Home
last modified time | relevance | path

Searched refs:hashes (Results 1 – 25 of 40) sorted by relevance

12

/linux-6.15/net/sched/
H A Dsch_sfb.c89 u32 hashes[2]; member
104 return sfb_skb_cb(skb)->hashes[slot]; in sfb_hash()
142 sfbhash = cb->hashes[0]; in increment_qlen()
146 sfbhash = cb->hashes[1]; in increment_qlen()
329 sfb_skb_cb(skb)->hashes[slot] = sfbhash; in sfb_enqueue()
347 sfb_skb_cb(skb)->hashes[slot] = 0; in sfb_enqueue()
362 sfb_skb_cb(skb)->hashes[slot] = sfbhash; in sfb_enqueue()
/linux-6.15/drivers/net/usb/
H A Dsr9700.c271 u8 *hashes = (u8 *)&dev->data; in sr9700_set_multicast() local
275 memset(hashes, 0x00, SR_MCAST_SIZE); in sr9700_set_multicast()
277 hashes[SR_MCAST_SIZE - 1] |= SR_MCAST_ADDR_FLAG; in sr9700_set_multicast()
288 hashes[crc >> 3] |= 1 << (crc & 0x7); in sr9700_set_multicast()
292 sr_write_async(dev, SR_MAR, SR_MCAST_SIZE, hashes); in sr9700_set_multicast()
H A Ddm9601.c300 u8 *hashes = (u8 *) & dev->data; in dm9601_set_multicast() local
303 memset(hashes, 0x00, DM_MCAST_SIZE); in dm9601_set_multicast()
304 hashes[DM_MCAST_SIZE - 1] |= 0x80; /* broadcast address */ in dm9601_set_multicast()
316 hashes[crc >> 3] |= 1 << (crc & 0x7); in dm9601_set_multicast()
320 dm_write_async(dev, DM_MCAST_ADDR, DM_MCAST_SIZE, hashes); in dm9601_set_multicast()
/linux-6.15/Documentation/pcmcia/
H A Ddevicetable.rst10 - product ID strings _and_ hashes of these strings
18 hashes of the string to the macro, e.g. if you want to match the product ID
/linux-6.15/Documentation/admin-guide/device-mapper/
H A Dverity.rst51 inaccessible. You can place hashes to the same partition as data, in this
52 case hashes are placed after <num_data_blocks>.
154 If verity hashes are in cache and the IO size does not exceed the limit,
173 After instantiation, all hashes will be verified on-demand during
178 Cryptographic hashes are used to assert the integrity of the device on a
180 into the page cache. Block hashes are stored linearly, aligned to the nearest
197 selected cryptographic digest algorithm. The hashes are linearly-ordered in
/linux-6.15/security/apparmor/
H A DKconfig60 bool "Enable introspection of sha256 hashes for loaded profiles"
67 hashes is available to userspace via the apparmor
78 is enabled by default. The generation of sha256 hashes for
/linux-6.15/fs/xfs/scrub/
H A Ddabtree.h13 xfs_dahash_t hashes[XFS_DA_NODE_MAXDEPTH]; member
H A Ddabtree.c124 if (hash < ds->hashes[level]) in xchk_da_btree_hash()
126 ds->hashes[level] = hash; in xchk_da_btree_hash()
/linux-6.15/Documentation/ABI/testing/
H A Ddebugfs-turris-mox-rwtm10 (since this is intended for SHA-512 hashes).
/linux-6.15/Documentation/bpf/
H A Dmap_bloom_filter.rst37 The number of hashes to use for the bloom filter is configurable using
40 functions. In general, using more hashes decreases both the false
150 .map_extra = 3); /* number of hashes */
/linux-6.15/Documentation/devicetree/bindings/crypto/
H A Dimg-hash.txt4 SHA1, SHA224, SHA256 and MD5 hashes
/linux-6.15/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst22 hashes, to ensure integrity. Afterwards KVM can run the PVM via the
56 The PV header contains the keys and hashes, which the UV will use to
/linux-6.15/Documentation/filesystems/
H A Dfsverity.rst47 (logging file hashes before use).
67 file hashes. (Similarly, dm-verity does not mandate a particular
68 scheme for authenticating its block device root hashes.) Options for
69 authenticating fs-verity file hashes include:
285 the same order that their hashes are themselves hashed.
397 level of hashes. Then, the hashes in this first level are grouped
614 when the file is, since it contains hashes of the plaintext data.
760 hashed and what to do with those hashes, such as log them,
764 to full file hashes, for those who want the performance and
772 hashes in the Merkle tree, which is stored on-disk?
[all …]
H A Dubifs-authentication.rst262 data, the hashes of their parent index nodes thus cover all the file contents
266 Whenever a file is read, UBIFS can verify the hashes from each leaf node up to
319 hashes to index nodes does not change this since each hash will be persisted
/linux-6.15/certs/
H A DMakefile16 $(AWK) -f $(src)/check-blacklist-hashes.awk $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) >&2; \
H A DKconfig122 If set, this option should be the filename of a list of hashes in the
127 Certificate hashes can be generated with
/linux-6.15/tools/testing/selftests/net/rds/
H A DREADME.txt7 corruption. A workload of 50000 hashes, each 64 characters in size,
/linux-6.15/security/integrity/
H A DKconfig116 hashes to the .blacklist keyring for powerpc based platforms.
/linux-6.15/Documentation/networking/
H A Dnexthop-group-resilient.rst16 hashes to each next hop in the group, and then selects the next hop by
53 algorithm, the range of hashes associated with a next hop must be
/linux-6.15/tools/perf/Documentation/
H A Dperf-script-python.txt248 (implemented in Core.py) that implements Perl's 'autovivifying' hashes
249 in Python i.e. with autovivifying hashes, you can assign nested hash
599 dictionary that implements Perl's 'autovivifying' hashes in Python
600 i.e. with autovivifying hashes, you can assign nested hash values
/linux-6.15/Documentation/ABI/stable/
H A Dsysfs-class-tpm106 1.2 chips, PCRs represent SHA-1 hashes, which are 20 bytes
/linux-6.15/fs/smb/client/
H A DKconfig76 man-in-the-middle attacks and stronger crypto hashes, so the use
/linux-6.15/Documentation/crypto/
H A Dkrb5.rst251 A template AEAD crypto algorithm, called "krb5enc", is provided that hashes the
/linux-6.15/Documentation/timers/
H A Dhrtimers.rst92 such as radix trees and hashes, we chose the red black tree as the basic
/linux-6.15/Documentation/arch/x86/
H A Dintel_txt.rst76 hashes, these measurement changes are difficult to assess or

12