Searched refs:Hash (Results 1 – 25 of 38) sorted by relevance
12
| /f-stack/freebsd/netgraph/ |
| H A D | ng_pred1.c | 69 #define HASH(x) priv->Hash = (priv->Hash << 4) ^ (x) 78 uint16_t Hash; member 575 priv->Hash = 0; in Pred1Init() 596 if (priv->GuessTable[priv->Hash] == *source) in Pred1Compress() 601 priv->GuessTable[priv->Hash] = *source; in Pred1Compress() 634 *dest = priv->GuessTable[priv->Hash]; in Pred1Decompress() 641 priv->GuessTable[priv->Hash] = *source; in Pred1Decompress() 663 priv->GuessTable[priv->Hash] = *source; in Pred1SyncTable()
|
| /f-stack/freebsd/contrib/device-tree/Bindings/dma/ |
| H A D | ste-dma40.txt | 111 49: Crypto Accelerator 1 TX or Hash Accelerator 1 TX 112 50: Hash Accelerator 1 TX 124 62: Crypto Accelerator 0 TX or Hash Accelerator 0 TX 125 63: Hash Accelerator 0 TX
|
| /f-stack/dpdk/doc/guides/prog_guide/ |
| H A D | packet_framework.rst | 253 Hash Table Design 256 Hash Table Overview 283 **Hash Function** 296 **Hash Table** 334 Hash Table Use Cases 360 *Hash table name:* ARP table 368 Hash Table Types 420 #. **Extendable Bucket Hash Table.** 473 Key Size Optimized Hash Tables 531 Configurable Key Size Hash Table [all …]
|
| H A D | hash_lib.rst | 7 Hash Library 10 The DPDK provides a Hash Library for creating hash table for fast lookup. 12 For increased performance the DPDK Hash requires that all the keys have the same number of bytes wh… 14 Hash API Overview 27 * Hash function to translate the key into a hash value 29 The main methods exported by the Hash Library are: 42 Apart from the basic methods explained above, the Hash Library API provides a few more advanced met… 105 …RCU QSBR process is integrated within the Hash library for safe freeing of the position. Applicati… 130 The hash library uses the Cuckoo Hash algorithm to resolve collisions. 134 The Hash Library uses a hash function (configurable) to translate the input key into a 4-byte hash … [all …]
|
| H A D | overview.rst | 23 Other libraries, outside of EAL, including the Hash, 152 The DPDK includes Hash (librte_hash) and Longest Prefix Match (LPM,librte_lpm) 155 See :ref:`Hash Library <Hash_Library>` and :ref:`LPM Library <LPM_Library>` for more information.
|
| H A D | efd_lib.rst | 89 target. The flow table (e.g. DPDK RTE Hash Library) will simply store 123 Searching for Perfect Hash Function 330 Perfect Hash Search - Assigned Keys & Target Value 342 Perfect Hash Search - Satisfy Target Values 354 Finding Hash Index for Conflict Free lookup_table
|
| H A D | member_lib.rst | 86 schemes are presented including (a) vector of Bloom Filters and (b) Hash-Table based 176 Hash-Table based Set-Summaries 179 Hash-table based set-summary (HTSS) is another scheme in the membership library. 286 For example, ``num_keys`` parameter means the maximum number of entries for Hash table based set-su… 386 [Member-bloom] B H Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communicati…
|
| /f-stack/app/redis-5.0.5/utils/hashtable/ |
| H A D | README | 1 Hash table implementation related utilities.
|
| /f-stack/dpdk/doc/guides/cryptodevs/ |
| H A D | caam_jr.rst | 62 Hash algorithms: 86 * Hash followed by Cipher mode is not supported
|
| H A D | dpaa_sec.rst | 64 Hash algorithms: 101 * Hash followed by Cipher mode is not supported
|
| H A D | nitrox.rst | 23 Hash algorithms:
|
| H A D | dpaa2_sec.rst | 116 Hash algorithms: 151 * Hash followed by Cipher mode is not supported
|
| H A D | openssl.rst | 98 * Hash only is not supported for GCM and GMAC.
|
| H A D | mvsam.rst | 35 Hash algorithms:
|
| H A D | virtio.rst | 19 Hash algorithms:
|
| H A D | bcmfs.rst | 35 Hash algorithms:
|
| H A D | octeontx.rst | 30 Hash Algorithms
|
| H A D | octeontx2.rst | 35 Hash algorithms:
|
| H A D | ccp.rst | 29 Hash algorithms:
|
| H A D | aesni_mb.rst | 42 Hash algorithms:
|
| /f-stack/freebsd/contrib/device-tree/Bindings/crypto/ |
| H A D | atmel-crypto.txt | 48 * Secure Hash Algorithm (SHA)
|
| /f-stack/dpdk/doc/guides/sample_app_ug/ |
| H A D | l2_forward_crypto.rst | 70 * chain: select the operation chaining to perform: Cipher->Hash (CIPHER_HASH), 72 Hash->Cipher (HASH_CIPHER), Cipher (CIPHER_ONLY), Hash (HASH_ONLY) 76 (default is Cipher->Hash)
|
| H A D | l3_forward.rst | 195 Hash Initialization 204 The Hash initialization will setup both ipv4 and ipv6 hash table, 293 Packet Forwarding for Hash-based Lookups
|
| /f-stack/dpdk/doc/guides/rel_notes/ |
| H A D | release_2_0.rst | 58 * Architecture Independent CRC Hash
|
| /f-stack/app/redis-5.0.5/tests/unit/type/ |
| H A D | hash.tcl | 255 test {Is a ziplist encoded Hash promoted on big payload?} { 441 test {Hash ziplist regression test for large keys} {
|
12