Home
last modified time | relevance | path

Searched full:hash (Results 1 – 25 of 156) sorted by relevance

1234567

/Documentation/devicetree/bindings/crypto/
Dimg-hash.txt1 Imagination Technologies hardware hash accelerator
3 The hash accelerator provides hardware hashing acceleration for
8 - compatible : "img,hash-accelerator"
14 - clock-names : "sys" Used to clock the hash block registers
15 "hash" Used to clock data through the accelerator
19 hash: hash@18149600 {
20 compatible = "img,hash-accelerator";
26 clock-names = "sys", "hash";
Dst,stm32-hash.yaml4 $id: http://devicetree.org/schemas/crypto/st,stm32-hash.yaml#
7 title: STMicroelectronics STM32 HASH
9 description: The STM32 HASH block is built on the HASH block found in
19 - st,stn8820-hash
20 - stericsson,ux500-hash
21 - st,stm32f456-hash
22 - st,stm32f756-hash
23 - st,stm32mp13-hash
68 const: stericsson,ux500-hash
83 hash@54002000 {
[all …]
Dnvidia,tegra234-se-hash.yaml4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-hash.yaml#
7 title: NVIDIA Tegra Security Engine for HASH algorithms
10 The Tegra Security HASH Engine accelerates the following HASH functions -
19 const: nvidia,tegra234-se-hash
46 compatible = "nvidia,tegra234-se-hash";
Daspeed,ast2500-hace.yaml7 title: ASPEED HACE hash and crypto Hardware Accelerator Engines
13 The Hash and Crypto Engine (HACE) is designed to accelerate the throughput
14 of hash data digest, encryption, and decryption. Basically, HACE can be
15 divided into two independently engines - Hash Engine and Crypto Engine.
/Documentation/admin-guide/device-mapper/
Dverity.rst21 This is the type of the on-disk hash format.
37 This is the device that supplies the hash tree data. It may be
44 Each block corresponds to one digest on the hash device.
47 The size of a hash block in bytes.
56 to the root block of the hash tree.
59 The cryptographic hash algorithm used for this device. This should
63 The hexadecimal encoding of the cryptographic hash of the root hash block
64 and the salt. This hash should be trusted as there is no other authenticity
96 Use forward error correction (FEC) to recover from corruption if hash
98 may be the same device where data and hash blocks reside, in which case
[all …]
Dvdo-design.rst91 Inaccuracy can also result from a hash collision where two different blocks
93 vdo does not use a cryptographic hash, a malicious workload could be
156 allows the index to use many fewer bytes per entry than a traditional hash
430 The data_vio's data is hashed and the hash (the "record name") is
434 the data_vios currently writing the same data. Active hash locks are
437 the hash zone.
439 If there is no existing hash lock for this data_vio's record_name, the
440 data_vio obtains a hash lock from the pool, adds it to the hashtable,
441 and sets itself as the new hash lock's "agent." The hash_lock pool is
442 also covered by the implicit hash zone lock. The hash lock agent will
[all …]
/Documentation/crypto/
Dapi-digest.rst4 .. kernel-doc:: include/crypto/hash.h
7 .. kernel-doc:: include/crypto/hash.h
13 .. kernel-doc:: include/crypto/hash.h
16 .. kernel-doc:: include/crypto/hash.h
19 Asynchronous Hash Request Handle
22 .. kernel-doc:: include/crypto/hash.h
23 :doc: Asynchronous Hash Request Handle
25 .. kernel-doc:: include/crypto/hash.h
31 .. kernel-doc:: include/crypto/hash.h
34 .. kernel-doc:: include/crypto/hash.h
Ddevel-algos.rst9 while the other two are specific to HASH transformations and
136 Hashing [HASH]
144 There are multiple ways to register a HASH transformation, depending on
146 [AHASH] and the amount of HASH transformations we are registering. You
147 can find the prototypes defined in include/crypto/internal/hash.h:
157 The respective counterparts for unregistering the HASH transformation
184 '----' '---> HASH
190 '----' '---> HASH
196 '---------------> HASH
233 Specifics Of Asynchronous HASH Transformation
/Documentation/pcmcia/
Ddevicetable.rst23 If the hash is incorrect, the kernel will inform you about this in "dmesg"
24 upon module initialization, and tell you of the correct hash.
