Searched +full:sha +full:- +full:512 (Results 1 – 8 of 8) sorted by relevance
| /Documentation/ABI/testing/ |
| D | debugfs-pfo-nx-crypto | 1 What: /sys/kernel/debug/nx-crypto/* 7 These debugfs interfaces are built by the nx-crypto driver, built in 18 The most recent non-zero return code from the H_COP_OP hcall. -EBUSY is not 19 recorded here (the hcall will retry until -EBUSY goes away). 36 The total number of bytes hashed by the hardware using SHA-256. 39 The total number of SHA-256 operations submitted to the hardware. 42 The total number of bytes hashed by the hardware using SHA-512. 45 The total number of SHA-512 operations submitted to the hardware.
|
| D | debugfs-turris-mox-rwtm | 1 What: /sys/kernel/debug/turris-mox-rwtm/do_sign 10 (since this is intended for SHA-512 hashes). 13 big-endian format.
|
| D | sysfs-driver-chromeos-acpi | 40 512 Firmware write protection was disabled. 56 Returns firmware version for the read-only portion of the 121 Returns the SHA-1 or SHA-256 hash that is read out of the 132 Returns offset in CMOS bank 0 of the verified boot non-volatile 142 Return the size in bytes of the verified boot non-volatile
|
| /Documentation/admin-guide/ |
| D | module-signing.rst | 2 ------------------------------ 6 .. - Overview. 7 .. - Configuring module signing. 8 .. - Generating signing keys. 9 .. - Public keys in the kernel. 10 .. - Manually signing modules. 11 .. - Signed modules and stripping. 12 .. - Loading signed modules. 13 .. - Non-valid signatures and unsigned modules. 14 .. - Administering/protecting the private key. [all …]
|
| /Documentation/devicetree/bindings/riscv/ |
| D | extensions.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR MIT) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: RISC-V ISA extensions 10 - Paul Walmsley <paul.walmsley@sifive.com> 11 - Palmer Dabbelt <palmer@sifive.com> 12 - Conor Dooley <conor@kernel.org> 15 RISC-V has a large number of extensions, some of which are "standard" 16 extensions, meaning they are ratified by RISC-V International, and others 36 Identifies the specific RISC-V instruction set architecture [all …]
|
| /Documentation/crypto/ |
| D | api-samples.rst | 5 ----------------------------------------------- 7 This code encrypts some data with AES-256-XTS. For sake of example, 8 all inputs are random bytes, the encryption is done in-place, and it's 18 const size_t datasize = 512; /* data size in bytes */ 21 u8 iv[16]; /* AES-256-XTS takes a 16-byte IV */ 22 u8 key[64]; /* AES-256-XTS takes a 64-byte key */ 28 * In real-world use, a tfm and key are typically used for many 49 err = -ENOMEM; 56 err = -ENOMEM; 65 * Encrypt the data in-place. [all …]
|
| /Documentation/filesystems/ |
| D | fsverity.rst | 1 .. SPDX-License-Identifier: GPL-2.0 6 fs-verity: read-only file-based authenticity protection 12 fs-verity (``fs/verity/``) is a support layer that filesystems can 14 of read-only files. Currently, it is supported by the ext4, f2fs, and 15 btrfs filesystems. Like fscrypt, not too much filesystem-specific 16 code is needed to support fs-verity. 18 fs-verity is similar to `dm-verity 19 <https://www.kernel.org/doc/Documentation/device-mapper/verity.txt>`_ 21 filesystems supporting fs-verity, userspace can execute an ioctl that 23 it to a filesystem-specific location associated with the file. [all …]
|
| D | fscrypt.rst | 2 Filesystem-level encryption (fscrypt) 11 Note: "fscrypt" in this document refers to the kernel-level portion, 14 covers the kernel-level portion. For command-line examples of how to 20 <https://source.android.com/security/encryption/file-based>`_, over 25 Unlike dm-crypt, fscrypt operates at the filesystem level rather than 28 filesystem. This is useful for multi-user systems where each user's 29 data-at-rest needs to be cryptographically isolated from the others. 34 directly into supported filesystems --- currently ext4, F2FS, UBIFS, 44 fscrypt does not support encrypting files in-place. Instead, it 54 --------------- [all …]
|