Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 59) sorted by relevance

123

/linux/crypto/
H A Dhkdf.c45 unsigned int ikmlen, const u8 *salt, unsigned int saltlen, in hkdf_extract() argument
50 err = crypto_shash_setkey(hmac_tfm, salt, saltlen); in hkdf_extract()
135 const u8 *salt; member
158 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
177 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f"
204 .salt = NULL,
219 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
235 .salt = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
256 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
276 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f"
[all …]
H A Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey()
89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
/linux/include/uapi/linux/
H A Dtls.h130 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE];
138 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE];
146 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE];
154 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE];
162 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE];
170 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE];
178 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE];
186 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE];
129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; global() member
137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; global() member
145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; global() member
153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; global() member
161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; global() member
169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; global() member
177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; global() member
185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; global() member
H A Dfsverity.h59 __u8 salt[32]; /* salt prepended to each hashed block */ member
/linux/fs/ecryptfs/
H A Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/linux/include/linux/
H A Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt) argument
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dktls_txrx.c16 salt = info->salt; \
18 salt_sz = sizeof(info->salt); \
29 char *salt, *rec_seq; in fill_static_params() local
59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
/linux/drivers/crypto/caam/
H A Dpdb.h102 u8 salt[4]; member
114 u8 salt[4]; member
178 u8 salt[4]; member
188 u8 salt[4]; member
408 u16 salt[7]; member
423 u16 salt[7]; member
/linux/net/tls/
H A Dtls_device_fallback.c73 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record()
308 void *buf, *iv, *aad, *dummy_buf, *salt; in fill_sg_out()
320 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb()
327 salt = crypto_info_salt(&tls_ctx->crypto_send.info, cipher_desc); in tls_enc_skb() local
328 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb()
329 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
/linux/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.h22 u32 salt; member
38 u32 salt; member
/linux/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_ipsec.h36 u32 salt; member
53 u32 salt; member
/linux/fs/netfs/
H A Dfscache_main.c50 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument
53 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
/linux/drivers/net/ethernet/fungible/funeth/
H A Dfuneth_ktls.c50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
/linux/fs/verity/
H A Dopen.c34 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
53 fsverity_prepare_hash_state(hash_alg, salt, salt_size); in fsverity_init_merkle_tree_params()
192 desc->salt, desc->salt_size); in fsverity_create_info()
293 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
H A Dfsverity_private.h91 const u8 *salt, size_t salt_size);
125 const u8 *salt, size_t salt_size);
H A Dhash_algs.c56 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument
74 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
H A Denable.c199 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity()
221 desc->salt, desc->salt_size); in enable_verity()
332 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
/linux/net/tipc/
H A Dcrypto.c156 u32 salt; member
604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init()
657 aead->salt = src->salt; in tipc_aead_clone()
745 u32 salt; in tipc_aead_encrypt() local
792 salt = aead->salt; in tipc_aead_encrypt()
794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt()
796 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt()
797 memcpy(iv, &salt, 4); in tipc_aead_encrypt()
897 u32 salt; in tipc_aead_decrypt() local
926 salt = aead->salt; in tipc_aead_decrypt()
[all …]
/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst17 <algorithm> <digest> <salt>
24 The salt is appended when hashing, digests are stored continuously and
28 The salt is prepended when hashing and each digest is
64 and the salt. This hash should be trusted as there is no other authenticity
67 <salt>
68 The hexadecimal encoding of the salt value.
/linux/include/crypto/
H A Dhkdf.h15 unsigned int ikmlen, const u8 *salt, unsigned int saltlen,
/linux/drivers/net/ethernet/marvell/octeontx2/nic/
H A Dcn10k_macsec.c385 u8 *sak, u8 *salt, ssci_t ssci) in cn10k_mcs_write_keys() argument
407 salt_rev[i] = salt[MACSEC_SALT_LEN - 1 - i]; in cn10k_mcs_write_keys()
426 u8 *salt = rxsc->salt[assoc_num]; in cn10k_mcs_write_rx_sa_plcy() local
447 salt, rxsc->ssci[assoc_num]); in cn10k_mcs_write_rx_sa_plcy()
665 u8 *salt = txsc->salt[assoc_num]; in cn10k_mcs_write_tx_sa_plcy() local
678 salt, txsc->ssci[assoc_num]); in cn10k_mcs_write_tx_sa_plcy()
1316 memcpy(&txsc->salt[sa_num], sw_tx_sa->key.salt.bytes, MACSEC_SALT_LEN); in cn10k_mdo_add_txsa()
1489 memcpy(&rxsc->salt[sa_num], rx_sa->key.salt.bytes, MACSEC_SALT_LEN); in cn10k_mdo_add_rxsa()
/linux/tools/include/uapi/linux/
H A Dtls.h74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/
H A Dchcr_ipsec.h52 char salt[MAX_SALT]; member
/linux/drivers/md/
H A Ddm-verity-target.c142 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_hash()
874 DMEMIT("%02x", v->salt[x]); in verity_status()
950 DMEMIT("%02x", v->salt[x]); in verity_status()
1083 kfree(v->salt); in verity_dtr()
1360 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_setup_salt_and_hashstate()
1361 if (!v->salt) { in verity_setup_salt_and_hashstate()
1366 hex2bin(v->salt, arg, v->salt_size)) { in verity_setup_salt_and_hashstate()
1381 v->salt, v->salt_size); in verity_setup_salt_and_hashstate()
1398 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_setup_salt_and_hashstate()
/linux/Documentation/filesystems/
H A Decryptfs.rst50 You should be prompted for a passphrase and a salt (the salt may be

123