Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 2429) sorted by relevance

12345678910>>...98

/openbmc/linux/crypto/
H A DKconfig144 tristate "Cryptographic algorithm manager"
162 tristate "Userspace cryptographic algorithm configuration"
174 algorithm registration.
205 This converts an arbitrary crypto algorithm into a parallel
206 algorithm that executes in kernel threads.
215 converts an arbitrary synchronous software crypto algorithm
216 into an asynchronous algorithm that executes in a kernel thread.
255 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017)
262 DH (Diffie-Hellman) key exchange algorithm
286 ECDH (Elliptic Curve Diffie-Hellman) key exchange algorithm
[all …]
/openbmc/u-boot/include/
H A Dhash.h25 const char *name; /* Name of algorithm */
35 * @output: Checksum result (length depends on algorithm)
81 * hash_command: Process a hash command for a particular algorithm
85 * @algo_name: Hash algorithm being used (lower case!)
96 * hash_block() - Hash a block according to the requested algorithm
98 * The caller probably knows the hash length for the chosen algorithm, but
102 * @algo_name: Hash algorithm to use
110 * since the caller is selecting the algorithm.
111 * @return 0 if ok, -ve on error: -EPROTONOSUPPORT for an unknown algorithm,
120 * hash_lookup_algo() - Look up the hash_algo struct for an algorithm
[all …]
/openbmc/linux/net/batman-adv/
H A Dbat_algo.c28 * batadv_algo_init() - Initialize batman-adv algorithm management data
37 * batadv_algo_get() - Search for algorithm with specific name
38 * @name: algorithm name to find
58 * batadv_algo_register() - Register callbacks for a mesh algorithm
59 * @bat_algo_ops: mesh algorithm callbacks to add
69 pr_info("Trying to register already registered routing algorithm: %s\n", in batadv_algo_register()
93 * batadv_algo_select() - Select algorithm of soft interface
95 * @name: name of the algorithm to select
97 * The algorithm callbacks for the soft interface will be set when the algorithm
98 * with the correct name was found. Any previous selected algorithm will not be
[all …]
/openbmc/linux/include/crypto/internal/
H A Dacompress.h16 * struct acomp_alg - asynchronous compression algorithm
20 * @dst_free: Frees destination buffer if allocated inside the algorithm
34 * @stat: Statistics for compress algorithm
35 * @base: Common crypto API algorithm data structure
36 * @calg: Cmonn algorithm data structure shared with scomp
88 * crypto_register_acomp() -- Register asynchronous compression algorithm
91 * compression algorithm
93 * @alg: algorithm definition
100 * crypto_unregister_acomp() -- Unregister asynchronous compression algorithm
103 * compression algorithm
[all …]
H A Dscompress.h24 * struct scomp_alg - synchronous compression algorithm
26 * @alloc_ctx: Function allocates algorithm specific context
30 * @stat: Statistics for compress algorithm
31 * @base: Common crypto API algorithm data structure
32 * @calg: Cmonn algorithm data structure shared with acomp
103 * crypto_register_scomp() -- Register synchronous compression algorithm
106 * compression algorithm
108 * @alg: algorithm definition
115 * crypto_unregister_scomp() -- Unregister synchronous compression algorithm
118 * compression algorithm
[all …]
H A Dkpp.h32 * struct crypto_kpp_spawn - KPP algorithm spawn
35 * Template instances can get a hold on some inner KPP algorithm by
150 * KPP algorithm (un)registration functions.
153 * crypto_register_kpp() -- Register key-agreement protocol primitives algorithm
156 * algorithm
158 * @alg: algorithm definition
166 * algorithm
169 * algorithm
171 * @alg: algorithm definition
188 * crypto_grab_kpp() - Look up a KPP algorithm and bind a spawn to it.
[all …]
H A Dakcipher.h125 * crypto_register_akcipher() -- Register public key algorithm
127 * Function registers an implementation of a public key verify algorithm
129 * @alg: algorithm definition
136 * crypto_unregister_akcipher() -- Unregister public key algorithm
138 * Function unregisters an implementation of a public key verify algorithm
140 * @alg: algorithm definition
147 * Function registers an implementation of an asymmetric key algorithm
150 * @tmpl: the template from which the algorithm was created
/openbmc/phosphor-net-ipmid/
H A Dsession.hpp145 throw std::runtime_error("Authentication Algorithm Empty"); in getAuthAlgo()
155 * @brief Get Session's Integrity Algorithm
157 * @return pointer to the integrity algorithm
167 throw std::runtime_error("Integrity Algorithm Empty"); in getIntegrityAlgo()
172 * @brief Set Session's Integrity Algorithm
174 * @param[in] integrityAlgo - unique pointer to integrity algorithm
183 /** @brief Check if integrity algorithm is enabled for this session.
185 * @return true if integrity algorithm is enabled else false.
