/linux/include/uapi/linux/ |
H A D | tls.h | 129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member 153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member 161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member 169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member 177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member 185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
|
H A D | fsverity.h | 59 __u8 salt[32]; /* salt prepended to each hashed block */ member
|
/linux/fs/ecryptfs/ |
H A D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/linux/include/linux/ |
H A D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | ktls_txrx.c | 16 salt = info->salt; \ 18 salt_sz = sizeof(info->salt); \ 29 char *salt, *rec_seq; in fill_static_params() local 59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
|
H A D | macsec.c | 66 salt_t salt; member 138 salt_t salt; member 268 salt_p = MLX5_ADDR_OF(macsec_offload_obj, obj, salt); in mlx5e_macsec_create_object() 270 memcpy((u32 *)salt_p + i, &attrs->salt.bytes[4 * (2 - i)], 4); in mlx5e_macsec_create_object() 383 memcpy(&obj_attrs.salt, &sa->salt, sizeof(sa->salt)); in mlx5e_macsec_init_sa() 497 sa->salt = key->salt; in update_macsec_epn()
|
/linux/drivers/crypto/caam/ |
H A D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
/linux/net/tls/ |
H A D | tls_device_fallback.c | 87 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record() 327 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local 339 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb() 346 salt = crypto_info_salt(&tls_ctx->crypto_send.info, cipher_desc); in tls_enc_skb() 347 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb() 348 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
|
/linux/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/linux/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|
H A D | ixgbe_ipsec.c | 22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa() 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa() 327 r->key, r->salt, in ixgbe_ipsec_restore() 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore() 618 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa() 697 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa() 727 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa() 737 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
|
/linux/fs/netfs/ |
H A D | fscache_main.c | 50 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument 53 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
|
/linux/fs/verity/ |
H A D | open.c | 33 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 50 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 194 desc->salt, desc->salt_size); in fsverity_create_info() 300 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
|
H A D | fsverity_private.h | 84 const u8 *salt, size_t salt_size); 118 const u8 *salt, size_t salt_size);
|
H A D | enable.c | 204 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity() 226 desc->salt, desc->salt_size); in enable_verity() 337 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
H A D | hash_algs.c | 112 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 142 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
/linux/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth_ktls.c | 50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
|
/linux/crypto/ |
H A D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
/linux/Documentation/admin-guide/device-mapper/ |
H A D | verity.rst | 17 <algorithm> <digest> <salt> 24 The salt is appended when hashing, digests are stored continuously and 28 The salt is prepended when hashing and each digest is 64 and the salt. This hash should be trusted as there is no other authenticity 67 <salt> 68 The hexadecimal encoding of the salt value.
|
/linux/include/crypto/internal/ |
H A D | geniv.h | 19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
|
/linux/tools/include/uapi/linux/ |
H A D | tls.h | 74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
H A D | chcr_ipsec.h | 52 char salt[MAX_SALT]; member
|
/linux/Documentation/filesystems/ |
H A D | ecryptfs.rst | 50 You should be prompted for a passphrase and a salt (the salt may be
|
/linux/drivers/net/phy/ |
H A D | nxp-c45-tja11xx-macsec.c | 214 u16 salt; member 230 .salt = MACSEC_RXSA_A_SALT, 244 .salt = MACSEC_RXSA_B_SALT, 256 .salt = MACSEC_TXSA_A_SALT, 267 .salt = MACSEC_TXSA_B_SALT, 490 u8 *salt, ssci_t ssci) in nxp_c45_sa_set_key() argument 496 u32 *salt_u32 = (u32 *)salt; in nxp_c45_sa_set_key() 508 reg = sa_regs->salt + (2 - i) * 4; in nxp_c45_sa_set_key() 1215 nxp_c45_sa_set_key(ctx, sa->regs, rx_sa->key.salt.bytes, rx_sa->ssci); in nxp_c45_mdo_add_rxsa() 1304 nxp_c45_sa_set_key(ctx, sa->regs, tx_sa->key.salt.bytes, tx_sa->ssci); in nxp_c45_mdo_add_txsa()
|
/linux/drivers/char/tpm/ |
H A D | tpm2-sessions.c | 117 u8 salt[EC_PT_SZ]; member 555 sg_init_one(d, auth->salt, EC_PT_SZ); in tpm_buf_append_salt() 566 tpm2_KDFe(auth->salt, "SECRET", x, chip->null_ec_key_x, auth->salt); in tpm_buf_append_salt() 920 tpm2_KDFa(auth->salt, sizeof(auth->salt), "ATH", auth->tpm_nonce, in tpm2_parse_start_auth_session()
|