Lines Matching full:algorithm

144 	tristate "Cryptographic algorithm manager"
162 tristate "Userspace cryptographic algorithm configuration"
174 algorithm registration.
205 This converts an arbitrary crypto algorithm into a parallel
206 algorithm that executes in kernel threads.
215 converts an arbitrary synchronous software crypto algorithm
216 into an asynchronous algorithm that executes in a kernel thread.
255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
262 DH (Diffie-Hellman) key exchange algorithm
286 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
290 tristate "ECDSA (Elliptic Curve Digital Signature Algorithm)"
295 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,
302 tristate "EC-RDSA (Elliptic Curve Russian Digital Signature Algorithm)"
309 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
323 SM2 (ShangMi 2) public key algorithm
388 Anubis cipher algorithm
401 ARIA cipher algorithm (RFC5794)
403 ARIA is a standard encryption algorithm of the Republic of Korea.
410 https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do
417 Blowfish cipher algorithm, by Bruce Schneier
428 Common parts of the Blowfish cipher algorithm shared by the
455 CAST5 (CAST-128) cipher algorithm (RFC2144, ISO/IEC 18033-3)
462 CAST6 (CAST-256) encryption algorithm (RFC2612)
478 FCrypt algorithm used by RxRPC
487 Khazad cipher algorithm
490 an algorithm optimized for 64-bit processors with good performance
501 SEED cipher algorithm (RFC4269, ISO/IEC 18033-3)
505 national standard encryption algorithm of the Republic of Korea.
508 See https://seed.kisa.or.kr/kisa/algorithm/EgovSeedInfo.do
515 Serpent cipher algorithm, by Anderson, Biham & Knudsen
557 TEA (Tiny Encryption Algorithm) cipher algorithms
559 Tiny Encryption Algorithm is a simple cipher that uses
563 Xtendend Tiny Encryption Algorithm is a modification to
564 the TEA algorithm to address a potential key weakness
565 in the TEA algorithm.
567 Xtendend Encryption Tiny Algorithm is a mis-implementation
568 of the XTEA algorithm for compatibility purposes.
575 Twofish cipher algorithm
587 Common parts of the Twofish cipher algorithm shared by the
625 ARC4 cipher algorithm
628 bits in length. This algorithm is required for driver-based
630 weakness of the algorithm.
799 AEGIS-128 AEAD algorithm
806 AEGIS-128 AEAD algorithm
858 xoring it with a salt. This algorithm is mainly useful for CTR.
870 algorithm for CBC.
953 MD4 message digest algorithm (RFC1320)
959 MD5 message digest algorithm (RFC1321)
970 This algorithm is required for TKIP, but it should not be used for
971 other purposes because of the weakness of the algorithm.
988 Poly1305 authenticator algorithm (RFC7539)
990 Poly1305 is an authenticator algorithm designed by Daniel J. Bernstein.
1017 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)
1076 VMAC is a message authentication algorithm designed for
1107 xxHash non-cryptographic hash algorithm
1122 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
1137 CRC32 CRC algorithm (IEEE 802.3)
1145 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)
1147 CRC algorithm used by the SCSI Block Commands standard.
1150 tristate "CRC64 based on Rocksoft Model algorithm"
1154 CRC64 CRC algorithm based on the Rocksoft Model CRC Algorithm
1171 Deflate compression algorithm (RFC1951)
1182 LZO compression algorithm
1193 842 compression algorithm by IBM
1204 LZ4 compression algorithm
1215 LZ4 high compression mode algorithm
1226 zstd compression algorithm
1241 This uses the AES cipher algorithm.
1275 This uses the AES cipher algorithm with the counter block mode.
1370 (Cryptographic Algorithm Validation Program) testing: