Searched full:transformation (Results 1 – 25 of 130) sorted by relevance
123456
/linux-6.12.1/Documentation/crypto/ |
D | intro.rst | 8 as other data transformation mechanisms and methods to invoke these. 27 - data transformation implementations (typically ciphers) that can be 32 however, does not discuss all API calls available to data transformation 37 Note: The terms "transformation" and cipher algorithm are used 43 The transformation implementation is an actual code or interface to 44 hardware which implements a certain transformation with precisely 47 The transformation object (TFM) is an instance of a transformation 48 implementation. There can be multiple transformation objects associated 49 with a single transformation implementation. Each of those 50 transformation objects is held by a crypto API consumer or another [all …]
|
D | devel-algos.rst | 4 Registering And Unregistering Transformation 8 API. One is used to register a generic cryptographic transformation, 19 former function registers a single transformation, while the latter 20 works on an array of transformation descriptions. The latter is useful 52 This section describes the simplest of all transformation 62 filled in with proper callbacks to implement this transformation. 103 This section describes the multi-block cipher transformation 105 which operate on scatterlists of data supplied to the transformation 141 Registering And Unregistering The Transformation 144 There are multiple ways to register a HASH transformation, depending on [all …]
|
/linux-6.12.1/include/linux/ |
D | crypto.h | 188 * @cia_min_keysize: Minimum key size supported by the transformation. This is 189 * the smallest key length supported by this transformation 194 * @cia_max_keysize: Maximum key size supported by the transformation. This is 195 * the largest key length supported by this transformation 200 * @cia_setkey: Set key for the transformation. This function is used to either 202 * transformation context for programming it later. Note that this 203 * function does modify the transformation context. This function 205 * transformation object, so one must make sure the key is properly 224 * transformation context, the key might need to be re-programmed 226 * modify the transformation context, as this function may be [all …]
|
/linux-6.12.1/include/crypto/ |
D | skcipher.h | 69 * @min_keysize: Minimum key size supported by the transformation. This is the 70 * smallest key length supported by this transformation algorithm. 74 * @max_keysize: Maximum key size supported by the transformation. This is the 75 * largest key length supported by this transformation algorithm. 79 * @ivsize: IV size applicable for transformation. The consumer must provide an 99 * @setkey: Set key for the transformation. This function is used to either 101 * transformation context for programming it later. Note that this 102 * function does modify the transformation context. This function can 103 * be called multiple times during the existence of the transformation 116 * key was stored in transformation context, the key might need to be [all …]
|
D | hash.h | 28 * @digestsize: Size of the result of the transformation. A buffer of this size 33 * @statesize: Size of the block for partial state of the transformation. A 35 * will save the partial state of the transformation into it. On the 66 * @init: **[mandatory]** Initialize the transformation context. Intended only to initialize the 67 * state of the HASH transformation at the beginning. This shall fill in 69 * transformation. No data processing happens at this point. Driver code 71 * @update: **[mandatory]** Push a chunk of data into the driver for transformation. This 74 * function must not finalize the HASH transformation by calculating the 76 * transformation. This function shall not modify the transformation 78 * transformation object. Data processing can happen synchronously [all …]
|
D | aead.h | 107 * transformation. A transformation may support smaller tag sizes. 112 * @setauthsize: Set authentication size for the AEAD transformation. This 114 * authentication tag to be either generated by the transformation 124 * @init: Initialize the cryptographic transformation object. This function 125 * is used to initialize the cryptographic transformation object. 127 * after the transformation context was allocated. In case the 130 * requirement of the transformation and put any software fallbacks 132 * @exit: Deinitialize the cryptographic transformation object. This is a
|
D | akcipher.h | 82 * @init: Initialize the cryptographic transformation object. 84 * transformation object. This function is called only once at 85 * the instantiation time, right after the transformation context 89 * transformation and put any software fallbacks in place. 90 * @exit: Deinitialize the cryptographic transformation object. This is a 267 * Function assumes that the key is already set in the transformation. If this
|
/linux-6.12.1/net/xfrm/ |
D | Kconfig | 24 tristate "Transformation user configuration interface" 27 Support for Transformation(XFRM) user configuration interface 38 Transformation(XFRM) user configuration interface like IPsec 44 tristate "Transformation virtual interface" 52 bool "Transformation sub policy support" 62 bool "Transformation migrate database" 73 bool "Transformation statistics" 77 statistics about transformation error (or almost error) factor
|
/linux-6.12.1/Documentation/networking/ |
D | xfrm_proc.rst | 10 Transformation Statistics 14 dropped by the transformation code and why. These counters are defined 36 Transformation protocol specific error 40 Transformation mode specific error 94 Transformation protocol specific error 97 Transformation mode specific error
|
D | pktgen.rst | 282 Default IPsec transformation with ESP encapsulation plus transport mode 289 you can use "pgset spi SPI_VALUE" to specify which transformation mode
|
/linux-6.12.1/include/sound/sof/ |
D | channel_map.h | 16 * \brief Channel map, specifies transformation of one-to-many or many-to-one. 26 * Ext ID is the identifier of external part of the transformation. Depending 49 * More than one transformation per a single channel is allowed (in case 51 * A channel may be skipped in the transformation list, then it is filled 52 * with 0's by the transformation function.
