/linux-4.4.14/crypto/ |
D | Kconfig | 106 tristate "RSA algorithm" 111 Generic implementation of the RSA public key algorithm. 114 tristate "Cryptographic algorithm manager" 129 tristate "Userspace cryptographic algorithm configuration" 142 algorithm registration. 172 This converts an arbitrary crypto algorithm into a parallel 173 algorithm that executes in kernel threads. 186 converts an arbitrary synchronous software crypto algorithm 187 into an asynchronous algorithm that executes in a kernel thread. 269 xoring it with a salt. This algorithm is mainly useful for CTR [all …]
|
/linux-4.4.14/Documentation/crypto/ |
D | api-intro.txt | 30 [algorithm api] (for registering algorithms) 32 The idea is to make the user interface and algorithm registration API 94 When submitting a new algorithm for inclusion, a mandatory requirement 189 SHA1 algorithm contributors: 192 DES algorithm contributors: 197 Blowfish algorithm contributors: 201 Twofish algorithm contributors: 205 SHA256/384/512 algorithm contributors: 210 AES algorithm contributors: 218 CAST5 algorithm contributors: [all …]
|
D | asymmetric-keys.txt | 143 The algorithm used must be noted in sig->pkey_hash_algo, and all the MPIs that 154 The function may also return -ENOTSUPP if an unsupported public-key algorithm 155 or public-key/hash algorithm combination is specified or the key doesn't 199 against the key. For instance the name of the public key algorithm type 304 public-key algorithm such as RSA and DSA this will likely be a printable
|
/linux-4.4.14/drivers/staging/skein/ |
D | Kconfig | 2 tristate "Skein digest algorithm" 7 Skein secure hash algorithm is one of 5 finalists from the NIST SHA3 16 cipher algorithm.
|
/linux-4.4.14/arch/arm/crypto/ |
D | Kconfig | 12 tristate "SHA1 digest algorithm (ARM-asm)" 20 tristate "SHA1 digest algorithm (ARM NEON)" 31 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 40 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 49 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 57 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 73 algorithm.
|
/linux-4.4.14/drivers/block/zram/ |
D | Kconfig | 19 bool "Enable LZ4 algorithm support" 25 This option enables LZ4 compression algorithm support. Compression 26 algorithm can be changed using `comp_algorithm' device attribute.
|
/linux-4.4.14/drivers/crypto/ux500/hash/ |
D | hash_core.c | 244 if (HASH_ALGO_SHA1 == ctx->config.algorithm) { in get_empty_message_digest() 250 ctx->config.algorithm) { in get_empty_message_digest() 263 if (HASH_ALGO_SHA1 == ctx->config.algorithm) { in get_empty_message_digest() 268 } else if (HASH_ALGO_SHA256 == ctx->config.algorithm) { in get_empty_message_digest() 695 if (config->algorithm != HASH_ALGO_SHA1 && in hash_setconfiguration() 696 config->algorithm != HASH_ALGO_SHA256) in hash_setconfiguration() 708 switch (config->algorithm) { in hash_setconfiguration() 956 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_dma_final() 1057 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_hw_final() 1274 u8 *digest, int algorithm) in hash_get_digest() argument [all …]
|
D | hash_alg.h | 295 int algorithm; member 388 u8 *digest, int algorithm);
|
/linux-4.4.14/crypto/asymmetric_keys/ |
D | Kconfig | 13 tristate "Asymmetric public-key crypto algorithm subtype" 22 ENOPKG will be reported if the requisite algorithm is unavailable. 25 tristate "RSA public-key algorithm" 28 This option enables support for the RSA algorithm (PKCS#1, RFC3447).
|
D | x509.asn1 | 24 algorithm OBJECT IDENTIFIER ({ x509_note_OID }), 48 algorithm AlgorithmIdentifier,
|
D | pkcs7.asn1 | 36 algorithm OBJECT IDENTIFIER ({ pkcs7_note_OID }), 119 algorithm OBJECT IDENTIFIER ({ pkcs7_note_OID }),
|
D | mscode.asn1 | 26 algorithm OBJECT IDENTIFIER ({ mscode_note_digest_algo }),
|
/linux-4.4.14/drivers/crypto/nx/ |
D | Kconfig | 22 algorithm using the cryptographic API. One of the platform 35 algorithm. This supports NX hardware on the pSeries platform. 45 algorithm. This supports NX hardware on the PowerNV platform.
|
/linux-4.4.14/net/netfilter/ipvs/ |
D | Kconfig | 116 The robin-robin scheduling algorithm simply directs network 125 The weighted robin-robin scheduling algorithm directs network 138 The least-connection scheduling algorithm directs network 148 The weighted least-connection scheduling algorithm directs network 158 The weighted failover scheduling algorithm directs network 168 The weighted overflow scheduling algorithm directs network 179 The locality-based least-connection scheduling algorithm is for 181 This algorithm usually directs packet destined for an IP address to 194 algorithm is also for destination IP load balancing. It is 211 The destination hashing scheduling algorithm assigns network [all …]
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/btcoexist/ |
D | halbtc8821a1ant.c | 501 u8 algorithm = BT_8821A_1ANT_COEX_ALGO_UNDEFINED; in halbtc8821a1ant_action_algorithm() local 509 return algorithm; in halbtc8821a1ant_action_algorithm() 525 algorithm = BT_8821A_1ANT_COEX_ALGO_SCO; in halbtc8821a1ant_action_algorithm() 530 algorithm = BT_8821A_1ANT_COEX_ALGO_HID; in halbtc8821a1ant_action_algorithm() 534 algorithm = BT_8821A_1ANT_COEX_ALGO_A2DP; in halbtc8821a1ant_action_algorithm() 539 algorithm = BT_8821A_1ANT_COEX_ALGO_PANHS; in halbtc8821a1ant_action_algorithm() 543 algorithm = BT_8821A_1ANT_COEX_ALGO_PANEDR; in halbtc8821a1ant_action_algorithm() 552 algorithm = BT_8821A_1ANT_COEX_ALGO_HID; in halbtc8821a1ant_action_algorithm() 556 algorithm = BT_8821A_1ANT_COEX_ALGO_SCO; in halbtc8821a1ant_action_algorithm() 561 algorithm = BT_8821A_1ANT_COEX_ALGO_SCO; in halbtc8821a1ant_action_algorithm() [all …]
|
