm to select 97 * The algorithm callbacks for the mesh interface will be set when the algorithm 98 * with the correct name was found. Any previous selected algorithm will not be [all …]
|
/linux/Documentation/crypto/ |
H A D | api-intro.rst | 35 [algorithm api] (for registering algorithms) 37 The idea is to make the user interface and algorithm registration API 103 When submitting a new algorithm for inclusion, a mandatory requirement 204 SHA1 algorithm contributors: 207 DES algorithm contributors: 212 Blowfish algorithm contributors: 216 Twofish algorithm contributors: 220 SHA256/384/512 algorithm contributors: 225 AES algorithm contributors: 233 CAST5 algorithm contributors: [all …]
|
/linux/net/netfilter/ipvs/ |
H A D | Kconfig | 118 The robin-robin scheduling algorithm simply directs network 127 The weighted robin-robin scheduling algorithm directs network 140 The least-connection scheduling algorithm directs network 150 The weighted least-connection scheduling algorithm directs network 160 The weighted failover scheduling algorithm directs network 170 The weighted overflow scheduling algorithm directs network 181 The locality-based least-connection scheduling algorithm is for 183 This algorithm usually directs packet destined for an IP address to 196 algorithm is also for destination IP load balancing. It is 213 The destination hashing scheduling algorithm assigns network [all …]
|
/linux/include/crypto/internal/ |
H A D | kpp.h | 32 * struct crypto_kpp_spawn - KPP algorithm spawn 35 * Template instances can get a hold on some inner KPP algorithm by 150 * KPP algorithm (un)registration functions. 153 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm 156 * algorithm 158 * @alg: algorithm definition 166 * algorithm 169 * algorithm 171 * @alg: algorithm definition 188 * crypto_grab_kpp() - Look up a KPP algorithm and bind a spawn to it. [all …]
|
/linux/Documentation/admin-guide/blockdev/ |
H A D | zram.rst | 76 2) Select compression algorithm 81 or change the selected compression algorithm (once the device is initialised 82 there is no way to change compression algorithm). 90 #select lzo compression algorithm 96 3) Set compression algorithm parameters: Optional 101 attribute which provides a per-algorithm params configuration. 106 compression algorithm to use external pre-trained dictionary, pass full 112 #same, but using algorithm priority 120 Parameters are algorithm specific: not all algorithms support pre-trained 217 comp_algorithm RW show and change the compression algorithm [all …]
|
/linux/fs/verity/ |
H A D | hash_algs.c | 31 * fsverity_get_hash_alg() - validate and prepare a hash algorithm 33 * @num: the hash algorithm number 35 * Get the struct fsverity_hash_alg for the given hash algorithm number, and 51 fsverity_warn(inode, "Unknown hash algorithm number: %u", num); in fsverity_get_hash_alg() 69 "Missing crypto API support for hash algorithm \"%s\"", in fsverity_get_hash_alg() 75 "Error allocating hash algorithm \"%s\": %ld", in fsverity_get_hash_alg() 104 * @alg: hash algorithm 131 * algorithm's compression function, e.g. 64 bytes for SHA-256 or 128 in fsverity_prepare_hash_state() 132 * bytes for SHA-512. This ensures that the hash algorithm won't have in fsverity_prepare_hash_state() 202 * @alg: the hash algorithm to use [all …]