|
/linux-6.12.1/include/crypto/internal/ |
D | acompress.h | 21 * @init: Initialize the cryptographic transformation object. 23 * transformation object. This function is called only once at 24 * the instantiation time, right after the transformation context 28 * transformation and put any software fallbacks in place. 29 * @exit: Deinitialize the cryptographic transformation object. This is a
|
/linux-6.12.1/net/ipv6/ |
D | Kconfig | 52 tristate "IPv6: AH transformation" 67 tristate "IPv6: ESP transformation" 82 tristate "IPv6: ESP transformation offload" 87 Support for ESP transformation offload. This makes sense 107 tristate "IPv6: IPComp transformation"
|
/linux-6.12.1/Documentation/userspace-api/media/drivers/ |
D | dw100.rst | 7 programmable geometrical transformation on the input image to correct distortion 10 The transformation function is exposed by the hardware as a grid map with 16x16
|
/linux-6.12.1/drivers/media/platform/nxp/dw100/ |
D | Kconfig | 13 transformation on source images through a programmable dewarping map.
|
/linux-6.12.1/Documentation/timers/ |
D | highres.rst | 66 Figure #3 (OLS slides p.18) illustrates the transformation. 139 Figure #4 (OLS slides p.20) illustrates the transformation. 205 Figure #5 (OLS slides p.22) illustrates the transformation.
|
/linux-6.12.1/net/ipv4/ |
D | Kconfig | 341 tristate "IP: AH transformation" 356 tristate "IP: ESP transformation" 371 tristate "IP: ESP transformation offload" 376 Support for ESP transformation offload. This makes sense 396 tristate "IP: IPComp transformation"
|
/linux-6.12.1/arch/xtensa/include/asm/ |
D | kasan.h | 23 /* Offset for mem to shadow address transformation */
|
/linux-6.12.1/Documentation/devicetree/bindings/iio/ |
D | mount-matrix.txt | 178 producing the transformation matrix. 183 mechanically mounted in an ideal way and we need no transformation):
|
/linux-6.12.1/drivers/crypto/ |
D | atmel-ecc.c | 29 * struct atmel_ecdh_ctx - transformation context 262 dev_err(&ctx->client->dev, "Failed to allocate transformation for '%s': %ld\n", in atmel_ecdh_init_tfm()
|
/linux-6.12.1/arch/powerpc/crypto/ |
D | aes.c | 37 "Failed to allocate transformation for '%s': %ld\n", in p8_aes_init()
|
/linux-6.12.1/drivers/crypto/intel/keembay/ |
D | keembay-ocs-hcu-core.c | 39 * @hcu_dev: The OCS HCU device used by the transformation. 42 * @is_sm3_tfm: Whether or not this is an SM3 transformation. 43 * @is_hmac_tfm: Whether or not this is a HMAC transformation. 58 * @blk_sz: Block size of the transformation / request. 59 * @dig_sz: Digest size of the transformation / request.
|
/linux-6.12.1/drivers/gpu/drm/ |
D | drm_rect.c | 241 * @rotation: Transformation to be applied 307 * @rotation: Transformation whose inverse is to be applied
|
D | drm_color_mgmt.c | 43 * from the framebuffer before it is given to the transformation matrix. 62 * Blob property to set the current transformation matrix (CTM) apply to 74 * after the transformation matrix to data sent to the connector. The
|
/linux-6.12.1/drivers/comedi/drivers/ |
D | jr3_pci.h | 151 * coordinate transformation, or new sensor full scale is set by the 355 * whenever a new coordinate transformation is calculated. It is 485 * a coordinate transformation or a full scale change. Peak data is 690 * transformation from the center of the sensor to either flange.
|
123456