193 * @brief Get Session's Confidentiality Algorithm
195 * @return pointer to the confidentiality algorithm
[all …]
H A Dintegrity_algo.hpp18 * The Integrity Algorithm Number specifies the algorithm used to generate the
21 * Integrity Algorithm is none the AuthCode value is not calculated and the
38 * Unless otherwise specified, the integrity algorithm is applied to the packet
69 * using integrity algorithm on the packet data, false otherwise
88 * @brief Check if the Integrity algorithm is supported
90 * @param[in] algo - integrity algorithm
92 * @return true if algorithm is supported else false
113 * state whether this is the integrity algorithm or the authentication
114 * algorithm. Other implementations of the RMCP+ algorithm (ipmitool
136 * AuthCode field length varies based on the integrity algorithm, for
[all …]
H A Dauth_algo.hpp36 // Reserved used to indicate an invalid authentication algorithm
44 * The Authentication Algorithm specifies the type of authentication “handshake”
46 * signature algorithm that is used as part of the process.
98 * @brief Check if the Authentication algorithm is supported
100 * @param[in] algo - authentication algorithm
102 * @return true if algorithm is supported else false
131 * Integrity Algorithm is activated and set in the session data only
133 * integrity algorithm is negotiated in the Open Session Request command
134 * . So the integrity algorithm successfully negotiated is stored
135 * in the authentication algorithm's instance.
[all …]
H A Dcrypt_algo.hpp17 * The Confidentiality Algorithm Number specifies the encryption/decryption
18 * algorithm field that is used for encrypted payload data under the session.
24 * particular confidentiality algorithm. Based on security recommendations
30 AES_CBC_128, /**< AES-CBC-128 Algorithm (mandatory option) */
31 xRC4_128, /**< xRC4-128 Algorithm (optional option) */
32 xRC4_40, /**< xRC4-40 Algorithm (optional option) */
80 * @brief Check if the Confidentiality algorithm is supported
82 * @param[in] algo - confidentiality algorithm
84 * @return true if algorithm is supported else false
111 * @brief Implementation of the AES-CBC-128 Confidentiality algorithm
[all …]
/openbmc/linux/include/linux/
H A Dcrypto.h21 * Algorithm masks and types.
48 * Set if the algorithm (or an algorithm which it uses) requires another
49 * algorithm of the same type to handle corner cases.
54 * Set if the algorithm has passed automated run-time testing. Note that
55 * if there is no run-time testing for a given algorithm it is considered
62 * Set if the algorithm is an instance that is built from templates.
66 /* Set this bit if the algorithm provided is hardware accelerated but
78 * Set if the algorithm has a ->setkey() method but can be used without
89 * The algorithm may allocate memory during request processing, i.e. during
90 * encryption, decryption, or hashing. Users can request an algorithm with this
[all …]
H A Ddim.h15 * Causes a moderation of the algorithm run.
89 * @state: Algorithm state (see below)
97 * @tune_state: Algorithm tuning state (see below)
131 * enum dim_state - DIM algorithm states
133 * These will determine if the algorithm is in a valid state to start an iteration.
136 * @DIM_MEASURE_IN_PROGRESS: Algorithm is already in progress - check if
147 * enum dim_tune_state - DIM algorithm tune states
149 * These will determine which action the algorithm should perform.
151 * @DIM_PARKING_ON_TOP: Algorithm found a local top point - exit on significant difference
152 * @DIM_PARKING_TIRED: Algorithm found a deep top point - don't exit if tired > 0
[all …]
/openbmc/u-boot/lib/
H A DKconfig6 Enables software based BCH ECC algorithm present in lib/bch.c
173 bool "Support the AES algorithm"
176 (Advanced Encryption Standard). This algorithm uses a symetric key
178 supported by the algorithm but only a 128-bit key is supported at
237 This option enables support of hashing using SHA1 algorithm.
239 The SHA1 algorithm produces a 160-bit (20-byte) hash value
245 This option enables support of hashing using SHA256 algorithm.
247 The SHA256 algorithm produces a 256-bit (32-byte) hash value
251 bool "Enable SHA512 algorithm"