D | halbtc8723b1ant.c | 529 u8 algorithm = BT_8723B_1ANT_COEX_ALGO_UNDEFINED; in halbtc8723b1ant_action_algorithm() local 537 return algorithm; in halbtc8723b1ant_action_algorithm() 553 algorithm = BT_8723B_1ANT_COEX_ALGO_SCO; in halbtc8723b1ant_action_algorithm() 558 algorithm = BT_8723B_1ANT_COEX_ALGO_HID; in halbtc8723b1ant_action_algorithm() 562 algorithm = BT_8723B_1ANT_COEX_ALGO_A2DP; in halbtc8723b1ant_action_algorithm() 567 algorithm = in halbtc8723b1ant_action_algorithm() 572 algorithm = in halbtc8723b1ant_action_algorithm() 582 algorithm = BT_8723B_1ANT_COEX_ALGO_HID; in halbtc8723b1ant_action_algorithm() 586 algorithm = BT_8723B_1ANT_COEX_ALGO_SCO; in halbtc8723b1ant_action_algorithm() 591 algorithm = BT_8723B_1ANT_COEX_ALGO_SCO; in halbtc8723b1ant_action_algorithm() [all …]
|
D | halbtc8821a2ant.c | 357 u8 algorithm = BT_8821A_2ANT_COEX_ALGO_UNDEFINED; in halbtc8821a2ant_action_algorithm() local 373 return algorithm; in halbtc8821a2ant_action_algorithm() 389 algorithm = BT_8821A_2ANT_COEX_ALGO_SCO; in halbtc8821a2ant_action_algorithm() 394 algorithm = BT_8821A_2ANT_COEX_ALGO_HID; in halbtc8821a2ant_action_algorithm() 398 algorithm = BT_8821A_2ANT_COEX_ALGO_A2DP; in halbtc8821a2ant_action_algorithm() 403 algorithm = BT_8821A_2ANT_COEX_ALGO_PANHS; in halbtc8821a2ant_action_algorithm() 407 algorithm = BT_8821A_2ANT_COEX_ALGO_PANEDR; in halbtc8821a2ant_action_algorithm() 416 algorithm = BT_8821A_2ANT_COEX_ALGO_PANEDR_HID; in halbtc8821a2ant_action_algorithm() 420 algorithm = BT_8821A_2ANT_COEX_ALGO_PANEDR_HID; in halbtc8821a2ant_action_algorithm() 425 algorithm = BT_8821A_2ANT_COEX_ALGO_SCO; in halbtc8821a2ant_action_algorithm() [all …]
|
D | halbtc8192e2ant.c | 589 u8 algorithm = BT_8192E_2ANT_COEX_ALGO_UNDEFINED; in halbtc8192e2ant_action_algorithm() local 597 return algorithm; in halbtc8192e2ant_action_algorithm() 613 algorithm = BT_8192E_2ANT_COEX_ALGO_SCO; in halbtc8192e2ant_action_algorithm() 618 algorithm = BT_8192E_2ANT_COEX_ALGO_HID; in halbtc8192e2ant_action_algorithm() 622 algorithm = BT_8192E_2ANT_COEX_ALGO_A2DP; in halbtc8192e2ant_action_algorithm() 627 algorithm = in halbtc8192e2ant_action_algorithm() 632 algorithm = in halbtc8192e2ant_action_algorithm() 642 algorithm = BT_8192E_2ANT_COEX_ALGO_SCO; in halbtc8192e2ant_action_algorithm() 646 algorithm = BT_8192E_2ANT_COEX_ALGO_PANEDR_HID; in halbtc8192e2ant_action_algorithm() 651 algorithm = BT_8192E_2ANT_COEX_ALGO_SCO; in halbtc8192e2ant_action_algorithm() [all …]
|
D | halbtc8723b2ant.c | 424 u8 algorithm = BT_8723B_2ANT_COEX_ALGO_UNDEFINED; in btc8723b2ant_action_algorithm() local 432 return algorithm; in btc8723b2ant_action_algorithm() 448 algorithm = BT_8723B_2ANT_COEX_ALGO_SCO; in btc8723b2ant_action_algorithm() 453 algorithm = BT_8723B_2ANT_COEX_ALGO_HID; in btc8723b2ant_action_algorithm() 457 algorithm = BT_8723B_2ANT_COEX_ALGO_A2DP; in btc8723b2ant_action_algorithm() 462 algorithm = in btc8723b2ant_action_algorithm() 467 algorithm = in btc8723b2ant_action_algorithm() 477 algorithm = BT_8723B_2ANT_COEX_ALGO_PANEDR_HID; in btc8723b2ant_action_algorithm() 481 algorithm = BT_8723B_2ANT_COEX_ALGO_PANEDR_HID; in btc8723b2ant_action_algorithm() 486 algorithm = BT_8723B_2ANT_COEX_ALGO_SCO; in btc8723b2ant_action_algorithm() [all …]
|
/linux-4.4.14/arch/arm64/crypto/ |
D | Kconfig | 12 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 17 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
|
/linux-4.4.14/net/sched/ |
D | Kconfig | 51 scheduling algorithm. This algorithm classifies the waiting packets 68 packet scheduling algorithm. See 73 different properties and different algorithm. 82 (HFSC) packet scheduling algorithm. 123 packet scheduling algorithm. 134 packet scheduling algorithm. 145 packet scheduling algorithm. 156 scheduling algorithm. This queueing discipline allows the combination 168 scheduling algorithm. 179 (GRED) packet scheduling algorithm for some of your network devices [all …]
|
/linux-4.4.14/net/mac80211/ |
D | Kconfig | 27 This option enables the 'minstrel' TX rate control algorithm 34 This option enables the 'minstrel_ht' TX rate control algorithm 41 This option enables VHT in the 'minstrel_ht' TX rate control algorithm 44 prompt "Default rate control algorithm" 48 This option selects the default rate control algorithm 57 Select Minstrel as the default rate control algorithm. 70 comment "Some wireless drivers require a rate control algorithm"
|
D | debugfs_key.c | 84 KEY_OPS(algorithm); 359 DEBUGFS_ADD(algorithm); in ieee80211_debugfs_key_add()
|
D | mlme.c | 2566 ieee80211_send_auth(sdata, 3, auth_data->algorithm, 0, in ieee80211_auth_challenge() 2602 if (auth_alg != ifmgd->auth_data->algorithm || in ieee80211_rx_mgmt_auth() 2605 mgmt->sa, auth_alg, ifmgd->auth_data->algorithm, in ieee80211_rx_mgmt_auth() 2622 switch (ifmgd->auth_data->algorithm) { in ieee80211_rx_mgmt_auth() 2637 ifmgd->auth_data->algorithm); in ieee80211_rx_mgmt_auth() 2649 if (ifmgd->auth_data->algorithm == WLAN_AUTH_SAE && in ieee80211_rx_mgmt_auth() 3736 if (auth_data->algorithm == WLAN_AUTH_SAE) { in ieee80211_auth() 3746 ieee80211_send_auth(sdata, trans, auth_data->algorithm, status, in ieee80211_auth() 4518 auth_data->algorithm = auth_alg; in ieee80211_mgd_auth()
|
D | ieee80211_i.h | 369 u16 algorithm, expected_transaction; member
|
/linux-4.4.14/Documentation/ |
D | module-signing.txt | 35 SHA-512 (the algorithm is selected by data in the signature). 76 (3) "Which hash algorithm should modules be signed with?" 78 This presents a choice of which hash algorithm the installation phase will 87 The algorithm selected here will also be built into the kernel (rather 88 than being a module) so that modules signed with that algorithm can have 212 1. The hash algorithm (e.g., sha256) 222 The hash algorithm used does not have to match the one configured, but if it 223 doesn't, you should make sure that hash algorithm is either built into the
|
D | md-cluster.txt | 75 The algorithm is: 156 to be added. For this, the following algorithm is used:
|
D | kmemleak.txt | 85 The scanning algorithm steps: 188 To keep the algorithm simple, kmemleak scans for values pointing to any
|
D | crc32.txt | 134 the parallelism. With the classic Sarwate algorithm, each table lookup 147 twice as fast as the basic Sarwate algorithm.
