Searched full:cryptography (Results 1 – 25 of 47) sorted by relevance
12
267 The standard Zbkb bitmanip instructions for cryptography as ratified268 in version 1.0 of RISC-V Cryptography Extensions Volume I274 in version 1.0 of RISC-V Cryptography Extensions Volume I280 in version 1.0 of RISC-V Cryptography Extensions Volume I353 The standard Zk Standard Scalar cryptography extension as ratified354 in version 1.0 of RISC-V Cryptography Extensions Volume I360 version 1.0 of RISC-V Cryptography Extensions Volume I366 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I372 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I378 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I[all …]
128 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.131 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.134 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.137 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.140 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.143 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.146 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.149 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.152 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.155 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.
119 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC…126 …cycles when the ECC coprocessor is busy performing the elliptic-curve cryptography (ECC) functions…133 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC…140 … counts the total number of CPU cycles blocked for the elliptic-curve cryptography (ECC) functions…
15 Cryptography (ECC) device provides hardware acceleration for elliptic curve16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
289 cryptography293 cryptography296 number of TX and RX sessions opened with host cryptography299 number of TX and RX sessions opened with NIC cryptography305 number of RX resyncs sent to NICs handling cryptography
149 Build support for MACsec cryptography-offload acceleration in the NIC.157 Build support for IPsec cryptography-offload acceleration in the NIC.165 Build support for TLS cryptography-offload acceleration in the NIC.
67 | Enables :ref:`IPSec XFRM cryptography-offload acceleration <xfrm_device>`.72 | Build support for MACsec cryptography-offload acceleration in the NIC.83 | TLS cryptography-offload acceleration.
4 Asymmetric / Public-key Cryptography Key Type22 public-key cryptography, without imposing any particular restrictions on the23 form or mechanism of the cryptography or form of the key.92 Three enums are defined there for representing public-key cryptography
2 /* Asymmetric public-key cryptography data parser
2 /* Asymmetric public-key cryptography key subtype
2 /* Asymmetric Public-key cryptography key type interface
73 using digital certificates and public-key cryptography that eliminate
3 * Processor Activity Instrumentation support for cryptography counters
203 unsigned long ccc : 1; /* Cryptography counter control */
3 * caam - Freescale FSL CAAM support for Public Key Cryptography descriptors
137 bool "Register public key cryptography implementations with Crypto API"
51 Elliptic Curve Cryptography (ECC) hardware acceleration for use with
13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
41 * Public key cryptography signature data
192 bool "IPSec XFRM cryptography-offload acceleration"218 bool "IPSec XFRM cryptography-offload acceleration"
44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
43 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')