/linux-6.1.9/include/uapi/linux/ |
D | tls.h | 129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member 153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member 161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member 169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member 177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member 185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
|
/linux-6.1.9/include/linux/ |
D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
/linux-6.1.9/fs/ecryptfs/ |
D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/linux-6.1.9/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
D | ktls_txrx.c | 16 salt = info->salt; \ 18 salt_sz = sizeof(info->salt); \ 29 char *salt, *rec_seq; in fill_static_params() local 59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
|
D | ipsec_offload.c | 62 salt_p = MLX5_ADDR_OF(ipsec_obj, obj, salt); in mlx5_create_ipsec_obj() 63 memcpy(salt_p, &aes_gcm->salt, sizeof(aes_gcm->salt)); in mlx5_create_ipsec_obj()
|
/linux-6.1.9/net/tls/ |
D | tls_device_fallback.c | 92 memcpy(iv + cipher_sz->salt, buf + TLS_HEADER_SIZE, cipher_sz->iv); in tls_enc_record() 332 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local 343 salt = tls_ctx->crypto_send.aes_gcm_128.salt; in tls_enc_skb() 346 salt = tls_ctx->crypto_send.aes_gcm_256.salt; in tls_enc_skb() 352 buf_len = cipher_sz->salt + cipher_sz->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb() 359 memcpy(iv, salt, cipher_sz->salt); in tls_enc_skb() 360 aad = buf + cipher_sz->salt + cipher_sz->iv; in tls_enc_skb()
|
D | tls_sw.c | 2476 char *iv, *rec_seq, *key, *salt, *cipher_name; in tls_set_sw_offload() local 2544 salt = gcm_128_info->salt; in tls_set_sw_offload() 2561 salt = gcm_256_info->salt; in tls_set_sw_offload() 2578 salt = ccm_128_info->salt; in tls_set_sw_offload() 2595 salt = chacha20_poly1305_info->salt; in tls_set_sw_offload() 2612 salt = sm4_gcm_info->salt; in tls_set_sw_offload() 2629 salt = sm4_ccm_info->salt; in tls_set_sw_offload() 2646 salt = aria_gcm_128_info->salt; in tls_set_sw_offload() 2663 salt = gcm_256_info->salt; in tls_set_sw_offload() 2705 memcpy(cctx->iv, salt, salt_size); in tls_set_sw_offload()
|
/linux-6.1.9/drivers/crypto/caam/ |
D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
/linux-6.1.9/fs/verity/ |
D | open.c | 32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 82 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 163 desc->salt, desc->salt_size); in fsverity_create_info() 241 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
|
D | fsverity_private.h | 88 const u8 *salt, size_t salt_size); 113 const u8 *salt, size_t salt_size);
|
D | enable.c | 218 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity() 240 desc->salt, desc->salt_size); in enable_verity() 358 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
/linux-6.1.9/drivers/net/ethernet/intel/ixgbevf/ |
D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/linux-6.1.9/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
D | chtls_hw.c | 256 unsigned char *key_p, *salt; in chtls_key_info() local 276 salt = gcm_ctx_128->salt; in chtls_key_info() 289 salt = gcm_ctx_256->salt; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
/linux-6.1.9/drivers/net/ethernet/intel/ixgbe/ |
D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|
D | ixgbe_ipsec.c | 22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa() 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa() 327 r->key, r->salt, in ixgbe_ipsec_restore() 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore() 612 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa() 691 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa() 721 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa() 731 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
|
/linux-6.1.9/fs/fscache/ |
D | main.c | 59 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument 62 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
|
/linux-6.1.9/drivers/net/ethernet/fungible/funeth/ |
D | funeth_ktls.c | 50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
|
/linux-6.1.9/crypto/ |
D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
/linux-6.1.9/include/crypto/internal/ |
D | geniv.h | 19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
|
/linux-6.1.9/Documentation/admin-guide/device-mapper/ |
D | verity.rst | 17 <algorithm> <digest> <salt> 24 The salt is appended when hashing, digests are stored continuously and 28 The salt is prepended when hashing and each digest is 64 and the salt. This hash should be trusted as there is no other authenticity 67 <salt> 68 The hexadecimal encoding of the salt value.
|
/linux-6.1.9/net/tipc/ |
D | crypto.c | 156 u32 salt; member 604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init() 657 aead->salt = src->salt; in tipc_aead_clone() 745 u32 salt; in tipc_aead_encrypt() local 792 salt = aead->salt; in tipc_aead_encrypt() 794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt() 796 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt() 797 memcpy(iv, &salt, 4); in tipc_aead_encrypt() 888 u32 salt; in tipc_aead_decrypt() local 917 salt = aead->salt; in tipc_aead_decrypt() [all …]
|
/linux-6.1.9/tools/include/uapi/linux/ |
D | tls.h | 74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
/linux-6.1.9/include/net/ |
D | macsec.h | 38 typedef union salt { union 70 salt_t salt; member
|
/linux-6.1.9/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
D | chcr_ipsec.h | 53 char salt[MAX_SALT]; member
|
/linux-6.1.9/net/sched/ |
D | sch_sfb.c | 255 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 315 u32 salt; in sfb_enqueue() local 318 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 320 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
|