|
D | assoc_array.txt | 317 iteration algorithm should not, however, miss any objects. 490 algorithm will insert a shortcut to skip over the '1111' keyspace in a single 498 insertion algorithm finds that it is trying to insert a 17th object into a
|
D | xz.txt | 9 algorithm (filter) is LZMA2. Additional filters can be used to improve
|
D | lzo.txt | 74 an implementation design choice independant on the algorithm or encoding.
|
D | kernel-parameters.txt | 583 algorithm. Accepted values range from 0 to 7
|
/linux-4.4.14/Documentation/networking/ |
D | dctcp.txt | 4 DCTCP is an enhancement to the TCP congestion control algorithm for data 23 The algorithm is further described in detail in the following two
|
D | baycom.txt | 104 the software DCD algorithm (see below). 121 utilise a software DCD algorithm (options=1) or use a DCD signal from 125 open. It is highly recommended to use the software DCD algorithm, 129 par96: the software DCD algorithm for this type of modem is rather poor. 131 a reasonable DCD algorithm in software. Therefore, if your radio
|
D | policy-routing.txt | 64 Lookup algorithm 97 Very clean, stable and robust algorithm for OSPF routing 127 It is a funny, but pretty useless algorithm.
|
D | fib_trie.txt | 31 Note that the search algorithm will simply skip over these bits when 69 level compression algorithm on part of the trie. 72 Looks up a key, deletes it and runs the level compression algorithm.
|
D | e1000e.txt | 68 for this reason an adaptive interrupt moderation algorithm was implemented. 76 The algorithm classifies the incoming traffic every interval into 90 grid computing, the algorithm can reduce latency even more when
|
D | tcp.txt | 48 Good TCP congestion control is a complex problem because the algorithm
|
D | e1000.txt | 100 for this reason an adaptive interrupt moderation algorithm was implemented. 108 The algorithm classifies the incoming traffic every interval into 122 grid computing, the algorithm can reduce latency even more when
|
D | xfrm_sync.txt | 20 For this reason, we also add a nagle-like algorithm to restrict
|
D | de4x5.txt | 98 auto media sense algorithm is that it can now use one that is more in
|
D | cxgb.txt | 33 This feature provides an adaptive algorithm that adjusts the interrupt
|
D | ip-sysctl.txt | 227 Set the congestion control algorithm to be used for new 228 connections. The algorithm "reno" is always available, but 295 F-RTO is an enhanced recovery algorithm for TCP retransmission 1638 address selection algorithm. 1854 Select the hmac algorithm used when generating the cookie value sent by
|
D | z8530drv.txt | 520 min), and then the selected algorithm for keyup will be
|
D | bonding.txt | 847 This algorithm will place all traffic to a particular 850 This algorithm is 802.3ad compliant. 869 This algorithm will place all traffic to a particular 879 This algorithm is 802.3ad compliant. 906 This algorithm is not fully 802.3ad compliant. A
|
/linux-4.4.14/lib/ |
D | Kconfig | 121 of CRC32 algorithm. Choose the default ("slice by 8") unless you 127 Calculate checksum 8 bytes at a time with a clever slicing algorithm. 128 This is the fastest algorithm, but comes with a 8KiB lookup table. 138 Calculate checksum 4 bytes at a time with a clever slicing algorithm. 147 Calculate checksum a byte at a time using Sarwate's algorithm. This 186 algorithm. Module will be called crc8. 356 overlapping nodes. The algorithm is implemented as an 467 tristate "CORDIC algorithm" 469 This option provides an implementation of the CORDIC algorithm;
|
/linux-4.4.14/Documentation/device-mapper/ |
D | verity.txt | 13 <algorithm> <digest> <salt> 54 <algorithm> 55 The cryptographic hash algorithm used for this device. This should 56 be the name of the algorithm, like "sha1". 110 selected cryptographic digest algorithm. The hashes are linearly-ordered in
|
D | switch.txt | 37 robin algorithm to send I/O across all paths and let the storage array
|
D | dm-raid.txt | 253 1.4.2 Add RAID10 "far" and "offset" algorithm support.
|
/linux-4.4.14/drivers/crypto/ |
D | Kconfig | 26 tristate "PadLock driver for AES algorithm" 31 Use VIA PadLock for AES algorithm. 59 engine for the CryptoAPI AES algorithm. 80 tristate "SHA1 digest algorithm" 90 tristate "SHA256 digest algorithm" 100 tristate "SHA384 and SHA512 digest algorithm" 117 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). 153 tristate "GHASH digest algorithm" 158 GHASH message digest algorithm for GCM (Galois/Counter Mode). 235 to offload cryptographic algorithm computation.
