Home
last modified time | relevance | path

Searched full:hashes (Results 1 – 25 of 119) sorted by relevance

12345

/linux/tools/perf/tests/
H A Dutil.c25 * hashes. However, the only user of BLAKE2s in 'perf' uses 20-byte hashes,
72 TEST_ASSERT_VAL("inconsistent BLAKE2s hashes", in test_blake2s()
77 * incrementally compute the hash of all the hashes. in test_blake2s()
82 /* Verify the hash of all the hashes. */ in test_blake2s()
84 TEST_ASSERT_VAL("wrong BLAKE2s hashes", in test_blake2s()
/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst51 inaccessible. You can place hashes to the same partition as data, in this
52 case hashes are placed after <num_data_blocks>.
154 If verity hashes are in cache and the IO size does not exceed the limit,
173 After instantiation, all hashes will be verified on-demand during
178 Cryptographic hashes are used to assert the integrity of the device on a
180 into the page cache. Block hashes are stored linearly, aligned to the nearest
197 selected cryptographic digest algorithm. The hashes are linearly-ordered in
/linux/scripts/crypto/
H A Dgen-hash-testvecs.py85 # This allows all the test cases for unkeyed hashes to work on Poly1305.
177 hashes = b''
182 hashes += h.digest()
185 compute_hash(alg, hashes))
239 hashes = b''
241 hashes += Polyval(key).update(b'\xff' * data_len).digest()
244 Polyval(key).update(hashes).digest())
/linux/security/apparmor/
H A DKconfig60 bool "Enable introspection of sha256 hashes for loaded profiles"
66 hashes is available to userspace via the apparmor
77 is enabled by default. The generation of sha256 hashes for
/linux/Documentation/pcmcia/
H A Ddevicetable.rst10 - product ID strings _and_ hashes of these strings
18 hashes of the string to the macro, e.g. if you want to match the product ID
/linux/tools/testing/selftests/bpf/benchs/
H A Drun_bench_bloom_filter_map.sh12 subtitle "value_size: $v bytes, # threads: $t, # hashes: $h"
33 subtitle "value_size: $v, # hashes: $h"
/linux/Documentation/bpf/
H A Dmap_bloom_filter.rst37 The number of hashes to use for the bloom filter is configurable using
40 functions. In general, using more hashes decreases both the false
150 .map_extra = 3); /* number of hashes */
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst22 hashes, to ensure integrity. Afterwards KVM can run the PVM via the
56 The PV header contains the keys and hashes, which the UV will use to
/linux/drivers/net/usb/
H A Ddm9601.c279 u8 *hashes = (u8 *) & dev->data; in dm9601_set_multicast() local
282 memset(hashes, 0x00, DM_MCAST_SIZE); in dm9601_set_multicast()
283 hashes[DM_MCAST_SIZE - 1] |= 0x80; /* broadcast address */ in dm9601_set_multicast()
295 hashes[crc >> 3] |= 1 << (crc & 0x7); in dm9601_set_multicast()
299 dm_write_async(dev, DM_MCAST_ADDR, DM_MCAST_SIZE, hashes); in dm9601_set_multicast()
/linux/tools/testing/selftests/powerpc/dexcr/
H A Dhashchk_test.c85 /* Used to ensure the checks uses the same addresses as the hashes */ in fill_hash_values()
151 /* If all hashes are the same it means (most likely) same key */ in hashchk_exec_random_key_test()
/linux/security/integrity/platform_certs/
H A Dload_powerpc.c6 * - loads keys and hashes stored and controlled by the firmware.
56 * keyring and the blacklisted X.509 cert SHA256 hashes into the blacklist
H A Dload_uefi.c47 * the certs/hashes in the UEFI db variable for verification purposes. If it
157 * keyring and the UEFI blacklisted X.509 cert SHA256 hashes into the blacklist
/linux/tools/testing/selftests/tdx/
H A Dtdx_guest_test.c40 * struct reportmac - TDX guest report data, MAC and TEE hashes.
50 * It is MAC-protected and contains hashes of the remainder of the
/linux/tools/testing/ktest/
H A Dconfig-bisect.pl317 # compare two config hashes, and return configs with different vals.
322 # crappy Perl way to pass in hashes.
337 # compare two config hashes and return the configs in B but not A
343 # crappy Perl way to pass in hashes.
365 # crappy Perl way to pass in hashes.
H A Dcompare-ktest-sample.pl6 # hashes are now used
/linux/tools/include/linux/
H A Djhash.h14 * These are functions for producing 32-bit hashes for hash table lookup.
65 * The generic version, hashes an arbitrary sequence of bytes.
/linux/include/linux/
H A Dlockdep_types.h209 * hash the hashes step by step as the dependency chain grows.
238 * the hashes by starting with 0 if we cross into an interrupt
H A Djhash.h14 * These are functions for producing 32-bit hashes for hash table lookup.
65 * The generic version, hashes an arbitrary sequence of bytes.
H A Dcfi.h51 /* CFI type hashes for BPF function types */
/linux/tools/testing/selftests/net/rds/
H A DREADME.txt7 corruption. A workload of 50000 hashes, each 64 characters in size,
/linux/include/linux/firmware/intel/
H A Dstratix10-smc.h608 * Sync call to dump all the fuses and key hashes
613 * key hashes
620 * a2 physical address for the structure of fuse and key hashes
/linux/fs/verity/
H A Dverify.c39 * fsverity_readahead() - kick off readahead on fsverity hashes
44 * Start readahead on the fsverity hashes that are needed to verify the file
48 * ensure that the hashes are already cached on completion of the file data
/linux/arch/powerpc/kernel/
H A Dima_arch.c35 * These rules add the kexec kernel image and kernel modules file hashes to
/linux/certs/
H A Dblacklist.c98 * Skips the authentication step for builtin hashes, they are not in blacklist_key_instantiate()
118 * for builtin hashes. in blacklist_key_instantiate()
/linux/drivers/md/
H A Ddm-ima.h42 * Contains the sha256 hashes of the IMA measurements of the target

12345