Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 85) sorted by relevance

1234

/linux/include/uapi/linux/
A Dtls.h113 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
121 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member
129 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
137 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member
145 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member
153 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member
/linux/fs/ecryptfs/
A Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/linux/include/linux/
A Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt) argument
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
A Dktls_txrx.c16 salt = info->salt; \
18 salt_sz = sizeof(info->salt); \
29 char *salt, *rec_seq; in fill_static_params() local
40 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
/linux/drivers/crypto/caam/
A Dpdb.h102 u8 salt[4]; member
114 u8 salt[4]; member
178 u8 salt[4]; member
188 u8 salt[4]; member
408 u16 salt[7]; member
423 u16 salt[7]; member
/linux/fs/verity/
A Dopen.c32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params()
82 (int)salt_size, salt); in fsverity_init_merkle_tree_params()
164 desc->salt, desc->salt_size); in fsverity_create_info()
242 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
A Dfsverity_private.h97 const u8 *salt, size_t salt_size);
122 const u8 *salt, size_t salt_size);
A Denable.c219 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity()
241 desc->salt, desc->salt_size); in enable_verity()
359 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
A Dhash_algs.c157 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument
190 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/
A Dchtls_hw.c256 unsigned char *key_p, *salt; in chtls_key_info() local
276 salt = gcm_ctx_128->salt; in chtls_key_info()
289 salt = gcm_ctx_256->salt; in chtls_key_info()
327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
/linux/drivers/net/ethernet/intel/ixgbevf/
A Dipsec.h22 u32 salt; member
38 u32 salt; member
/linux/drivers/net/ethernet/intel/ixgbe/
A Dixgbe_ipsec.h36 u32 salt; member
53 u32 salt; member
A Dixgbe_ipsec.c22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument
30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa()
74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument
90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa()
327 r->key, r->salt, in ixgbe_ipsec_restore()
335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore()
612 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa()
691 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa()
721 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa()
731 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
/linux/crypto/
A Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey()
89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
/linux/net/tipc/
A Dcrypto.c156 u32 salt; member
657 aead->salt = src->salt; in tipc_aead_clone()
745 u32 salt; in tipc_aead_encrypt() local
803 salt = aead->salt; in tipc_aead_encrypt()
805 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt()
808 memcpy(iv, &salt, 4); in tipc_aead_encrypt()
899 u32 salt; in tipc_aead_decrypt() local
928 salt = aead->salt; in tipc_aead_decrypt()
930 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_decrypt()
932 salt ^= tipc_own_addr(net); in tipc_aead_decrypt()
[all …]
/linux/fs/fscache/
A Dmain.c124 unsigned int fscache_hash(unsigned int salt, unsigned int *data, unsigned int n) in fscache_hash() argument
126 unsigned int a, x = 0, y = salt; in fscache_hash()
/linux/Documentation/admin-guide/device-mapper/
A Dverity.rst17 <algorithm> <digest> <salt>
24 The salt is appended when hashing, digests are stored continuously and
28 The salt is prepended when hashing and each digest is
64 and the salt. This hash should be trusted as there is no other authenticity
67 <salt>
68 The hexadecimal encoding of the salt value.
/linux/net/sched/
A Dsch_sfb.c255 int *qerr, u32 *salt) in sfb_classify() argument
273 *salt = TC_H_MIN(res.classid); in sfb_classify()
313 u32 salt; in sfb_enqueue() local
316 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue()
318 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
/linux/drivers/md/
A Ddm-verity-target.c148 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init()
159 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final()
746 DMEMIT("%02x", v->salt[x]); in verity_status()
803 DMEMIT("%02x", v->salt[x]); in verity_status()
874 kfree(v->salt); in verity_dtr()
1200 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr()
1201 if (!v->salt) { in verity_ctr()
1207 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
/linux/include/net/
A Dmacsec.h23 typedef union salt { union
55 salt_t salt; member
/linux/fs/unicode/
A Dutf8-core.c128 int utf8_casefold_hash(const struct unicode_map *um, const void *salt, in utf8_casefold_hash() argument
134 unsigned long hash = init_name_hash(salt); in utf8_casefold_hash()
/linux/drivers/net/ethernet/mellanox/mlx5/core/accel/
A Dipsec_offload.c148 salt_p = MLX5_ADDR_OF(ipsec_obj, obj, salt); in mlx5_create_ipsec_obj()
149 memcpy(salt_p, &aes_gcm->salt, sizeof(aes_gcm->salt)); in mlx5_create_ipsec_obj()
/linux/include/crypto/internal/
A Dgeniv.h19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
/linux/Documentation/filesystems/
A Decryptfs.rst50 You should be prompted for a passphrase and a salt (the salt may be
/linux/tools/include/uapi/linux/
A Dtls.h74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member

Completed in 59 milliseconds

1234