|
/linux-4.4.14/drivers/i2c/algos/ |
D | Kconfig | 2 # I2C algorithm drivers configuration
|
/linux-4.4.14/Documentation/arm/ |
D | cluster-pm-race-avoidance.txt | 1 Cluster-wide Power-up/power-down race avoidance algorithm 4 This file documents the algorithm which is used to coordinate CPU and 8 The section "Rationale" explains what the algorithm is for and why it is 11 algorithm in use. 96 In this algorithm, each individual core in a multi-core processor is 102 The algorithm defines the following states for each CPU in the system: 176 race avoidance algorithm. 255 The race avoidance algorithm does not provide a way to determine 417 The race avoidance algorithm documented above does not provide a 482 As currently described and implemented, the algorithm does not [all …]
|
D | vlocks.txt | 29 The easiest way to explain the vlocks algorithm is with some pseudo-code: 69 "entering" array in Lamport's bakery algorithm [1]. 122 the basic algorithm: 171 when executing the algorithm in cached memory.
|
D | Booting | 64 method. Whether this is a hard coded value or some algorithm that
|
/linux-4.4.14/security/integrity/ima/ |
D | Kconfig | 76 prompt "Default integrity hash algorithm" 80 Select the default hash algorithm used for the measurement 82 hash algorithm can be overwritten using the kernel command
|
/linux-4.4.14/Documentation/security/ |
D | IMA-templates.txt | 62 calculated with the SHA1 or MD5 hash algorithm; 65 algorithm (field format: [<hash algo>:]digest, where the digest 66 prefix is shown only if the hash algorithm is not SHA1 or MD5);
|
D | keys-request-key.txt | 7 the requesting algorithm works.
|
/linux-4.4.14/arch/xtensa/lib/ |
D | memset.S | 121 bbci.l a5, 1, .L0 # if now aligned, return to main algorithm 128 j .L0 # dst is now aligned, return to main algorithm
|
D | memcopy.S | 113 # return to main algorithm 124 j .Ldstaligned # dst is now aligned, return to main algorithm 380 # return to main algorithm 392 # return to main algorithm
|
D | usercopy.S | 111 # return to main algorithm 122 j .Ldstaligned # dst is now aligned, return to main algorithm
|
/linux-4.4.14/Documentation/blockdev/ |
D | zram.txt | 83 3) Select compression algorithm 86 change selected compression algorithm (once the device is initialised 87 there is no way to change compression algorithm). 94 #select lzo compression algorithm 171 comp_algorithm RW show and change the compression algorithm
|
/linux-4.4.14/Documentation/frv/ |
D | atomic-ops.txt | 26 To get around this, the following algorithm has been implemented. It operates in a way similar to 34 (*) All atomic operations can then be broken down into the following algorithm: 56 This algorithm suffers from two problems:
|
/linux-4.4.14/fs/isofs/ |
D | rock.h | 78 char algorithm[2]; member
|
D | rock.c | 546 algo = isonum_721(rr->u.ZF.algorithm); in parse_rock_ridge_inode_internal() 579 rr->u.ZF.algorithm[0], in parse_rock_ridge_inode_internal() 580 rr->u.ZF.algorithm[1]); in parse_rock_ridge_inode_internal()
|
/linux-4.4.14/net/sctp/ |
D | Kconfig | 66 This option sets the default sctp cookie hmac algorithm 84 Use no hmac algorithm in SCTP cookie generation
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
D | rtw_cmd.h | 167 u8 algorithm; /* could be none, wep40, TKIP, CCMP, wep104 */ member 186 u8 algorithm; member
|
D | ieee80211.h | 741 u16 algorithm; member
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | sysfs-bus-iio-frequency-adf4350 | 7 the fractional-N PLL. It is assumed that the algorithm
|
D | sysfs-fs-ext4 | 57 algorithm will pre-read into the buffer cache
|
D | sysfs-class-uwb_rc | 40 algorithm will be used. Valid channels depends on the
|
D | sysfs-block-zram | 74 compression algorithm selection.
|
/linux-4.4.14/drivers/crypto/caam/ |
D | Kconfig | 76 tristate "Register algorithm implementations with the Crypto API" 91 tristate "Register hash algorithm implementations with Crypto API"
|
/linux-4.4.14/Documentation/devicetree/bindings/watchdog/ |
D | gpio-wdt.txt | 6 - hw_algo: The algorithm used by the driver. Should be one of the
|
/linux-4.4.14/lib/xz/ |
D | Kconfig | 5 LZMA2 compression algorithm and BCJ filters are supported using
|
/linux-4.4.14/drivers/net/wireless/b43/ |
D | main.c | 831 u8 index, u8 algorithm, const u8 *key) in key_write() argument 840 value = ((kidx << 4) | algorithm); in key_write() 968 u8 index, u8 algorithm, in do_key_write() argument 982 if (algorithm == B43_SEC_ALGO_TKIP) { in do_key_write() 997 key_write(dev, index, algorithm, buf); in do_key_write() 1001 dev->key[index].algorithm = algorithm; in do_key_write() 1005 int index, u8 algorithm, in b43_key_write() argument 1020 if (algorithm == B43_SEC_ALGO_TKIP && key_len == 32) in b43_key_write() 1051 do_key_write(dev, index, algorithm, key, key_len, mac_addr); in b43_key_write() 1055 do_key_write(dev, index + 4, algorithm, key, key_len, NULL); in b43_key_write() [all …]
|
D | xmit.c | 323 mac_ctl |= (key->algorithm << B43_TXH_MAC_KEYALG_SHIFT) & in b43_generate_txhdr() 326 if (key->algorithm == B43_SEC_ALGO_TKIP) { in b43_generate_txhdr() 732 if (dev->key[keyidx].algorithm != B43_SEC_ALGO_NONE) { in b43_rx()
|
D | b43.h | 702 u8 algorithm; member
|
/linux-4.4.14/Documentation/filesystems/pohmelfs/ |