|
/linux/net/sched/ |
H A D | Kconfig | 52 packet scheduling algorithm. See 57 different properties and different algorithm. 66 (HFSC) packet scheduling algorithm. 93 packet scheduling algorithm. 104 packet scheduling algorithm. 115 packet scheduling algorithm. 126 scheduling algorithm. This queueing discipline allows the combination 138 scheduling algorithm. 149 scheduling algorithm. 160 scheduling algorithm. [all …]
|
/linux/arch/arm64/boot/dts/qcom/ |
H A D | sa8540p-ride.dts | 200 snps,dcb-algorithm; 207 snps,dcb-algorithm; 213 snps,avb-algorithm; 219 snps,avb-algorithm; 229 snps,dcb-algorithm; 233 snps,dcb-algorithm; 237 snps,avb-algorithm; 245 snps,avb-algorithm; 275 snps,dcb-algorithm; 282 snps,dcb-algorithm; [all …]
|
H A D | sa8775p-ride.dtsi | 387 snps,dcb-algorithm; 394 snps,dcb-algorithm; 400 snps,avb-algorithm; 406 snps,avb-algorithm; 416 snps,dcb-algorithm; 420 snps,dcb-algorithm; 424 snps,avb-algorithm; 432 snps,avb-algorithm; 455 snps,dcb-algorithm; 462 snps,dcb-algorithm; [all …]
|
H A D | qcs8300-ride.dts | 244 snps,dcb-algorithm; 251 snps,dcb-algorithm; 257 snps,avb-algorithm; 263 snps,avb-algorithm; 273 snps,dcb-algorithm; 277 snps,dcb-algorithm; 281 snps,avb-algorithm; 289 snps,avb-algorithm;
|
/linux/lib/ |
H A D | textsearch.c | 27 * | | Algorithm | | 39 * the search parameters such as the pattern and algorithm name. 40 * (2) Core requests the algorithm to allocate and initialize a search 44 * is provided to the algorithm to store persistent variables. 46 * request to the algorithm. 47 * (5) Algorithm calls get_next_block() provided by the user continuously 49 * (6) Algorithm invokes finish() after the last call to get_next_block 52 * (8) Core notifies the algorithm to destroy algorithm specific 58 * by calling textsearch_prepare() specifying the searching algorithm, 61 * performance of algorithm, so you should use it at own your risk. [all …]
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-iio-adc-mcp3564 | 22 auto-zeroing algorithm (the input multiplexer and the ADC 23 include an offset cancellation algorithm that cancels the offset 24 contribution of the ADC). When the offset cancellation algorithm 28 case where the algorithm is disabled. This technique allows the 41 This attribute is used to enable the chopping algorithm for the 48 limitation, the buffer includes an auto-zeroing algorithm that
|
/linux/Documentation/devicetree/bindings/sound/ |
H A D | cs35l33.txt | 43 Optional H/G Algorithm sub-node: 46 the internal H/G Algorithm. 48 - cirrus,hg-algo : Sub-node for internal Class H/G algorithm that 53 - cirrus,mem-depth : Memory depth for the Class H/G algorithm measured in 67 algorithm uses the max detection path. If not present, the LDO 71 algorithm switches to the LDO voltage. This property can be set to values 78 - cirrus,vp-hg : Class H/G algorithm VPhg. Controls the H/G algorithm's
|
H A D | cs35l35.txt | 69 Optional H/G Algorithm sub-node: 72 that will disable automatic control of the internal H/G Algorithm. 75 or using these Class H Algorithm controls over the internal Algorithm. 78 - cirrus,classh-internal-algo : Sub-node for the Internal Class H Algorithm 79 See Section 4.3 Internal Class H Algorithm in the Datasheet. 80 If not used, the device manages the ClassH Algorithm internally.
