Home
last modified time | relevance | path

Searched refs:hashes (Results 1 – 25 of 28) sorted by relevance

12

/Linux-v5.4/drivers/net/usb/
Dsr9700.c263 u8 *hashes = (u8 *)&dev->data; in sr9700_set_multicast() local
267 memset(hashes, 0x00, SR_MCAST_SIZE); in sr9700_set_multicast()
269 hashes[SR_MCAST_SIZE - 1] |= SR_MCAST_ADDR_FLAG; in sr9700_set_multicast()
280 hashes[crc >> 3] |= 1 << (crc & 0x7); in sr9700_set_multicast()
284 sr_write_async(dev, SR_MAR, SR_MCAST_SIZE, hashes); in sr9700_set_multicast()
Ddm9601.c294 u8 *hashes = (u8 *) & dev->data; in dm9601_set_multicast() local
297 memset(hashes, 0x00, DM_MCAST_SIZE); in dm9601_set_multicast()
298 hashes[DM_MCAST_SIZE - 1] |= 0x80; /* broadcast address */ in dm9601_set_multicast()
310 hashes[crc >> 3] |= 1 << (crc & 0x7); in dm9601_set_multicast()
314 dm_write_async(dev, DM_MCAST_ADDR, DM_MCAST_SIZE, hashes); in dm9601_set_multicast()
/Linux-v5.4/Documentation/pcmcia/
Ddevicetable.rst10 - product ID strings _and_ hashes of these strings
18 hashes of the string to the macro, e.g. if you want to match the product ID
/Linux-v5.4/security/apparmor/
DKconfig19 bool "Enable introspection of sha1 hashes for loaded profiles"
34 is enabled by default. The generation of sha1 hashes for
/Linux-v5.4/Documentation/admin-guide/device-mapper/
Dverity.rst51 inaccessible. You can place hashes to the same partition as data, in this
52 case hashes are placed after <num_data_blocks>.
144 After instantiation, all hashes will be verified on-demand during
149 Cryptographic hashes are used to assert the integrity of the device on a
151 into the page cache. Block hashes are stored linearly, aligned to the nearest
168 selected cryptographic digest algorithm. The hashes are linearly-ordered in
/Linux-v5.4/fs/xfs/scrub/
Ddabtree.h13 xfs_dahash_t hashes[XFS_DA_NODE_MAXDEPTH]; member
Ddabtree.c130 if (hash < ds->hashes[level]) in xchk_da_btree_hash()
132 ds->hashes[level] = hash; in xchk_da_btree_hash()
/Linux-v5.4/net/sched/
Dsch_sfb.c89 u32 hashes[2]; member
104 return sfb_skb_cb(skb)->hashes[slot]; in sfb_hash()
326 sfb_skb_cb(skb)->hashes[slot] = sfbhash; in sfb_enqueue()
344 sfb_skb_cb(skb)->hashes[slot] = 0; in sfb_enqueue()
359 sfb_skb_cb(skb)->hashes[slot] = sfbhash; in sfb_enqueue()
/Linux-v5.4/fs/reiserfs/
DMakefile10 hashes.o tail_conversion.o journal.o resize.o \
DREADME94 Yura helps with benchmarking, coding hashes, and block pre-allocation
/Linux-v5.4/Documentation/devicetree/bindings/crypto/
Dimg-hash.txt4 SHA1, SHA224, SHA256 and MD5 hashes
/Linux-v5.4/Documentation/filesystems/
Dfsverity.rst47 (logging file hashes before use).
77 `Built-in signature verification`_. Support for fs-verity file hashes
264 This section describes how fs-verity hashes the file contents using a
280 level of hashes. Then, the hashes in this first level are grouped
282 these blocks are hashed, producing the second level of hashes. This
428 when the file is, since it contains hashes of the plaintext data.
573 hashed and what to do with those hashes, such as log them,
577 alternative to doing full file hashes, for people who want the
585 hashes in the Merkle tree, which is stored on-disk?
646 - A way to maintain consistency between the data and hashes,
[all …]
Dubifs-authentication.rst258 data, the hashes of their parent index nodes thus cover all the file contents
262 Whenever a file is read, UBIFS can verify the hashes from each leaf node up to
315 hashes to index nodes does not change this since each hash will be persisted
Dfscrypt.rst1115 filename hashes. When a ->lookup() is requested, the filesystem
1116 normally hashes the filename being looked up so that it can quickly
/Linux-v5.4/certs/
DKconfig81 If set, this option should be the filename of a list of hashes in the
/Linux-v5.4/tools/perf/Documentation/
Dperf-script-python.txt248 (implemented in Core.py) that implements Perl's 'autovivifying' hashes
249 in Python i.e. with autovivifying hashes, you can assign nested hash
578 dictionary that implements Perl's 'autovivifying' hashes in Python
579 i.e. with autovivifying hashes, you can assign nested hash values
/Linux-v5.4/Documentation/ABI/stable/
Dsysfs-class-tpm106 1.2 chips, PCRs represent SHA-1 hashes, which are 20 bytes
/Linux-v5.4/fs/cifs/
DKconfig77 man-in-the-middle attacks and stronger crypto hashes, so the use
/Linux-v5.4/Documentation/timers/
Dhrtimers.rst92 such as radix trees and hashes, we chose the red black tree as the basic
/Linux-v5.4/Documentation/x86/
Dintel_txt.rst76 hashes, these measurement changes are difficult to assess or
/Linux-v5.4/Documentation/networking/
Drds.txt397 transport is multipath-capable, rds_sendmsg() hashes outgoing traffic
Dscaling.rst267 a single application thread handles flows with many different flow hashes.
/Linux-v5.4/Documentation/filesystems/ext4/
Dsuper.rst239 - Default hash algorithm to use for directory hashes. See super_def_hash_
/Linux-v5.4/crypto/
DKconfig990 Tiger hash algorithm 192, 160 and 128-bit hashes
1003 Whirlpool hash algorithm 512, 384 and 256-bit hashes
/Linux-v5.4/Documentation/admin-guide/
Dext4.rst120 userspace nor to the disk, with the important exception of disk hashes,

12