Searched full:deriving (Results 1 – 21 of 21) sorted by relevance
| /linux/net/dccp/ccids/ |
| H A D | ccid2.h | |
| /linux/Documentation/security/ |
| H A D | siphash.rst | 27 If you're not deriving your key from here, you're doing it wrong. 150 If you're not deriving your key from here, you're doing it wrong.
|
| /linux/fs/crypto/ |
| H A D | hkdf.c | 23 * common case of deriving an AES-256-XTS key (512 bits), that can result in
|
| H A D | keysetup_v1.c | 12 * - Deriving per-file encryption keys using the AES-128-ECB based KDF
|
| H A D | keysetup.c | 360 * DIRECT_KEY: instead of deriving per-file encryption keys, the in fscrypt_setup_v2_file_key()
|
| H A D | keyring.c | 583 * different key identifiers by deriving their key in add_master_key()
|
| /linux/include/linux/ |
| H A D | rpmb.h | 35 * @dev_id is intended to be used as input when deriving the authenticaion key.
|
| /linux/net/llc/ |
| H A D | llc_input.c | 106 * Initializes internal skb pointer to start of network layer by deriving
|
| /linux/drivers/net/ethernet/xilinx/ |
| H A D | xilinx_axienet_mdio.c | 215 /* clk_div can be calculated by deriving it from the equation: in axienet_mdio_enable()
|
| /linux/Documentation/filesystems/ |
| H A D | fscrypt.rst | 245 For v1 encryption policies, the KDF only supports deriving per-file 270 cases, fscrypt does this by deriving per-file keys. When a new 352 just like deriving a per-file encryption key, except that a different 824 value is intended to used as a salt when deriving an encryption key
|
| /linux/Documentation/trace/ |
| H A D | tracepoint-analysis.rst | 197 - Deriving a higher-level event from a series of lower-level events.
|
| /linux/drivers/edac/ |
| H A D | i3000_edac.c | 47 * The type promotion here is deliberate; we're deriving an
|
| /linux/Documentation/input/devices/ |
| H A D | alps.rst | 236 protocol packets. Deriving a count of contact points must be done by
|
| /linux/Documentation/power/ |
| H A D | energy-model.rst | 36 an 'abstract scale' deriving real energy in micro-Joules would not be possible.
|
| /linux/arch/s390/include/uapi/asm/ |
| H A D | pkey.h | 356 * Deriving ECC protected keys from ECC secure keys is not supported with
|
| /linux/drivers/gpu/drm/amd/display/amdgpu_dm/ |
| H A D | amdgpu_dm.h | 219 * @brightness_mask: After deriving brightness, OR it with this mask.
|
| /linux/kernel/ |
| H A D | user_namespace.c | 76 * Create a new user namespace, deriving the creator from the user in the
|
| /linux/net/ipv4/ |
| H A D | tcp_bbr.c | 159 /* The gain for deriving steady-state cwnd tolerates delayed/stretched ACKs: */
|
| /linux/arch/s390/kvm/ |
| H A D | gaccess.c | 770 * When deriving the boundaries of a fragment from a gpa, all but the last
|
| /linux/arch/powerpc/kernel/ |
| H A D | rtas.c | 663 * Reverse lookup for deriving the function descriptor from a
|
| /linux/mm/ |
| H A D | page_alloc.c | 1667 /* This gives a shorter code than deriving page_zone(end_page) */ in __pageblock_pfn_to_page()
|