26 You can determine the hash of the product ID strings by catting the file
31 The hex value after "pa" is the hash of product ID string 1, after "pb" for
35 to determine the crc32 hash. Simply pass the string you want to evaluate
/Documentation/bpf/
Dmap_hash.rst16 purpose hash map storage. Both the key and the value can be structs,
20 to the max_entries limit that you specify. Hash maps use pre-allocation
21 of hash table elements by default. The ``BPF_F_NO_PREALLOC`` flag can be
28 variants add LRU semantics to their respective hash tables. An LRU hash
29 will automatically evict the least recently used entries when the hash
30 table reaches capacity. An LRU hash maintains an internal LRU list that
57 Hash entries can be added or updated using the ``bpf_map_update_elem()``
76 Hash entries can be retrieved using the ``bpf_map_lookup_elem()``
87 Hash entries can be deleted using the ``bpf_map_delete_elem()``
96 automatically access the hash slot for the current CPU.
[all …]
/Documentation/ABI/testing/
Ddevlink-resource-mlxsw8 is divided into two sections, the first is hash-based table
10 between the linear and hash-based sections is static and
24 Description: The hash based section of the KVD is managed by the switch
32 Description: The hash based section of the KVD is managed by the switch
Dsysfs-driver-intel-m10-bmc-sec-update5 Description: Read only. Returns the root entry hash for the static
7 string: "hash not programmed". This file is only
15 Description: Read only. Returns the root entry hash for the partial
17 returns the string: "hash not programmed". This file
25 Description: Read only. Returns the root entry hash for the BMC image
27 "hash not programmed". This file is only visible if the
Dsysfs-bus-pci-devices-catpt15 build hash and log-providers hash. This information is
/Documentation/filesystems/ext4/
Ddirectory.rst125 must also include hash information in the directory entry. We append
141 - hash
142 - The hash of the directory name
146 - The minor hash of the directory name
191 Hash Tree Directories
196 balanced tree keyed off a hash of the directory entry name. If the
210 the root node contains metadata about the tree and finally a hash->block
214 node, which is indexed by a minor hash. Interior nodes in this tree
218 (presumably) hash to the same value. If there is an overflow, the
220 least-significant bit of the hash (in the interior node map) that gets
[all …]
/Documentation/filesystems/
Dfsverity.rst29 Userspace can use another ioctl to retrieve the root hash (actually
30 the "fs-verity file digest", which is a hash that includes the Merkle
31 tree root hash) that fs-verity is enforcing for the file. This ioctl
34 fs-verity is essentially a way to hash a file in constant time,
35 subject to the caveat that reads which would violate the hash will
44 However, because fs-verity makes retrieving the file hash extremely
49 A standard file hash could be used instead of fs-verity. However,
55 read and hash the entire file before starting the application.
57 Unlike an ahead-of-time hash, fs-verity also re-verifies data each
128 - ``hash_algorithm`` must be the identifier for the hash algorithm to
[all …]
Dubifs-authentication.rst260 with a hash over each node's child nodes. As a result, the index basically also
265 can be hooked to recompute the hash only for each changed node at the same time.
270 keyed hash (HMAC) over its own contents and a hash of the root node of the index
275 include a hash. All other types of nodes will remain unchanged. This reduces
283 | (hash) |
291 | (hash) (hash) |
302 | (hash) (hash) | | (hash) (hash) |
311 Figure 3: Coverage areas of index node hash and master node HMAC
316 persist the hash and file contents. Here the existing UBIFS logic for how
319 hashes to index nodes does not change this since each hash will be persisted
[all …]
/Documentation/networking/
Dscaling.rst38 The filter used in RSS is typically a hash function over the network
39 and/or transport layer headers-- for example, a 4-tuple hash over
43 by masking out the low order seven bits of the computed hash for the
44 packet (usually a Toeplitz hash), taking this number as a key into the
49 are swapped, the computed hash is the same. This is beneficial in some
52 "Symmetric-XOR" is a type of RSS algorithms that achieves this hash
80 hash, is usually programmed by the driver at initialization. The
143 RX flow hash indirection table for eth0 with 13 RX ring(s):
149 RX flow hash indirection table for eth0 with 13 RX ring(s):
178 2) software filters can easily be added to hash over new protocols
[all …]
Dnexthop-group-resilient.rst12 the legacy multipath next-hop group, which uses the hash-threshold
15 To select a next hop, hash-threshold algorithm first assigns a range of
17 comparing the SKB hash with the individual ranges. When a next hop is
19 reassignment of parts of hash space from one next hop to another. RFC 2992
29 under the hash-threshold algorithm.