|
/linux/include/crypto/ |
H A D | kpp.h | 44 * @reqsize: Request context size required by algorithm 46 * @base: Common crypto API algorithm data structure 65 * the algorithm. The result is given back to the user. 75 * @base: Common crypto API algorithm data structure 94 * The KPP API is used with the algorithm type 100 * @alg_name: is the name of the kpp algorithm (e.g. "dh", "ecdh") 101 * @type: specifies the type of the algorithm 102 * @mask: specifies the mask for the algorithm 104 * Allocate a handle for kpp algorithm. The returned struct crypto_kpp 300 * for a given kpp algorithm. [all …]
|
/linux/arch/arm64/boot/dts/freescale/ |
H A D | imx8mp-beacon-som.dtsi | 76 snps,dcb-algorithm; 82 snps,dcb-algorithm; 88 snps,dcb-algorithm; 94 snps,dcb-algorithm; 100 snps,dcb-algorithm; 110 snps,dcb-algorithm; 115 snps,dcb-algorithm; 120 snps,dcb-algorithm; 125 snps,dcb-algorithm; 130 snps,dcb-algorithm;
|
/linux/drivers/crypto/caam/ |
H A D | key_gen.h | 10 * split_key_len - Compute MDHA split key length for a given algorithm 11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1, 28 * split_key_pad_len - Compute MDHA split key pad length for a given algorithm 29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
|
/linux/tools/perf/pmu-events/arch/x86/ivytown/ |
H A D | uncore-power.json | 151 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 160 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 169 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 178 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 187 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 196 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 205 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 214 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 223 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… 232 …ber of times that a deep C state was requested, but the delayed C state algorithm rejected the dee… [all …]
|
/linux/fs/f2fs/ |
H A D | Kconfig | 107 Support LZO compress algorithm, if unsure, say Y. 114 Support LZO-RLE compress algorithm, if unsure, say Y. 121 Support LZ4 compress algorithm, if unsure, say Y. 128 Support LZ4HC compress algorithm, LZ4HC has compatible on-disk 136 Support ZSTD compress algorithm, if unsure, say Y.
|
/linux/lib/raid6/ |
H A D | algos.c | 11 * Algorithm list and algorithm selection for RAID-6 151 pr_info("raid6: using %s recovery algorithm\n", best->name); in raid6_choose_recov() 153 pr_err("raid6: Yikes! No recovery algorithm found!\n"); in raid6_choose_recov() 200 pr_err("raid6: Yikes! No algorithm found!\n"); in raid6_choose_gen() 212 pr_info("raid6: using algorithm %s gen() %ld MB/s\n", in raid6_choose_gen() 242 /* Try to pick the best algorithm */
|
/linux/lib/math/ |
H A D | gcd.c | 7 * This implements the binary GCD algorithm. (Often attributed to Stein, 10 * This is faster than the division-based algorithm even on x86, which 16 /* If __ffs is available, the even/odd algorithm benchmarks slower. */ 49 /* If normalization is done by loops, the even/odd algorithm is a win. */
|
/linux/Documentation/admin-guide/device-mapper/ |
H A D | dm-integrity.rst | 71 the internal-hash algorithm) 133 internal_hash:algorithm(:key) (the key is optional) 139 You can use a crc algorithm (such as crc32), then integrity target 141 You can also use a hmac algorithm (for example 153 journal_crypt:algorithm(:key) (the key is optional) 154 Encrypt the journal using given algorithm to make sure that the 165 journal_mac:algorithm(:key) (the key is optional) 168 crc algorithm, to protect against malicious modification, use a 169 hmac algorithm with a key.
|
/linux/Documentation/arch/arm/ |
H A D | cluster-pm-race-avoidance.rst | 2 Cluster-wide Power-up/power-down race avoidance algorithm 5 This file documents the algorithm which is used to coordinate CPU and 9 The section "Rationale" explains what the algorithm is for and why it is 12 algorithm in use. 103 In this algorithm, each individual core in a multi-core processor is 109 The algorithm defines the following states for each CPU in the system: 187 race avoidance algorithm. 271 The race avoidance algorithm does not provide a way to determine 452 The race avoidance algorithm documented above does not provide a 517 As currently described and implemented, the algorithm does not [all …]
|
/linux/usr/ |
H A D | Kconfig | 115 This option allows you to decide by which algorithm the builtin 122 dictionary size of the algorithm with algorithms like XZ and LZMA 139 Use the old and well tested gzip compression algorithm. Gzip provides 162 This algorithm's compression ratio is best but has a large dictionary 175 XZ uses the LZMA2 algorithm and has a large dictionary which may cause 211 ZSTD is a compression algorithm targeting intermediate compression
|