D | info.txt | 58 with appropriate hash algorithm and key file and cipher algorithm, mode and key file:
|
D | design_notes.txt | 12 Since all Linux filesystems lock the whole inode during writing, algorithm
|
/linux-4.4.14/drivers/staging/rtl8723au/hal/ |
D | rtl8723a_bt-coexist.c | 6456 u8 algorithm = BT_2ANT_COEX_ALGO_UNDEFINED; in btdm_ActionAlgorithm() local 6534 return algorithm; in btdm_ActionAlgorithm() 6540 algorithm = BT_2ANT_COEX_ALGO_SCO; in btdm_ActionAlgorithm() 6544 algorithm = BT_2ANT_COEX_ALGO_HID; in btdm_ActionAlgorithm() 6547 algorithm = BT_2ANT_COEX_ALGO_A2DP; in btdm_ActionAlgorithm() 6551 algorithm = BT_2ANT_COEX_ALGO_PANHS; in btdm_ActionAlgorithm() 6554 algorithm = BT_2ANT_COEX_ALGO_PANEDR; in btdm_ActionAlgorithm() 6565 algorithm = BT_2ANT_COEX_ALGO_HID; in btdm_ActionAlgorithm() 6571 algorithm = BT_2ANT_COEX_ALGO_SCO; in btdm_ActionAlgorithm() 6574 algorithm = BT_2ANT_COEX_ALGO_PANEDR_HID; in btdm_ActionAlgorithm() [all …]
|
/linux-4.4.14/drivers/i2c/ |
D | Kconfig | 77 Some I2C bus drivers require so-called "I2C algorithm" modules 133 Say Y here if you want the I2C algorithm drivers to produce a bunch
|
/linux-4.4.14/drivers/staging/rtl8712/ |
D | rtl871x_cmd.h | 187 u8 algorithm; /* encryption algorithm, could be none, wep40, member 203 u8 algorithm; member
|
D | ieee80211.h | 588 u16 algorithm; member
|
D | rtl871x_cmd.c | 678 psetstakey_para->algorithm = (unsigned char) in r8712_setstakey_cmd() 682 psetstakey_para->algorithm, false); in r8712_setstakey_cmd()
|
D | rtl871x_mlme.c | 1250 psetkeyparm->algorithm = in r8712_set_key() 1253 psetkeyparm->algorithm = in r8712_set_key() 1258 switch (psetkeyparm->algorithm) { in r8712_set_key()
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
D | rtw_mlme.c | 1806 psetkeyparm->algorithm = (unsigned char) in rtw_set_key23a() 1810 psetkeyparm->algorithm); in rtw_set_key23a() 1812 psetkeyparm->algorithm = (u8)psecuritypriv->dot11PrivacyAlgrthm; in rtw_set_key23a() 1815 psetkeyparm->algorithm); in rtw_set_key23a() 1819 if (is_wep_enc(psetkeyparm->algorithm)) in rtw_set_key23a() 1823 psetkeyparm->algorithm, psetkeyparm->keyid, in rtw_set_key23a() 1827 psetkeyparm->algorithm, keyid); in rtw_set_key23a() 1829 switch (psetkeyparm->algorithm) { in rtw_set_key23a()
|
D | rtw_mlme_ext.c | 923 u16 auth_mode, seq, algorithm; in OnAuth23a() local 939 algorithm = le16_to_cpu(mgmt->u.auth.auth_alg); in OnAuth23a() 941 DBG_8723A("auth alg =%x, seq =%X\n", algorithm, seq); in OnAuth23a() 950 if ((algorithm != WLAN_AUTH_OPEN && auth_mode == 0) || in OnAuth23a() 951 (algorithm == WLAN_AUTH_OPEN && auth_mode == 1)) { in OnAuth23a() 954 algorithm, auth_mode, in OnAuth23a() 1017 if (algorithm == WLAN_AUTH_OPEN && (auth_mode == 0 || auth_mode == 2)) { in OnAuth23a() 1022 pstat->authalg = algorithm; in OnAuth23a() 1035 pstat->authalg = algorithm; in OnAuth23a() 5871 ctrl = BIT(15) | (pparm->algorithm) << 2 | pparm->keyid; in setkey_hdl23a() [all …]
|
D | rtw_cmd.c | 701 psetstakey_para->algorithm = in rtw_setstakey_cmd23a() 704 GET_ENCRY_ALGO(psecuritypriv, sta, psetstakey_para->algorithm, in rtw_setstakey_cmd23a() 770 psetstakey_para->algorithm = 0; in rtw_clearstakey_cmd23a()
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 66 algorith||algorithm 68 algoritm||algorithm 70 algorrithm||algorithm 71 algorritm||algorithm 78 alogrithm||algorithm
|
/linux-4.4.14/arch/m68k/ifpsp060/src/ |
D | ilsp.S | 86 # or 32-bit divides if possible. Else, use a special math algorithm # 190 # perform the divide algorithm: 283 # if the divisor msw is 0, use simpler algorithm then the full blown 287 bhi.b lddknuth # go use D. Knuth algorithm 290 # a simpler algorithm may be used : 320 # In this algorithm, the divisor is treated as a 2 digit (word) number
|
D | fpsp.S | 10065 # algorithm just got done playing with fp0 and expected no exceptions
|
D | fplsp.S | 8004 # in Step 2 of the algorithm for LOGN and compute #
|
/linux-4.4.14/Documentation/i2c/ |
D | summary | 34 of I2C adapters. Each specific adapter driver either depends on one algorithm
|
/linux-4.4.14/drivers/staging/rtl8723au/include/ |
D | rtw_cmd.h | 220 u32 algorithm; /* encryption algorithm, could be none, wep40, TKIP, CCMP, wep104 */ member 239 u32 algorithm; member
|
/linux-4.4.14/drivers/net/wireless/ath/ath9k/ |
D | Kconfig | 98 bool "Atheros ath9k ACK timeout estimation algorithm (EXPERIMENTAL)" 102 This option enables ath9k dynamic ACK timeout estimation algorithm
|
/linux-4.4.14/Documentation/scheduler/ |
D | sched-deadline.txt | 9 2. Scheduling algorithm 39 algorithm, augmented with a mechanism (called Constant Bandwidth Server, CBS) 43 2. Scheduling algorithm 52 consistent with the guarantee (using the CBS[2,3] algorithm). Tasks are then 59 Summing up, the CBS[2,3] algorithm assigns scheduling deadlines to tasks so 62 algorithm selects the task with the earliest scheduling deadline as the one 67 In more details, the CBS algorithm assigns scheduling deadlines to 256 (in other words, global EDF is not an optimal scheduling algorithm). However,
|
D | sched-design-CFS.txt | 47 algorithm variants to recognize sleepers.
|
/linux-4.4.14/net/bridge/ |
D | Kconfig | 15 networks of Ethernets using the IEEE 802.1 spanning tree algorithm.