31 Note how next hop 2 gave up part of the hash space in favor of next hop 1,
37 this hash space reassignment causes an issue that packets from a single
47 insert another layer of indirection between the hash space and its
48 constituent next hops: a hash table. The selection algorithm uses SKB hash
49 to choose a hash table bucket, then reads the next hop that this bucket
[all …]
/Documentation/security/
DIMA-templates.rst9 The original ``ima`` template is fixed length, containing the filedata hash
10 and pathname. The filedata hash is limited to 20 bytes (md5/sha1).
66 calculated with the SHA1 or MD5 hash algorithm;
68 - 'd-ng': the digest of the event, calculated with an arbitrary hash
69 algorithm (field format: <hash algo>:digest);
71 (field format: <digest type>:<hash algo>:digest);
75 or the EVM portable signature, if 'security.ima' contains a file hash.
77 - 'buf': the buffer data that was used to generate the hash without size limitations;
/Documentation/networking/device_drivers/ethernet/microsoft/
Dnetvsc.rst29 For TCP & UDP, we can switch hash level between L3 and L4 by ethtool
31 hash level is L4. We currently only allow switching TX hash level
41 ethtool -N eth0 rx-flow-hash udp4 sdfn
45 ethtool -N eth0 rx-flow-hash udp4 sd
47 To show UDP hash level::
49 ethtool -n eth0 rx-flow-hash udp4
/Documentation/power/
Ds2ram.rst46 hash matches drivers/base/power/resume.c:28
47 hash matches device 0000:01:00.0
54 If no device matches the hash (or any matches appear to be false positives),
56 until after the hash is checked. You can check the hash against the current
/Documentation/networking/device_drivers/ethernet/freescale/
Dgianfar.rst33 The gianfar driver supports using the group hash table on the
34 TSEC (and the extended hash table on the eTSEC) for multicast
36 before the hash tables. See Linux documentation on how to join
Ddpaa.rst157 ethtool. Also, rx-flow-hash and rx-hashing was added. The addition of RSS
191 hardware frame queues using a hash on IP v4/v6 source and destination
207 FQ (hash result) to another CPU. The ingress traffic arriving on one
214 # ethtool -N fm1-mac9 rx-flow-hash tcp4 ""
216 To turn it back on, one needs to set rx-flow-hash for tcp4/6 or udp4/6::
218 # ethtool -N fm1-mac9 rx-flow-hash udp4 sfdn
224 Besides using the FMan Keygen computed hash for spreading traffic on the
225 128 Rx FQs, the DPAA Ethernet driver also sets the skb hash value when
230 # ethtool -k fm1-mac9 | grep hash
235 # ethtool -k fm1-mac9 | grep hash
/Documentation/netlink/specs/
Dovs_flow.yaml280 name: ovs-action-hash
284 name: hash-alg
286 doc: Algorithm used to compute hash prior to recirculation.
288 name: hash-basis
290 doc: Basis used for computing hash.
292 name: ovs-hash-alg
293 enum-name: ovs-hash-alg
296 Data path hash algorithm for computing Datapath hash. The algorithm type only specifies
297 the fields in a flow will be used as part of the hash. Each datapath is free to use its
298 own hash algorithm. The hash value will be opaque to the user space daemon.
[all …]
/Documentation/networking/device_drivers/ethernet/intel/
Dfm10k.rst105 rx-flow-hash tcp4|udp4|ah4|esp4|sctp4|tcp6|udp6|ah6|esp6|sctp6
106 Retrieves the hash options for the specified network traffic type.
111 rx-flow-hash tcp4|udp4|ah4|esp4|sctp4|tcp6|udp6|ah6|esp6|sctp6 m|v|t|s|d|f|n|r
112 Configures the hash options for the specified network traffic type.
116 - f Hash on bytes 0 and 1 of the Layer 4 header of the rx packet.
117 - n Hash on bytes 2 and 3 of the Layer 4 header of the rx packet.

1234567