Lines Matching +full:co +full:- +full:processors

1 # SPDX-License-Identifier: GPL-2.0
48 At load time, this module overrides the built-in implementations of
49 these algorithms with its implementations. It also runs self-tests on
171 bool "Disable run-time self tests"
174 Disable run-time self tests that normally take place at
178 bool "Enable extra run-time crypto self tests"
181 Enable extra run-time self tests of registered crypto algorithms,
252 comment "Public-key cryptography"
264 tristate "Diffie-Hellman algorithm"
268 Generic implementation of the Diffie-Hellman algorithm.
282 tristate "EC-RDSA (GOST 34.10) algorithm"
289 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
290 RFC 7091, ISO/IEC 14888-3:2018) is one of the Russian cryptographic
304 as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012.
307 https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
308 http://www.oscca.gov.cn/sca/xxgk/2010-12/17/content_1002386.shtml
345 tristate "ChaCha20-Poly1305 AEAD support"
351 ChaCha20-Poly1305 AEAD support, RFC7539.
358 tristate "AEGIS-128 AEAD algorithm"
360 select CRYPTO_AES # for AES S-box tables
362 Support for the AEGIS-128 dedicated AEAD algorithm.
365 bool "Support SIMD acceleration for AEGIS-128"
370 tristate "AEGIS-128 AEAD algorithm (x86_64 AESNI+SSE2 implementation)"
375 AESNI+SSE2 implementation of the AEGIS-128 dedicated AEAD algorithm.
434 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010.
438 See: https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final
456 narrow block cipher mode for dm-crypt. Use it with cipher
457 specification string aes-lrw-benbi, the key must be 256, 320 or 384.
487 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
496 Support for key wrapping (NIST SP800-38F / RFC3394) without
527 Adiantum is a tweakable, length-preserving encryption mode
531 an ε-almost--universal hash function, and an invocation of
532 the AES-256 block cipher on a single 16-byte block. On CPUs
534 AES-XTS.
538 bound. Unlike XTS, Adiantum is a true wide-block encryption
548 Encrypted salt-sector initialization vector (ESSIV) is an IV
550 dm-crypt. It uses the hash of the block encryption key as the
562 associated data (AAD) region (which is how dm-crypt uses it.)
579 Cipher-based Message Authentication Code (CMAC) specified by
583 http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf
590 HMAC: Keyed-Hashing for Message Authentication (RFC2104).
598 XCBC: Keyed-Hashing with encryption algorithm
601 xcbc-mac/xcbc-mac-spec.pdf
609 very high speed on 64-bit architectures.
621 Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
632 instruction. This option will create 'crc32c-intel' module,
635 Module will be crc32c-intel.
643 CRC32c algorithm implemented using vector polynomial multiply-sum
645 and newer processors for improved performance.
662 CRC-32-IEEE 802.3 cyclic redundancy-check algorithm.
674 instruction. This option will create 'crc32-pclmul' module,
675 which will enable any routine to use the CRC-32-IEEE 802.3 checksum
692 xxHash non-cryptographic hash algorithm. Extremely fast, working at
705 - blake2b-160
706 - blake2b-256
707 - blake2b-384
708 - blake2b-512
718 optimized for 8-32bit platforms and can produce digests of any size
723 - blake2s-128
724 - blake2s-160
725 - blake2s-224
726 - blake2s-256
749 For x86_64 processors with SSE4.2 and PCLMULQDQ supported,
752 'crct10dif-pclmul' module, which is faster when computing the
761 multiply-sum (vpmsum) instructions, introduced in POWER8. Enable on
762 POWER8 and newer processors for improved performance.
768 Stress test for CRC32c and CRC-T10DIF algorithms implemented with
778 It is not a general-purpose cryptographic hash function.
788 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use
800 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use
857 tristate "RIPEMD-128 digest algorithm"
860 RIPEMD-128 (ISO/IEC 10118-3:2004).
862 RIPEMD-128 is a 128-bit cryptographic hash function. It should only
864 RIPEMD-160 should be used.
870 tristate "RIPEMD-160 digest algorithm"
873 RIPEMD-160 (ISO/IEC 10118-3:2004).
875 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
876 to be used as a secure replacement for the 128-bit hash functions
878 (not to be confused with RIPEMD-128).
881 against RIPEMD-160.
887 tristate "RIPEMD-256 digest algorithm"
890 RIPEMD-256 is an optional extension of RIPEMD-128 with a
892 longer hash-results, without needing a larger security level
893 (than RIPEMD-128).
899 tristate "RIPEMD-320 digest algorithm"
902 RIPEMD-320 is an optional extension of RIPEMD-160 with a
904 longer hash-results, without needing a larger security level
905 (than RIPEMD-160).
