/linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
H A D | crypto6.json | 119 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC… 126 …cycles when the ECC coprocessor is busy performing the elliptic-curve cryptography (ECC) functions… 133 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC… 140 … counts the total number of CPU cycles blocked for the elliptic-curve cryptography (ECC) functions…
|
/linux/tools/perf/pmu-events/arch/s390/cf_z15/ |
H A D | crypto6.json | 119 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC… 126 …cycles when the ECC coprocessor is busy performing the elliptic-curve cryptography (ECC) functions… 133 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC… 140 … counts the total number of CPU cycles blocked for the elliptic-curve cryptography (ECC) functions…
|
/linux/Documentation/devicetree/bindings/crypto/ |
H A D | intel,keembay-ocs-ecc.yaml | 15 Cryptography (ECC) device provides hardware acceleration for elliptic curve 16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/ |
H A D | Kconfig | 149 Build support for MACsec cryptography-offload acceleration in the NIC. 157 Build support for IPsec cryptography-offload acceleration in the NIC. 165 Build support for TLS cryptography-offload acceleration in the NIC.
|
/linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/ |
H A D | kconfig.rst | 67 | Enables :ref:`IPSec XFRM cryptography-offload acceleration <xfrm_device>`. 72 | Build support for MACsec cryptography-offload acceleration in the NIC. 83 | TLS cryptography-offload acceleration.
|
/linux/Documentation/crypto/ |
H A D | asymmetric-keys.rst | 4 Asymmetric / Public-key Cryptography Key Type 22 public-key cryptography, without imposing any particular restrictions on the 23 form or mechanism of the cryptography or form of the key. 92 Three enums are defined there for representing public-key cryptography
|
/linux/include/keys/ |
H A D | asymmetric-parser.h | 2 /* Asymmetric public-key cryptography data parser
|
H A D | asymmetric-subtype.h | 2 /* Asymmetric public-key cryptography key subtype
|
H A D | asymmetric-type.h | 2 /* Asymmetric Public-key cryptography key type interface
|
/linux/drivers/crypto/caam/ |
H A D | pkc_desc.c | 3 * caam - Freescale FSL CAAM support for Public Key Cryptography descriptors
|
H A D | Kconfig | 137 bool "Register public key cryptography implementations with Crypto API"
|
H A D | caampkc.h | 3 * caam - Freescale FSL CAAM support for Public Key Cryptography descriptors
|
/linux/drivers/crypto/intel/keembay/ |
H A D | Kconfig | 51 Elliptic Curve Cryptography (ECC) hardware acceleration for use with
|
/linux/Documentation/security/keys/ |
H A D | ecryptfs.rst | 13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
|
/linux/arch/riscv/crypto/ |
H A D | sm4-riscv64-zvksed-zvkb.S | 44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
|
H A D | sm3-riscv64-zvksh-zvkb.S | 44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
|
H A D | aes-riscv64-zvkned-zvkb.S | 43 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
|
H A D | sha512-riscv64-zvknhb-zvkb.S | 44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
|
H A D | sha256-riscv64-zvknha_or_zvknhb-zvkb.S | 44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
|
H A D | chacha-riscv64-zvkb.S | 42 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
|
/linux/arch/s390/include/asm/ |
H A D | ctlreg.h | 203 unsigned long ccc : 1; /* Cryptography counter control */
|
H A D | lowcore.h | 208 /* Cryptography-counter designation */
|
/linux/include/linux/ |
H A D | key.h | 257 * - this is used to hold the data actually used in cryptography or
|
/linux/crypto/ |
H A D | ecc.c | 580 * A. Menezes, P. van Oorschot, S. Vanstone. Handbook of Applied Cryptography. 585 * Handbook of Elliptic and Hyperelliptic Curve Cryptography. 931 * from "Recommendations for Discrete Logarithm-Based Cryptography:
|
/linux/Documentation/driver-api/dmaengine/ |
H A D | provider.rst | 89 cryptography, etc., basically any memory to memory operation.
|