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
D | rtw_mlme_ext.c | 2757 u16 algorithm; in OnAuth() local 2777 algorithm = le16_to_cpu(*(__le16 *)((size_t)pframe + WLAN_HDR_A3_LEN)); in OnAuth() 2779 DBG_88E("auth alg=%x, seq=%X\n", algorithm, seq); in OnAuth() 2785 if ((algorithm > 0 && auth_mode == 0) || /* rx a shared-key auth but shared not enabled */ in OnAuth() 2786 (algorithm == 0 && auth_mode == 1)) { /* rx a open-system auth but shared-key is enabled */ in OnAuth() 2788 algorithm, auth_mode, sa[0], sa[1], sa[2], sa[3], sa[4], sa[5]); in OnAuth() 2843 if (algorithm == 0 && (auth_mode == 0 || auth_mode == 2)) { in OnAuth() 2848 pstat->authalg = algorithm; in OnAuth() 2861 pstat->authalg = algorithm; in OnAuth() 5358 ctrl = BIT(15) | ((pparm->algorithm) << 2) | pparm->keyid; in setkey_hdl() [all …]
|
D | rtw_mlme.c | 1645 psetkeyparm->algorithm = (unsigned char)psecuritypriv->dot118021XGrpPrivacy; in rtw_set_key() 1648 psetkeyparm->algorithm)); in rtw_set_key() 1650 psetkeyparm->algorithm = (u8)psecuritypriv->dot11PrivacyAlgrthm; in rtw_set_key() 1653 psetkeyparm->algorithm)); in rtw_set_key() 1659 psetkeyparm->algorithm, psetkeyparm->keyid, pmlmepriv->key_mask); in rtw_set_key() 1662 psetkeyparm->algorithm, keyid)); in rtw_set_key() 1664 switch (psetkeyparm->algorithm) { in rtw_set_key()
|
D | rtw_cmd.c | 641 psetstakey_para->algorithm = (unsigned char)psecuritypriv->dot11PrivacyAlgrthm; in rtw_setstakey_cmd() 643 GET_ENCRY_ALGO(psecuritypriv, sta, psetstakey_para->algorithm, false); in rtw_setstakey_cmd() 701 psetstakey_para->algorithm = _NO_PRIVACY_; in rtw_clearstakey_cmd()
|
/linux-4.4.14/Documentation/RCU/ |
D | UP.txt | 16 Suppose that an RCU-based algorithm scans a linked list containing 38 Suppose that an RCU-based algorithm again scans a linked list containing
|
D | RTFP.txt | 46 in read-mostly situations. This algorithm does take pains to avoid 264 This restriction makes this algorithm unsuitable for use in 297 This restriction makes this algorithm unsuitable for use in 586 Outline of algorithm to unload modules... 2086 ,Title="[{RFC}][{PATCH}] rcu classic: new algorithm for callbacks-processing" 2094 Updated RCU classic algorithm. Introduced multi-tailed list
|
D | whatisRCU.txt | 620 occur when using this algorithm in a real-world Linux 933 occur when using this algorithm in a real-world Linux 935 algorithm.]
|
/linux-4.4.14/kernel/time/ |
D | Kconfig | 162 therefore uses a fast but non-scalable algorithm for small 163 systems and a lazier but scalable algorithm for large systems.
|
/linux-4.4.14/drivers/net/wireless/b43legacy/ |
D | xmit.c | 253 mac_ctl |= (key->algorithm << in generate_txhdr_fw3() 494 if (dev->key[keyidx].algorithm != B43legacy_SEC_ALGO_NONE) { in b43legacy_rx()
|
D | b43legacy.h | 561 u8 algorithm; member
|
/linux-4.4.14/Documentation/hwmon/ |
D | adt7470 | 72 order for the automatic pwm algorithm to run. This was the case for earlier
|
D | abituguru-datasheet | 127 algorithm described above will still work. 147 algorithm described above will still work.
|
D | vt1211 | 193 Long story short, the controller implements the following algorithm to set the
|
D | asc7621 | 85 control algorithm is employed to minimize acoustic impact while achieving
|
D | lm93 | 53 controlled by up to four temperature zones. The fancontrol algorithm is lookup
|
/linux-4.4.14/Documentation/w1/slaves/ |
D | w1_therm | 55 detection algorithm. This feature allows you to determine the physical
|
/linux-4.4.14/drivers/net/ppp/ |
D | Kconfig | 63 Deflate algorithm (the same algorithm that gzip uses) to compress
|
/linux-4.4.14/drivers/md/ |
D | raid5.h | 441 int level, algorithm, rmw_level; member
|
D | raid5.c | 2544 int algorithm = previous ? conf->prev_algo in raid5_compute_sector() local 2545 : conf->algorithm; in raid5_compute_sector() 2575 switch (algorithm) { in raid5_compute_sector() 2607 switch (algorithm) { in raid5_compute_sector() 2744 int algorithm = previous ? conf->prev_algo in raid5_compute_blocknr() local 2745 : conf->algorithm; in raid5_compute_blocknr() 2761 switch (algorithm) { in raid5_compute_blocknr() 2785 switch (algorithm) { in raid5_compute_blocknr() 6607 conf->algorithm = mddev->new_layout; in setup_conf() 6614 conf->prev_algo = conf->algorithm; in setup_conf() [all …]
|
D | dm-raid.c | 83 const unsigned algorithm; /* RAID algorithm. */ member 172 rs->md.layout = raid_type->algorithm; in context_alloc()
|
/linux-4.4.14/Documentation/video4linux/ |
D | sh_mobile_ceu_camera.txt | 1 Cropping and Scaling algorithm, used in the sh_mobile_ceu_camera driver
|
D | vivid.txt | 985 The scaler is a simple scaler that uses the Coarse Bresenham algorithm. It's
|
/linux-4.4.14/Documentation/ABI/stable/ |
D | sysfs-driver-ib_srp | 166 SRP credit algorithm in the SRP specification. 188 information see also the SRP credit algorithm in the SRP
|
/linux-4.4.14/Documentation/devicetree/bindings/i2c/ |
D | i2c-arb-gpio-challenge.txt | 27 The basic algorithm is to assert your line when you want the bus, then make
|
/linux-4.4.14/Documentation/filesystems/ |
D | f2fs.txt | 570 In the greedy algorithm, F2FS selects a victim segment having the smallest number 571 of valid blocks. In the cost-benefit algorithm, F2FS selects a victim segment 573 log block thrashing problem in the greedy algorithm. F2FS adopts the greedy 574 algorithm for on-demand cleaner, while background cleaner adopts cost-benefit 575 algorithm.
