Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 86) sorted by relevance

1234

/linux-6.1.9/include/uapi/linux/
Dtls.h129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member
145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member
161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member
169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member
177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member
185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
/linux-6.1.9/include/linux/
Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt) argument
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/linux-6.1.9/fs/ecryptfs/
Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/linux-6.1.9/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
Dktls_txrx.c16 salt = info->salt; \
18 salt_sz = sizeof(info->salt); \
29 char *salt, *rec_seq; in fill_static_params() local
59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
Dipsec_offload.c62 salt_p = MLX5_ADDR_OF(ipsec_obj, obj, salt); in mlx5_create_ipsec_obj()
63 memcpy(salt_p, &aes_gcm->salt, sizeof(aes_gcm->salt)); in mlx5_create_ipsec_obj()
/linux-6.1.9/net/tls/
Dtls_device_fallback.c92 memcpy(iv + cipher_sz->salt, buf + TLS_HEADER_SIZE, cipher_sz->iv); in tls_enc_record()
332 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local
343 salt = tls_ctx->crypto_send.aes_gcm_128.salt; in tls_enc_skb()
346 salt = tls_ctx->crypto_send.aes_gcm_256.salt; in tls_enc_skb()
352 buf_len = cipher_sz->salt + cipher_sz->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb()
359 memcpy(iv, salt, cipher_sz->salt); in tls_enc_skb()
360 aad = buf + cipher_sz->salt + cipher_sz->iv; in tls_enc_skb()
Dtls_sw.c2476 char *iv, *rec_seq, *key, *salt, *cipher_name; in tls_set_sw_offload() local
2544 salt = gcm_128_info->salt; in tls_set_sw_offload()
2561 salt = gcm_256_info->salt; in tls_set_sw_offload()
2578 salt = ccm_128_info->salt; in tls_set_sw_offload()
2595 salt = chacha20_poly1305_info->salt; in tls_set_sw_offload()
2612 salt = sm4_gcm_info->salt; in tls_set_sw_offload()
2629 salt = sm4_ccm_info->salt; in tls_set_sw_offload()
2646 salt = aria_gcm_128_info->salt; in tls_set_sw_offload()
2663 salt = gcm_256_info->salt; in tls_set_sw_offload()
2705 memcpy(cctx->iv, salt, salt_size); in tls_set_sw_offload()
/linux-6.1.9/drivers/crypto/caam/
Dpdb.h102 u8 salt[4]; member
114 u8 salt[4]; member
178 u8 salt[4]; member
188 u8 salt[4]; member
408 u16 salt[7]; member
423 u16 salt[7]; member
/linux-6.1.9/fs/verity/
Dopen.c32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params()
82 (int)salt_size, salt); in fsverity_init_merkle_tree_params()
163 desc->salt, desc->salt_size); in fsverity_create_info()
241 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
Dfsverity_private.h88 const u8 *salt, size_t salt_size);
113 const u8 *salt, size_t salt_size);
Denable.c218 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity()
240 desc->salt, desc->salt_size); in enable_verity()
358 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
/linux-6.1.9/drivers/net/ethernet/intel/ixgbevf/
Dipsec.h22 u32 salt; member
38 u32 salt; member
/linux-6.1.9/drivers/net/ethernet/chelsio/inline_crypto/chtls/
Dchtls_hw.c256 unsigned char *key_p, *salt; in chtls_key_info() local
276 salt = gcm_ctx_128->salt; in chtls_key_info()
289 salt = gcm_ctx_256->salt; in chtls_key_info()
327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
/linux-6.1.9/drivers/net/ethernet/intel/ixgbe/
Dixgbe_ipsec.h36 u32 salt; member
53 u32 salt; member
Dixgbe_ipsec.c22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument
30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa()
74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument
90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa()
327 r->key, r->salt, in ixgbe_ipsec_restore()
335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore()
612 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa()
691 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa()
721 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa()
731 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
/linux-6.1.9/fs/fscache/
Dmain.c59 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument
62 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
/linux-6.1.9/drivers/net/ethernet/fungible/funeth/
Dfuneth_ktls.c50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
/linux-6.1.9/crypto/
Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey()
89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
/linux-6.1.9/include/crypto/internal/
Dgeniv.h19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
/linux-6.1.9/Documentation/admin-guide/device-mapper/
Dverity.rst17 <algorithm> <digest> <salt>
24 The salt is appended when hashing, digests are stored continuously and
28 The salt is prepended when hashing and each digest is
64 and the salt. This hash should be trusted as there is no other authenticity
67 <salt>
68 The hexadecimal encoding of the salt value.
/linux-6.1.9/net/tipc/
Dcrypto.c156 u32 salt; member
604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init()
657 aead->salt = src->salt; in tipc_aead_clone()
745 u32 salt; in tipc_aead_encrypt() local
792 salt = aead->salt; in tipc_aead_encrypt()
794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt()
796 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt()
797 memcpy(iv, &salt, 4); in tipc_aead_encrypt()
888 u32 salt; in tipc_aead_decrypt() local
917 salt = aead->salt; in tipc_aead_decrypt()
[all …]
/linux-6.1.9/tools/include/uapi/linux/
Dtls.h74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
/linux-6.1.9/include/net/
Dmacsec.h38 typedef union salt { union
70 salt_t salt; member
/linux-6.1.9/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/
Dchcr_ipsec.h53 char salt[MAX_SALT]; member
/linux-6.1.9/net/sched/
Dsch_sfb.c255 int *qerr, u32 *salt) in sfb_classify() argument
273 *salt = TC_H_MIN(res.classid); in sfb_classify()
315 u32 salt; in sfb_enqueue() local
318 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue()
320 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()

1234