Lines Matching refs:algorithm
138 tristate "Cryptographic algorithm manager"
154 tristate "Userspace cryptographic algorithm configuration"
166 algorithm registration.
197 This converts an arbitrary crypto algorithm into a parallel
198 algorithm that executes in kernel threads.
207 converts an arbitrary synchronous software crypto algorithm
208 into an asynchronous algorithm that executes in a kernel thread.
247 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
254 DH (Diffie-Hellman) key exchange algorithm
278 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
315 SM2 (ShangMi 2) public key algorithm
380 Anubis cipher algorithm
393 ARIA cipher algorithm (RFC5794)
395 ARIA is a standard encryption algorithm of the Republic of Korea.
402 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
409 Blowfish cipher algorithm, by Bruce Schneier
420 Common parts of the Blowfish cipher algorithm shared by the
447 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
454 CAST6 (CAST-256) encryption algorithm (RFC2612)
470 FCrypt algorithm used by RxRPC
479 Khazad cipher algorithm
482 an algorithm optimized for 64-bit processors with good performance
493 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
497 national standard encryption algorithm of the Republic of Korea.
500 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
507 Serpent cipher algorithm, by Anderson, Biham & Knudsen
556 the TEA algorithm to address a potential key weakness
557 in the TEA algorithm.
560 of the XTEA algorithm for compatibility purposes.
567 Twofish cipher algorithm
579 Common parts of the Twofish cipher algorithm shared by the
617 ARC4 cipher algorithm
620 bits in length. This algorithm is required for driver-based
622 weakness of the algorithm.
791 AEGIS-128 AEAD algorithm
798 AEGIS-128 AEAD algorithm
847 xoring it with a salt. This algorithm is mainly useful for CTR.
862 algorithm for CBC.
945 MD4 message digest algorithm (RFC1320)
951 MD5 message digest algorithm (RFC1321)
962 This algorithm is required for TKIP, but it should not be used for
963 other purposes because of the weakness of the algorithm.
980 Poly1305 authenticator algorithm (RFC7539)
982 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
1009 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)
1068 VMAC is a message authentication algorithm designed for
1099 xxHash non-cryptographic hash algorithm
1114 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1129 CRC32 CRC algorithm (IEEE 802.3)
1137 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
1139 CRC algorithm used by the SCSI Block Commands standard.
1142 tristate "CRC64 based on Rocksoft Model algorithm"
1146 CRC64 CRC algorithm based on the Rocksoft Model CRC Algorithm
1163 Deflate compression algorithm (RFC1951)
1174 LZO compression algorithm
1185 842 compression algorithm by IBM
1196 LZ4 compression algorithm
1207 LZ4 high compression mode algorithm
1218 zstd compression algorithm
1233 This uses the AES cipher algorithm.
1267 This uses the AES cipher algorithm with the counter block mode.