| /linux/scripts/crypto/ |
| H A D | gen-hash-testvecs.py | 177 hashes = b'' 182 hashes += h.digest() 185 compute_hash(alg, hashes)) 239 hashes = b'' 241 hashes += Polyval(key).update(b'\xff' * data_len).digest() 244 Polyval(key).update(hashes).digest())
|
| /linux/net/sched/ |
| H A D | sch_sfb.c | 89 u32 hashes[2]; member 104 return sfb_skb_cb(skb)->hashes[slot]; in sfb_hash() 142 sfbhash = cb->hashes[0]; in increment_qlen() 146 sfbhash = cb->hashes[1]; in increment_qlen() 329 sfb_skb_cb(skb)->hashes[slot] = sfbhash; in sfb_enqueue() 347 sfb_skb_cb(skb)->hashes[slot] = 0; in sfb_enqueue() 362 sfb_skb_cb(skb)->hashes[slot] = sfbhash; in sfb_enqueue()
|
| /linux/drivers/net/usb/ |
| H A D | dm9601.c | 279 u8 *hashes = (u8 *) & dev->data; in dm9601_set_multicast() local 282 memset(hashes, 0x00, DM_MCAST_SIZE); in dm9601_set_multicast() 283 hashes[DM_MCAST_SIZE - 1] |= 0x80; /* broadcast address */ in dm9601_set_multicast() 295 hashes[crc >> 3] |= 1 << (crc & 0x7); in dm9601_set_multicast() 299 dm_write_async(dev, DM_MCAST_ADDR, DM_MCAST_SIZE, hashes); in dm9601_set_multicast()
|
| /linux/Documentation/pcmcia/ |
| H A D | devicetable.rst | 10 - product ID strings _and_ hashes of these strings 18 hashes of the string to the macro, e.g. if you want to match the product ID
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 51 inaccessible. You can place hashes to the same partition as data, in this 52 case hashes are placed after <num_data_blocks>. 154 If verity hashes are in cache and the IO size does not exceed the limit, 173 After instantiation, all hashes will be verified on-demand during 178 Cryptographic hashes are used to assert the integrity of the device on a 180 into the page cache. Block hashes are stored linearly, aligned to the nearest 197 selected cryptographic digest algorithm. The hashes are linearly-ordered in
|
| /linux/security/apparmor/ |
| H A D | Kconfig | 60 bool "Enable introspection of sha256 hashes for loaded profiles" 66 hashes is available to userspace via the apparmor 77 is enabled by default. The generation of sha256 hashes for
|
| /linux/Documentation/bpf/ |
| H A D | map_bloom_filter.rst | 37 The number of hashes to use for the bloom filter is configurable using 40 functions. In general, using more hashes decreases both the false 150 .map_extra = 3); /* number of hashes */
|
| /linux/fs/xfs/scrub/ |
| H A D | dabtree.h | 13 xfs_dahash_t hashes[XFS_DA_NODE_MAXDEPTH]; member
|
| H A D | dabtree.c | 126 if (hash < ds->hashes[level]) in xchk_da_btree_hash() 128 ds->hashes[level] = hash; in xchk_da_btree_hash()
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 22 hashes, to ensure integrity. Afterwards KVM can run the PVM via the 56 The PV header contains the keys and hashes, which the UV will use to
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 47 (logging file hashes before use). 67 file hashes. (Similarly, dm-verity does not mandate a particular 68 scheme for authenticating its block device root hashes.) Options for 69 authenticating fs-verity file hashes include: 284 the same order that their hashes are themselves hashed. 396 This section describes how fs-verity hashes the file contents using a 412 level of hashes. Then, the hashes in this first level are grouped 414 these blocks are hashed, producing the second level of hashes. This 629 when the file is, since it contains hashes of the plaintext data. 775 hashed and what to do with those hashes, such as log them, [all …]
|
| H A D | ubifs-authentication.rst | 262 data, the hashes of their parent index nodes thus cover all the file contents 266 Whenever a file is read, UBIFS can verify the hashes from each leaf node up to 319 hashes to index nodes does not change this since each hash will be persisted
|
| /linux/certs/ |
| H A D | Makefile | 16 $(AWK) -f $(src)/check-blacklist-hashes.awk $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) >&2; \
|
| H A D | Kconfig | 155 If set, this option should be the filename of a list of hashes in the 160 Certificate hashes can be generated with
|
| /linux/tools/testing/selftests/net/rds/ |
| H A D | README.txt | 7 corruption. A workload of 50000 hashes, each 64 characters in size,
|
| /linux/security/integrity/ |
| H A D | Kconfig | 117 hashes to the .blacklist keyring for powerpc based platforms.
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-script-python.txt | 248 (implemented in Core.py) that implements Perl's 'autovivifying' hashes 249 in Python i.e. with autovivifying hashes, you can assign nested hash 599 dictionary that implements Perl's 'autovivifying' hashes in Python 600 i.e. with autovivifying hashes, you can assign nested hash values
|
| /linux/Documentation/networking/ |
| H A D | nexthop-group-resilient.rst | 16 hashes to each next hop in the group, and then selects the next hop by 53 algorithm, the range of hashes associated with a next hop must be
|
| /linux/Documentation/ABI/stable/ |
| H A D | sysfs-class-tpm | 106 1.2 chips, PCRs represent SHA-1 hashes, which are 20 bytes
|
| /linux/fs/smb/client/ |
| H A D | Kconfig | 76 man-in-the-middle attacks and stronger crypto hashes, so the use
|
| /linux/Documentation/crypto/ |
| H A D | krb5.rst | 251 A template AEAD crypto algorithm, called "krb5enc", is provided that hashes the
|
| /linux/Documentation/timers/ |
| H A D | hrtimers.rst | 92 such as radix trees and hashes, we chose the red black tree as the basic
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 76 hashes, these measurement changes are difficult to assess or
|
| /linux/drivers/crypto/ |
| H A D | Kconfig | 585 (default), hashes-only, or skciphers-only. 621 Enable hashes/HMAC algorithms only:
|
| /linux/Documentation/filesystems/ext4/ |
| H A D | super.rst | 239 - Default hash algorithm to use for directory hashes. See super_def_hash_
|