Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 68) sorted by relevance

123

/linux/include/uapi/linux/
H A Dtls.h129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member
145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member
161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member
169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member
177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member
185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
H A Dfsverity.h59 __u8 salt[32]; /* salt prepended to each hashed block */ member
/linux/fs/ecryptfs/
H A Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/linux/include/linux/
H A Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt) argument
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dktls_txrx.c16 salt = info->salt; \
18 salt_sz = sizeof(info->salt); \
29 char *salt, *rec_seq; in fill_static_params() local
59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
H A Dmacsec.c66 salt_t salt; member
138 salt_t salt; member
268 salt_p = MLX5_ADDR_OF(macsec_offload_obj, obj, salt); in mlx5e_macsec_create_object()
270 memcpy((u32 *)salt_p + i, &attrs->salt.bytes[4 * (2 - i)], 4); in mlx5e_macsec_create_object()
383 memcpy(&obj_attrs.salt, &sa->salt, sizeof(sa->salt)); in mlx5e_macsec_init_sa()
497 sa->salt = key->salt; in update_macsec_epn()
/linux/drivers/crypto/caam/
H A Dpdb.h102 u8 salt[4]; member
114 u8 salt[4]; member
178 u8 salt[4]; member
188 u8 salt[4]; member
408 u16 salt[7]; member
423 u16 salt[7]; member
/linux/net/tls/
H A Dtls_device_fallback.c87 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record()
327 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local
339 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb()
346 salt = crypto_info_salt(&tls_ctx->crypto_send.info, cipher_desc); in tls_enc_skb()
347 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb()
348 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
/linux/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.h22 u32 salt; member
38 u32 salt; member
/linux/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_ipsec.h36 u32 salt; member
53 u32 salt; member
H A Dixgbe_ipsec.c22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument
30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa()
74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument
90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa()
327 r->key, r->salt, in ixgbe_ipsec_restore()
335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore()
618 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa()
697 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa()
727 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa()
737 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
/linux/fs/netfs/
H A Dfscache_main.c50 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument
53 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
/linux/fs/verity/
H A Dopen.c33 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
50 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params()
194 desc->salt, desc->salt_size); in fsverity_create_info()
300 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
H A Dfsverity_private.h84 const u8 *salt, size_t salt_size);
118 const u8 *salt, size_t salt_size);
H A Denable.c204 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity()
226 desc->salt, desc->salt_size); in enable_verity()
337 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
H A Dhash_algs.c112 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument
142 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
/linux/drivers/net/ethernet/fungible/funeth/
H A Dfuneth_ktls.c50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
/linux/crypto/
H A Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey()
89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst17 <algorithm> <digest> <salt>
24 The salt is appended when hashing, digests are stored continuously and
28 The salt is prepended when hashing and each digest is
64 and the salt. This hash should be trusted as there is no other authenticity
67 <salt>
68 The hexadecimal encoding of the salt value.
/linux/include/crypto/internal/
H A Dgeniv.h19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
/linux/tools/include/uapi/linux/
H A Dtls.h74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/
H A Dchcr_ipsec.h52 char salt[MAX_SALT]; member
/linux/Documentation/filesystems/
H A Decryptfs.rst50 You should be prompted for a passphrase and a salt (the salt may be
/linux/drivers/net/phy/
H A Dnxp-c45-tja11xx-macsec.c214 u16 salt; member
230 .salt = MACSEC_RXSA_A_SALT,
244 .salt = MACSEC_RXSA_B_SALT,
256 .salt = MACSEC_TXSA_A_SALT,
267 .salt = MACSEC_TXSA_B_SALT,
490 u8 *salt, ssci_t ssci) in nxp_c45_sa_set_key() argument
496 u32 *salt_u32 = (u32 *)salt; in nxp_c45_sa_set_key()
508 reg = sa_regs->salt + (2 - i) * 4; in nxp_c45_sa_set_key()
1215 nxp_c45_sa_set_key(ctx, sa->regs, rx_sa->key.salt.bytes, rx_sa->ssci); in nxp_c45_mdo_add_rxsa()
1304 nxp_c45_sa_set_key(ctx, sa->regs, tx_sa->key.salt.bytes, tx_sa->ssci); in nxp_c45_mdo_add_txsa()
/linux/drivers/char/tpm/
H A Dtpm2-sessions.c117 u8 salt[EC_PT_SZ]; member
555 sg_init_one(d, auth->salt, EC_PT_SZ); in tpm_buf_append_salt()
566 tpm2_KDFe(auth->salt, "SECRET", x, chip->null_ec_key_x, auth->salt); in tpm_buf_append_salt()
920 tpm2_KDFa(auth->salt, sizeof(auth->salt), "ATH", auth->tpm_nonce, in tpm2_parse_start_auth_session()

123