253 This option enables support of internal SHA512 algorithm.
[all …]
/openbmc/linux/Documentation/crypto/
H A Dapi-intro.rst35 [algorithm api] (for registering algorithms)
37 The idea is to make the user interface and algorithm registration API
103 When submitting a new algorithm for inclusion, a mandatory requirement
204 SHA1 algorithm contributors:
207 DES algorithm contributors:
212 Blowfish algorithm contributors:
216 Twofish algorithm contributors:
220 SHA256/384/512 algorithm contributors:
225 AES algorithm contributors:
233 CAST5 algorithm contributors:
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D082.out58 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
61 encrypt.hash-alg=<str> - Name of encryption hash algorithm
63 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
64 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
84 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
87 encrypt.hash-alg=<str> - Name of encryption hash algorithm
89 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
90 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
110 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
113 encrypt.hash-alg=<str> - Name of encryption hash algorithm
[all …]
/openbmc/linux/Documentation/networking/
H A Dnet_dim.rst21 processing. The mechanism includes an algorithm which decides if and how to
24 iteration of the algorithm, it analyses a given sample of the data, compares it
30 the algorithm might decide not to change anything. The configuration fields are
32 number of wanted packets per event. The Net DIM algorithm ascribes importance to
36 Net DIM Algorithm
39 Each iteration of the Net DIM algorithm follows these steps:
54 compared. Here the algorithm tries to optimize for lower interrupt rate so an
62 and the internal state of the algorithm. The states reflect the "direction" of
63 the algorithm: is it going left (reducing moderation), right (increasing
66 algorithm would increase in order to reduce calculation overhead. Also, after
[all …]
/openbmc/linux/include/crypto/
H A Dakcipher.h48 * @reqsize: Request context size required by algorithm implementation
49 * @base: Common crypto API algorithm data structure
58 * struct crypto_istat_akcipher - statistics for akcipher algorithm
78 * struct akcipher_alg - generic public key algorithm
81 * algorithm. In case of error, where the dst_len was insufficient,
85 * public key algorithm, returning verification status. Requires
88 * algorithm. In case of error, where the dst_len was insufficient,
92 * algorithm. In case of error, where the dst_len was insufficient,
95 * @set_pub_key: Function invokes the algorithm specific set public key
98 * @set_priv_key: Function invokes the algorithm specific set private key
[all …]
H A Dsig.h3 * Public Key Signature Algorithm
16 * @base: Common crypto API algorithm data structure
32 * signing algorithm e.g. "ecdsa"
33 * @type: specifies the type of the algorithm
34 * @mask: specifies the mask for the algorithm
36 * Allocate a handle for public key signature algorithm. The returned struct
77 * Function invokes the specific signing operation for a given algorithm
95 * for a given algorithm.
112 * Function invokes the algorithm specific set key function, which knows
128 * Function invokes the algorithm specific set key function, which knows
/openbmc/linux/arch/x86/crypto/
H A DKconfig11 Curve25519 algorithm
39 Block cipher: Blowfish cipher algorithm
89 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm
107 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm
122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
137 Length-preserving ciphers: Serpent cipher algorithm
153 Length-preserving ciphers: Serpent cipher algorithm
170 Length-preserving ciphers: Serpent cipher algorithm
183 Length-preserving ciphers: Serpent cipher algorithm
241 Block cipher: Twofish cipher algorithm
[all …]
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libalgorithm/
H A Dlibalgorithm-diff-perl_1.15.bb1 SUMMARY = "Algorithm::Diff - Compute 'intelligent' differences between two \
5 algorithm similar to (or identical to) the one used by the Unix `diff' \
10 HOMEPAGE = "https://metacpan.org/release/NEDKONZ/Algorithm-Diff-1.15"
13 LIC_FILES_CHKSUM = "file://lib/Algorithm/Diff.pm;beginline=406;endline=409;md5=d393b8ad3b8994b9d0ae…
15 SRC_URI = "${CPAN_MIRROR}/authors/id/N/NE/NEDKONZ/Algorithm-Diff-${PV}.tar.gz"
18 S = "${WORKDIR}/Algorithm-Diff-${PV}"
/openbmc/linux/net/netfilter/ipvs/
H A DKconfig118 The robin-robin scheduling algorithm simply directs network
127 The weighted robin-robin scheduling algorithm directs network
140 The least-connection scheduling algorithm directs network
150 The weighted least-connection scheduling algorithm directs network
160 The weighted failover scheduling algorithm directs network
170 The weighted overflow scheduling algorithm directs network
181 The locality-based least-connection scheduling algorithm is for
183 This algorithm usually directs packet destined for an IP address to
196 algorithm is also for destination IP load balancing. It is
213 The destination hashing scheduling algorithm assigns network
[all …]
/openbmc/qemu/include/crypto/
H A Divgen.h105 * @alg: the initialization vector generation algorithm
106 * @cipheralg: the cipher algorithm or 0
107 * @hash: the hash algorithm or 0
112 * the algorithm @alg. Whether the remaining parameters
166 * Get the algorithm used by this IV generator
168 * Returns: the IV generator algorithm
177 * Get the cipher algorithm used by this IV generator (if
180 * Returns: the cipher algorithm
189 * Get the hash algorithm used by this IV generator (if
192 * Returns: the hash algorithm
H A Dhash.h47 * @alg: the hash algorithm
49 * Determine if @alg hash algorithm is supported by the
52 * Returns: true if the algorithm is supported, false otherwise
59 * @alg: the hash algorithm
69 * @alg: the hash algorithm
101 * @alg: the hash algorithm
133 * @alg: the hash algorithm
254 * @alg: the hash algorithm
257 * Creates a new hashing context for the chosen algorithm for
260 * Returns: New hash object with the given algorithm, or NULL on error.
[all …]
H A Dpbkdf.h27 * This module provides an interface to the PBKDF2 algorithm
88 * @hash: the hash algorithm
90 * Determine if the current build supports the PBKDF2 algorithm
100 * @hash: the hash algorithm to use
110 * Apply the PBKDF2 algorithm to derive an encryption
112 * @salt parameter is used to perturb the algorithm.
116 * should be large enough such that the algorithm takes
131 * @hash: the hash algorithm to use
139 * Time the PBKDF2 algorithm to determine how many

12345678910>>...98