914 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
917 tristate "SHA1 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
922 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
924 Extensions (AVX/AVX2) or SHA-NI(SHA Extensions New Instructions),
928 tristate "SHA256 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
933 SHA-256 secure hash standard (DFIPS 180-2) implemented
936 version 2 (AVX2) instructions, or SHA-NI (SHA Extensions New
945 SHA-512 secure hash standard (DFIPS 180-2) implemented
956 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
965 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
973 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
979 SHA-1 secure hash standard (DFIPS 180-4) implemented
987 SHA256 secure hash standard (DFIPS 180-2).
992 This code also includes SHA-224, a 224 bit hash with 112 bits
1001 SHA224 and SHA256 secure hash standard (DFIPS 180-2)
1010 SHA-256 secure hash standard (DFIPS 180-2) implemented
1019 SHA-256 secure hash standard (DFIPS 180-2) implemented
1026 SHA512 secure hash standard (DFIPS 180-2).
1031 This code also includes SHA-384, a 384 bit hash with 192 bits
1040 SHA-512 secure hash standard (DFIPS 180-2) implemented
1049 SHA-512 secure hash standard (DFIPS 180-2) implemented
1056 SHA-3 secure hash standard (DFIPS 202). It's based on
1066 SM3 secure hash function as defined by OSCCA GM/T 0004-2012 SM3).
1071 https://datatracker.ietf.org/doc/html/draft-shen-sm3-hash
1077 Streebog Hash Function (GOST R 34.11-2012, RFC 6986) is one of the Russian
1089 Tiger hash algorithm 192, 160 and 128-bit hashes
1091 Tiger is a hash function optimized for 64-bit processors while
1092 still having decent performance on 32-bit processors.
1102 Whirlpool hash algorithm 512, 384 and 256-bit hashes
1104 Whirlpool-512 is part of the NESSIE cryptographic primitives.
1105 Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
1111 tristate "GHASH hash function (CLMUL-NI accelerated)"
1115 This is the x86_64 CLMUL-NI accelerated implementation of
1125 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1130 environments regardless of its use in feedback or non-feedback
1133 suited for restricted-space environments, in which it also
1154 8 for decryption), this implementation only uses just two S-boxes of
1161 tristate "AES cipher algorithms (AES-NI)"
1170 Use Intel AES-NI instructions for AES algorithm.
1172 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1177 environments regardless of its use in feedback or non-feedback
1180 suited for restricted-space environments, in which it also
1200 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1205 environments regardless of its use in feedback or non-feedback
1208 suited for restricted-space environments, in which it also
1225 AES cipher algorithms (FIPS-197). Additionally the acceleration
1232 tables or 256 bytes S-boxes.
1258 bits in length. This algorithm is required for driver-based
1313 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1330 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1333 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
1342 Camellia cipher algorithm module (x86_64/AES-NI/AVX).
1350 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1353 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
1358 Camellia cipher algorithm module (x86_64/AES-NI/AVX2).
1366 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1383 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1392 tristate "CAST5 (CAST-128) cipher algorithm"
1396 The CAST5 encryption algorithm (synonymous with CAST-128) is
1400 tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
1407 The CAST5 encryption algorithm (synonymous with CAST-128) is
1414 tristate "CAST6 (CAST-256) cipher algorithm"
1418 The CAST6 encryption algorithm (synonymous with CAST-256) is
1422 tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
1431 The CAST6 encryption algorithm (synonymous with CAST-256) is
1442 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1451 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3),
1455 tristate "Triple DES EDE cipher algorithm (x86-64)"
1460 Triple DES EDE (FIPS 46-3) algorithm.
1463 algorithm that is optimized for x86-64 processors. Two versions of
1482 an algorithm optimized for 64-bit processors with good performance
1483 on 32-bit processors. Khazad uses an 128 bit key size.
1507 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1510 <https://cr.yp.to/chacha/chacha-20080128.pdf>
1516 <https://cr.yp.to/snuffle/xsalsa-20081128.pdf>
1520 in some performance-sensitive scenarios.
1523 tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
1529 SSSE3, AVX2, and AVX-512VL optimized implementations of the ChaCha20,
1545 SEED is a 128-bit symmetric key block cipher that has been
1644 SM4 cipher algorithms (OSCCA GB/T 32907-2016).
1646 SM4 (GBT.32907-2016) is a cryptographic standard issued by the
1653 (GB.15629.11-2003).
1655 The latest SM4 standard (GBT.32907-2016) was proposed by OSCCA and
1680 Xtendend Encryption Tiny Algorithm is a mis-implementation
1737 tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
1744 Twofish cipher algorithm (x86_64, 3-way parallel).
1752 blocks parallel, utilizing resources of out-of-order CPUs better.
1852 tristate "NIST SP800-90A DRBG"
1854 NIST SP800-90A compliant DRBG. In the following submenu, one or
1869 Enable the Hash DRBG variant as defined in NIST SP800-90A.
1876 Enable the CTR DRBG variant as defined in NIST SP800-90A.
1887 tristate "Jitterentropy Non-Deterministic Random Number Generator"
1900 tristate "User-space interface for hash algorithms"
1905 This option enables the user-spaces interface for hash
1909 tristate "User-space interface for symmetric key cipher algorithms"
1914 This option enables the user-spaces interface for symmetric
1918 tristate "User-space interface for random number generator algorithms"
1923 This option enables the user-spaces interface for random
1930 This option enables extra API for CAVP testing via the user-space
1936 tristate "User-space interface for AEAD cipher algorithms"
1943 This option enables the user-spaces interface for AEAD
1956 bool "Crypto usage statistics for User-space"
1961 - encrypt/decrypt size and numbers of symmeric operations
1962 - compress/decompress size and numbers of compress operations
1963 - size and numbers of hash operations
1964 - encrypt/decrypt/sign/verify numbers for asymmetric operations
1965 - generate/seed numbers for rng operations