/linux/crypto/ |
H A D | Kconfig | 3 # Generic algorithms support 61 This option provides the API for cryptographic algorithms. 184 registration time if algorithms are dynamically loaded later. 208 tristate "Null algorithms" 213 These are 'Null' algorithms, used by IPsec, which do nothing. 265 algorithms in the kernel. It should not be enabled in production 344 One of the Russian cryptographic standard algorithms (called GOST 345 algorithms). Only signature verification is implemented. 356 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3) 374 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3) [all …]
|
/linux/Documentation/admin-guide/blockdev/ |
H A D | zram.rst | 80 currently selected (shown in square brackets) compression algorithms, 86 #show supported compression algorithms 94 algorithms that are supported by zram. 99 Compression algorithms may support specific parameters which can be 103 For example, several compression algorithms support `level` parameter. 104 In addition, certain compression algorithms support pre-trained dictionaries, 105 which significantly change algorithms' characteristics. In order to configure 120 Parameters are algorithm specific: not all algorithms support pre-trained 121 dictionaries, not all algorithms support `level`. Furthermore, for certain 122 algorithms `level` controls the compression level (the higher the value the [all …]
|
/linux/Documentation/crypto/ |
H A D | api-intro.rst | 23 At the lowest level are algorithms, which register dynamically with the 28 abstraction to the underlying algorithms. However, at the user 35 [algorithm api] (for registering algorithms) 100 Adding New Algorithms 112 Algorithms submitted must also be generally patent-free (e.g. IDEA 117 Also check for any RFCs which may relate to the use of specific algorithms, 119 Cipher Algorithms"). 188 Original developers of the crypto algorithms:
|
H A D | devel-algos.rst | 1 Developing Cipher Algorithms 40 successfully registered all the given algorithms; if it fails partway 44 return value. Don't try to unregister algorithms that aren't 111 The registration of multi-block cipher algorithms is one of the most
|
H A D | intro.rst | 18 The kernel crypto API refers to all algorithms as "transformations". 34 transformations (such as CRC or even compression algorithms) that can
|
/linux/net/ipv6/ |
H A D | Kconfig | 57 AH can be used with various authentication algorithms. Besides 59 implementations of the algorithms that RFC 8221 lists as MUST be 60 implemented. If you need any other algorithms, you'll need to enable 62 implementations of any needed algorithms when available. 72 ESP can be used with various encryption and authentication algorithms. 74 implementations of the algorithms that RFC 8221 lists as MUST be 75 implemented. If you need any other algorithms, you'll need to enable 77 implementations of any needed algorithms when available.
|
/linux/arch/x86/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (x86)" 13 Block cipher: AES cipher algorithms 42 Block cipher: Camellia cipher algorithms 184 Length-preserving ciphers: SM4 cipher algorithms 205 Length-preserving ciphers: SM4 cipher algorithms 279 Length-preserving cipher: ARIA cipher algorithms 297 Length-preserving cipher: ARIA cipher algorithms 316 Length-preserving cipher: ARIA cipher algorithms
|
/linux/arch/s390/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (s390)" 9 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202) 19 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202) 40 Block cipher: AES cipher algorithms (FIPS 197)
|
/linux/arch/sparc/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (sparc64)" 24 Block ciphers: AES cipher algorithms (FIPS-197) 35 Block ciphers: Camellia cipher algorithms
|
/linux/Documentation/filesystems/ |
H A D | btrfs.rst | 21 * Checksums on data and metadata (multiple algorithms available) 22 * Compression (multiple algorithms available) 26 * Integrated multiple device support, with several raid algorithms
|
/linux/fs/crypto/ |
H A D | Kconfig | 17 # allows the algorithms to be built as modules when all the filesystems are, 20 # Note: this option only pulls in the algorithms that filesystem encryption 26 # algorithms, not any per-architecture optimized implementations. It is
|
/linux/arch/arm/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (arm)" 57 Block ciphers: AES cipher algorithms (FIPS-197) 77 Length-preserving ciphers: AES cipher algorithms (FIPS-197) 104 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
|
/linux/drivers/crypto/hisilicon/ |
H A D | Kconfig | 36 It provides AES, SM4, and 3DES algorithms with ECB 37 CBC, and XTS cipher mode, and AEAD algorithms. 75 accelerator, which can accelerate RSA and DH algorithms.
|
/linux/arch/powerpc/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (powerpc)" 10 Block ciphers: AES cipher algorithms (FIPS-197) 36 AEAD cipher: AES cipher algorithms (FIPS-197)
|
/linux/drivers/crypto/intel/keembay/ |
H A D | Kconfig | 73 sm3, as well as the HMAC variant of these algorithms. 84 Enables support for sha224 and hmac(sha224) algorithms in the Intel 86 algorithms.
|
/linux/drivers/crypto/allwinner/ |
H A D | Kconfig | 22 and SHA1 and MD5 hash algorithms. 79 Say y to enable support for hash algorithms. 139 Say y to enable support for hash algorithms.
|
/linux/include/linux/ |
H A D | crc8.h | 46 * regular bit order (lsb first). Polynomials in CRC algorithms are typically 64 * reverse bit order (msb first). Polynomials in CRC algorithms are typically 95 * "A Painless Guide to CRC Error Detection Algorithms", ver 3, Aug 1993
|
/linux/Documentation/devicetree/bindings/crypto/ |
H A D | nvidia,tegra234-se-aes.yaml | 7 title: NVIDIA Tegra Security Engine for AES algorithms 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
|
/linux/arch/riscv/crypto/ |
H A D | Kconfig | 3 menu "Accelerated Cryptographic Algorithms for CPU (riscv)" 12 Block cipher: AES cipher algorithms
|
/linux/net/ipv4/ |
H A D | Kconfig | 346 AH can be used with various authentication algorithms. Besides 348 implementations of the algorithms that RFC 8221 lists as MUST be 349 implemented. If you need any other algorithms, you'll need to enable 351 implementations of any needed algorithms when available. 361 ESP can be used with various encryption and authentication algorithms. 363 implementations of the algorithms that RFC 8221 lists as MUST be 364 implemented. If you need any other algorithms, you'll need to enable 366 implementations of any needed algorithms when available.
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-driver-uacce | 40 What: /sys/class/uacce/<dev_name>/algorithms 44 Description: Algorithms supported by this accelerator, separated by new line.
|
H A D | ima_policy | 75 appraise_algos:= comma-separated list of hash algorithms 78 of these two algorithms. 160 restricts the hash algorithms allowed when writing to the
|
/linux/Documentation/locking/ |
H A D | pi-futex.rst | 33 technique that often cannot be replaced with lockless algorithms. As we 38 algorithms often endangers to ability to do robust reviews of said code. 40 data structures, instead of lockless algorithms. Furthermore, there are
|
/linux/Documentation/userspace-api/media/ |
H A D | glossary.rst | 110 A specialized processor that implements a set of algorithms for 111 processing image data. ISPs may implement algorithms for lens 114 algorithms (e.g. automatic exposure, white balance and focus).
|
/linux/fs/verity/ |
H A D | hash_algs.c | 3 * fs-verity hash algorithms 10 /* The hash algorithms supported by fs-verity */ 157 * Sanity check the hash algorithms (could be a build-time check, but in fsverity_check_hash_algs()
|