|
D | romfs.txt | 80 accessible, whichever is smaller). The applied algorithm is the same 83 the source. This algorithm was chosen because although it's not quite
|
D | ntfs.txt | 416 which parity algorithm to use by specifying the option "parity-algorithm 417 which", where you need to replace "which" with the name of the algorithm to 421 otherwise. If you find which algorithm works please let us know (email the
|
D | gfs2-glocks.txt | 139 smoothed exponential estimates and the algorithm used is 174 3. To improve the algorithm for selecting resource groups for
|
D | ext4.txt | 201 table readahead algorithm will pre-read into 285 algorithm used is designed to automatically tune 462 table readahead algorithm will pre-read into
|
D | vfat.txt | 325 following algorithm:
|
D | hpfs.txt | 28 heuristic algorithm that I removed. I thing it's danger to let the
|
D | ext2.txt | 99 blocks. The block allocation algorithm attempts to allocate data blocks
|
D | path-lookup.txt | 18 algorithm changed this by holding the dcache_lock at the beginning and walking
|
D | xfs-delayed-logging-design.txt | 588 To keep pin/unpin symmetry, the algorithm needs to change to a "pin on 634 are in progress). Ultimately a two pass algorithm where the formatting is done
|
D | sharedsubtree.txt | 896 The overall algorithm breaks the operation into 3 phases: (look at
|
/linux-4.4.14/fs/reiserfs/ |
D | README | 126 textbook he got the algorithm from in the code. Note that his analysis 128 was probably more important than the actual algorithm. Colin Plumb also
|
/linux-4.4.14/Documentation/driver-model/ |
D | binding.txt | 30 algorithm, it is up to the bus driver to provide a callback to compare
|
/linux-4.4.14/Documentation/rapidio/ |
D | rapidio.txt | 236 implemented according to the enumeration algorithm outlined in the RapidIO 247 algorithm. When a new device is found, the enumerator takes ownership of that 278 into the routing table. The algorithm recurs by calling itself with hopcount + 1
|
/linux-4.4.14/Documentation/dmaengine/ |
D | provider.txt | 168 algorithm against a memory buffer. 172 simple XOR, and Q being a Reed-Solomon algorithm. 176 algorithm against a memory buffer.
|
/linux-4.4.14/drivers/char/tpm/ |
D | tpm.h | 337 u8 algorithm[4]; member
|
/linux-4.4.14/Documentation/early-userspace/ |
D | buffer-format.txt | 79 algorithm used.
|
/linux-4.4.14/Documentation/filesystems/nfs/ |
D | pnfs.txt | 41 hashing and variations of this algorithm can be found at:
|
/linux-4.4.14/net/ipv4/ |
D | Kconfig | 510 tristate "TCP-Hybla congestion control algorithm" 533 MIMD congestion control algorithm which has some nice scaling 541 TCP Low Priority (TCP-LP), a distributed algorithm whose goal is 563 algorithm, which uses a mixed loss/delay approach to compute the
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_softmac.c | 671 auth->algorithm = WLAN_AUTH_OPEN; in ieee80211_authentication_req() 673 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in ieee80211_authentication_req() 675 auth->algorithm = WLAN_AUTH_OPEN;//0x80; in ieee80211_authentication_req() 676 printk("=================>%s():auth->algorithm is %d\n",__func__,auth->algorithm); in ieee80211_authentication_req() 913 auth->algorithm = cpu_to_le16(WLAN_AUTH_OPEN); in ieee80211_auth_resp() 1570 if (le16_to_cpu(a->algorithm) != WLAN_AUTH_OPEN) in auth_rq_parse()
|
D | ieee80211.h | 964 __le16 algorithm; member
|
/linux-4.4.14/arch/sh/lib64/ |
D | copy_user_memcpy.S | 25 ! but the algorithm used needs some comparison.
|
D | memcpy.S | 27 ! but the algorithm used needs some comparison.
|
/linux-4.4.14/Documentation/trace/ |
D | events-kmem.txt | 91 can be allocated and freed on the same CPU through some algorithm change.
|
D | ring-buffer-design.txt | 66 algorithm. The writers act like a "stack". The way interrupts works 191 This case is still valid for this algorithm. 394 The main idea behind the lockless algorithm is to combine the moving
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
D | hfa384x.h | 413 u16 algorithm; member 725 u16 algorithm; member
|
D | prism2sta.c | 1688 rec.algorithm = inf->info.authreq.algorithm; in prism2sta_inf_authreq_defer()
|
/linux-4.4.14/arch/x86/ |
D | Kconfig.debug | 325 compilers. The gcc 4.x series have a rewritten inlining algorithm and 327 this algorithm is so good that allowing gcc 4.x and above to make the
|
/linux-4.4.14/init/ |
D | Kconfig | 161 This compression algorithm's ratio is best. Decompression speed 169 XZ uses the LZMA2 algorithm and instruction set specific 859 scenerio while allowing a simple algorithm to be used from bootup. 1940 prompt "Which hash algorithm should modules be signed with?" 1943 This determines which sort of hashing algorithm will be used during 1944 signature generation. This algorithm _must_ be built into the kernel 1946 possible to load a signed module containing the algorithm to check 1986 xz depending on "Compression algorithm" below. 2001 prompt "Compression algorithm"
|
/linux-4.4.14/Documentation/vm/ |
D | balance | 49 the balancing algorithm works the same way on the various architectures,
|
D | cleancache.txt | 8 pages that the kernel's pageframe replacement algorithm (PFRA) would like
|
/linux-4.4.14/Documentation/video4linux/bttv/ |
D | Insmod-options | 60 algorithm. You may use lower numbers, if I2C
|
/linux-4.4.14/Documentation/arm/nwfpe/ |
D | README.FPE | 87 These are fully implemented as well. They use the same algorithm as the
|
/linux-4.4.14/Documentation/fb/ |
D | modedb.txt | 71 Formula (GTF) which is an algorithm to calculate the timings, given the
|
/linux-4.4.14/arch/m68k/fpsp040/ |
D | slogn.S | 46 | of the algorithm for LOGN and compute log(1+X) as
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 802 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req() 804 auth->algorithm = cpu_to_le16(WLAN_AUTH_SHARED_KEY); in rtllib_authentication_req() 806 auth->algorithm = WLAN_AUTH_OPEN; in rtllib_authentication_req() 1044 auth->algorithm = cpu_to_le16(WLAN_AUTH_OPEN); in rtllib_auth_resp() 1819 if (le16_to_cpu(a->algorithm) != WLAN_AUTH_OPEN) in auth_rq_parse()
|
D | rtllib.h | 857 __le16 algorithm; member
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | libipw.h | 409 __le16 algorithm; member
|
/linux-4.4.14/Documentation/thermal/ |
D | sysfs-api.txt | 247 This file gives information about the algorithm that is currently 249 algorithm or user space application.
