| /linux/crypto/ |
| H A D | hkdf.c | 45 unsigned int ikmlen, const u8 *salt, unsigned int saltlen, in hkdf_extract() argument 50 err = crypto_shash_setkey(hmac_tfm, salt, saltlen); in hkdf_extract() 135 const u8 *salt; member 158 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 177 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" 204 .salt = NULL, 219 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 235 .salt = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" 256 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 276 .salt = "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" [all …]
|
| H A D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
| /linux/include/uapi/linux/ |
| H A D | tls.h | 130 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; 138 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; 146 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; 154 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; 162 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; 170 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; 178 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; 186 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; 129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; global() member 137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; global() member 145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; global() member 153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; global() member 161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; global() member 169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; global() member 177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; global() member 185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; global() member
|
| H A D | fsverity.h | 59 __u8 salt[32]; /* salt prepended to each hashed block */ member
|
| /linux/fs/ecryptfs/ |
| H A D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
| /linux/include/linux/ |
| H A D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
| /linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| H A D | ktls_txrx.c | 16 salt = info->salt; \ 18 salt_sz = sizeof(info->salt); \ 29 char *salt, *rec_seq; in fill_static_params() local 59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
|
| /linux/drivers/crypto/caam/ |
| H A D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
| /linux/net/tls/ |
| H A D | tls_device_fallback.c | 73 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record() 308 void *buf, *iv, *aad, *dummy_buf, *salt; in fill_sg_out() 320 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb() 327 salt = crypto_info_salt(&tls_ctx->crypto_send.info, cipher_desc); in tls_enc_skb() local 328 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb() 329 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
|
| /linux/drivers/net/ethernet/intel/ixgbevf/ |
| H A D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
| /linux/drivers/net/ethernet/intel/ixgbe/ |
| H A D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|
| /linux/fs/netfs/ |
| H A D | fscache_main.c | 50 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument 53 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
|
| /linux/drivers/net/ethernet/fungible/funeth/ |
| H A D | funeth_ktls.c | 50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
|
| /linux/fs/verity/ |
| H A D | open.c | 34 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 53 fsverity_prepare_hash_state(hash_alg, salt, salt_size); in fsverity_init_merkle_tree_params() 192 desc->salt, desc->salt_size); in fsverity_create_info() 293 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
|
| H A D | fsverity_private.h | 91 const u8 *salt, size_t salt_size); 125 const u8 *salt, size_t salt_size);
|
| H A D | hash_algs.c | 56 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 74 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
| H A D | enable.c | 199 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity() 221 desc->salt, desc->salt_size); in enable_verity() 332 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
| /linux/net/tipc/ |
| H A D | crypto.c | 156 u32 salt; member 604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init() 657 aead->salt = src->salt; in tipc_aead_clone() 745 u32 salt; in tipc_aead_encrypt() local 792 salt = aead->salt; in tipc_aead_encrypt() 794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt() 796 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt() 797 memcpy(iv, &salt, 4); in tipc_aead_encrypt() 897 u32 salt; in tipc_aead_decrypt() local 926 salt = aead->salt; in tipc_aead_decrypt() [all …]
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 17 <algorithm> <digest> <salt> 24 The salt is appended when hashing, digests are stored continuously and 28 The salt is prepended when hashing and each digest is 64 and the salt. This hash should be trusted as there is no other authenticity 67 <salt> 68 The hexadecimal encoding of the salt value.
|
| /linux/include/crypto/ |
| H A D | hkdf.h | 15 unsigned int ikmlen, const u8 *salt, unsigned int saltlen,
|
| /linux/drivers/net/ethernet/marvell/octeontx2/nic/ |
| H A D | cn10k_macsec.c | 385 u8 *sak, u8 *salt, ssci_t ssci) in cn10k_mcs_write_keys() argument 407 salt_rev[i] = salt[MACSEC_SALT_LEN - 1 - i]; in cn10k_mcs_write_keys() 426 u8 *salt = rxsc->salt[assoc_num]; in cn10k_mcs_write_rx_sa_plcy() local 447 salt, rxsc->ssci[assoc_num]); in cn10k_mcs_write_rx_sa_plcy() 665 u8 *salt = txsc->salt[assoc_num]; in cn10k_mcs_write_tx_sa_plcy() local 678 salt, txsc->ssci[assoc_num]); in cn10k_mcs_write_tx_sa_plcy() 1316 memcpy(&txsc->salt[sa_num], sw_tx_sa->key.salt.bytes, MACSEC_SALT_LEN); in cn10k_mdo_add_txsa() 1489 memcpy(&rxsc->salt[sa_num], rx_sa->key.salt.bytes, MACSEC_SALT_LEN); in cn10k_mdo_add_rxsa()
|
| /linux/tools/include/uapi/linux/ |
| H A D | tls.h | 74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
| H A D | chcr_ipsec.h | 52 char salt[MAX_SALT]; member
|
| /linux/drivers/md/ |
| H A D | dm-verity-target.c | 142 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_hash() 874 DMEMIT("%02x", v->salt[x]); in verity_status() 950 DMEMIT("%02x", v->salt[x]); in verity_status() 1083 kfree(v->salt); in verity_dtr() 1360 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_setup_salt_and_hashstate() 1361 if (!v->salt) { in verity_setup_salt_and_hashstate() 1366 hex2bin(v->salt, arg, v->salt_size)) { in verity_setup_salt_and_hashstate() 1381 v->salt, v->salt_size); in verity_setup_salt_and_hashstate() 1398 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_setup_salt_and_hashstate()
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 50 You should be prompted for a passphrase and a salt (the salt may be
|