Lines Matching refs:algorithm

145 	tristate "Cryptographic algorithm manager"
163 tristate "Userspace cryptographic algorithm configuration"
175 algorithm registration.
206 This converts an arbitrary crypto algorithm into a parallel
207 algorithm that executes in kernel threads.
216 converts an arbitrary synchronous software crypto algorithm
217 into an asynchronous algorithm that executes in a kernel thread.
257 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
264 DH (Diffie-Hellman) key exchange algorithm
288 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
372 Anubis cipher algorithm
385 ARIA cipher algorithm (RFC5794)
387 ARIA is a standard encryption algorithm of the Republic of Korea.
394 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
401 Blowfish cipher algorithm, by Bruce Schneier
412 Common parts of the Blowfish cipher algorithm shared by the
439 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
446 CAST6 (CAST-256) encryption algorithm (RFC2612)
462 FCrypt algorithm used by RxRPC
471 Khazad cipher algorithm
474 an algorithm optimized for 64-bit processors with good performance
485 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
489 national standard encryption algorithm of the Republic of Korea.
492 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
499 Serpent cipher algorithm, by Anderson, Biham & Knudsen
548 the TEA algorithm to address a potential key weakness
549 in the TEA algorithm.
552 of the XTEA algorithm for compatibility purposes.
559 Twofish cipher algorithm
571 Common parts of the Twofish cipher algorithm shared by the
609 ARC4 cipher algorithm
612 bits in length. This algorithm is required for driver-based
614 weakness of the algorithm.
752 AEGIS-128 AEAD algorithm
759 AEGIS-128 AEAD algorithm
811 xoring it with a salt. This algorithm is mainly useful for CTR.
823 algorithm for CBC.
906 MD4 message digest algorithm (RFC1320)
912 MD5 message digest algorithm (RFC1321)
923 This algorithm is required for TKIP, but it should not be used for
924 other purposes because of the weakness of the algorithm.
941 Poly1305 authenticator algorithm (RFC7539)
943 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
970 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)
1050 xxHash non-cryptographic hash algorithm
1065 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1080 CRC32 CRC algorithm (IEEE 802.3)
1089 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
1091 CRC algorithm used by the SCSI Block Commands standard.
1094 tristate "CRC64 based on Rocksoft Model algorithm"
1098 CRC64 CRC algorithm based on the Rocksoft Model CRC Algorithm
1115 Deflate compression algorithm (RFC1951)
1126 LZO compression algorithm
1137 842 compression algorithm by IBM
1148 LZ4 compression algorithm
1159 LZ4 high compression mode algorithm
1170 zstd compression algorithm
1185 This uses the AES cipher algorithm.
1219 This uses the AES cipher algorithm with the counter block mode.