|
D | intel_powerclamp.txt | 206 we have a simple algorithm to double the injection ratio. A possible
|
/linux-4.4.14/Documentation/powerpc/ |
D | qe_firmware.txt | 276 this algorithm:
|
/linux-4.4.14/arch/x86/crypto/ |
D | chacha20-avx2-x86_64.S | 34 # algorithm performs each operation on the corresponding word of each
|
D | chacha20-ssse3-x86_64.S | 153 # algorithm performs each operation on the corresponding word of each
|
D | aesni-intel_asm.S | 1136 # middle section of the temp results combined as in karatsuba algorithm
|
/linux-4.4.14/Documentation/virtual/kvm/ |
D | msr.txt | 149 The suggested algorithm for detecting kvmclock presence is then:
|
D | api.txt | 1785 following algorithm:
|
/linux-4.4.14/drivers/net/ethernet/neterion/vxge/ |
D | vxge-config.h | 2083 enum vxge_hw_rth_algoritms algorithm,
|
D | vxge-config.c | 3718 enum vxge_hw_rth_algoritms algorithm, in vxge_hw_vpath_rts_rth_set() argument 3742 VXGE_HW_RTS_ACCESS_STEER_DATA0_RTH_GEN_ALG_SEL(algorithm); in vxge_hw_vpath_rts_rth_set()
|
/linux-4.4.14/Documentation/power/ |
D | basic-pm-debugging.txt | 157 in accordance with the algorithm:
|
/linux-4.4.14/Documentation/locking/ |
D | rt-mutex-design.txt | 16 inheritance (PI) algorithm that is used, as well as reasons for the 89 algorithm. These locks disable preemption for UP (when 700 algorithm needs to be careful. This is because the current process is
|
D | ww-mutex-design.txt | 26 The algorithm that the TTM graphics subsystem came up with for dealing with
|
/linux-4.4.14/Documentation/block/ |
D | biodoc.txt | 224 iii. The i/o scheduler algorithm itself can be replaced/set as appropriate 231 i/o scheduling algorithm aspects and details outside of the generic loop. 983 The generic i/o scheduler algorithm attempts to sort/merge/batch requests for 1014 Plugging is an approach that the current i/o scheduling algorithm resorts to so
|
/linux-4.4.14/Documentation/acpi/ |
D | enumeration.txt | 395 device identification algorithm. If the "compatible" property is not present
|
/linux-4.4.14/Documentation/scsi/ |
D | ChangeLog.sym53c8xx | 337 - Simpler algorithm to deal with SCSI command starvation. 345 algorithm (from Stefan Esser) is better than 2%, this should
|
D | ChangeLog.megaraid | 365 is free to change its mapping algorithm in the future if necessary .."
|
D | ChangeLog.ncr53c8xx | 441 - New CCB starvation avoiding algorithm.
|
D | st.txt | 482 used as the compression algorithm. The value
|
/linux-4.4.14/sound/oss/ |
D | CHANGELOG | 154 - Changed audio buffer partitioning algorithm so that it selects
|
/linux-4.4.14/Documentation/devicetree/bindings/thermal/ |
D | thermal.txt | 11 not about how the system must control or which algorithm or policy
|
/linux-4.4.14/Documentation/sound/oss/ |
D | README.OSS | 58 Rob Hooft Volume computation algorithm for the FM synth. 61 Greg Lee Volume computation algorithm for the GUS and 1064 DSP algorithm which is used to for the general MIDI emulation. The 1065 algorithm file (.ld) is read by the config program and written to a
|
/linux-4.4.14/Documentation/cgroups/ |
D | memory.txt | 250 The reclaim algorithm has not been modified for cgroups, except that 609 limit, the reclaim algorithm reclaims from the tasks in the ancestor and the
|
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/ |
D | ioctl_cfg80211.c | 410 psetstakey_para->algorithm = psta->dot118021XPrivacy; in set_pairwise_key() 453 psetkeyparm->algorithm = alg; in set_group_key()
|
/linux-4.4.14/arch/x86/math-emu/ |
D | README | 60 (2) Divide has been tuned to get reasonable performance. The algorithm
|
/linux-4.4.14/drivers/staging/rtl8188eu/os_dep/ |
D | ioctl_linux.c | 2137 psetstakey_para->algorithm = (u8)psta->dot118021XPrivacy; in set_pairwise_key() 2176 psetkeyparm->algorithm = alg; in set_group_key()
|
/linux-4.4.14/mm/ |
D | Kconfig | 444 for clean pages that the kernel's pageframe replacement algorithm
|
/linux-4.4.14/Documentation/isdn/ |
D | README | 209 Bit 0: 0 = Use delayed tty-send-algorithm
|
/linux-4.4.14/Documentation/mtd/ |
D | nand_ecc.txt | 686 The algorithm itself is pretty straightforward. Just xor the given and
|
/linux-4.4.14/arch/arm/mm/ |
D | Kconfig | 784 bool "Round robin I and D cache replacement algorithm"
|
/linux-4.4.14/Documentation/DocBook/ |
D | device-drivers.xml.db | 1085 API-struct-i2c-algorithm
|
/linux-4.4.14/Documentation/x86/ |
D | boot.txt | 730 The kernel runtime start address is determined by the following algorithm:
|
/linux-4.4.14/net/netfilter/ |
D | Kconfig | 997 what packets. The work-load sharing algorithm is based on source
|
/linux-4.4.14/Documentation/laptops/ |
D | thinkpad-acpi.txt | 1161 internal algorithm, usually based on readings from the thermal sensors.
|