/Linux-v4.19/include/linux/ |
D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
D | ecryptfs.h | 79 u8 salt[ECRYPTFS_SALT_SIZE]; member
|
/Linux-v4.19/fs/ecryptfs/ |
D | debug.c | 34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/Linux-v4.19/fs/crypto/ |
D | keyinfo.c | 221 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument 248 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt() 257 u8 salt[SHA256_DIGEST_SIZE]; in init_essiv_generator() local 265 err = derive_essiv_salt(raw_key, keysize, salt); in init_essiv_generator() 274 err = crypto_cipher_setkey(essiv_tfm, salt, sizeof(salt)); in init_essiv_generator() 279 memzero_explicit(salt, sizeof(salt)); in init_essiv_generator()
|
/Linux-v4.19/drivers/crypto/caam/ |
D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
/Linux-v4.19/drivers/net/ethernet/intel/ixgbe/ |
D | ixgbe_ipsec.h | 35 u32 salt; member 51 u32 salt; member
|
D | ixgbe_ipsec.c | 16 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument 24 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa() 68 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument 84 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa() 323 rsa->key, rsa->salt, in ixgbe_ipsec_restore() 327 ixgbe_ipsec_set_tx_sa(hw, i, tsa->key, tsa->salt); in ixgbe_ipsec_restore() 589 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa() 668 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa() 694 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa() 704 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
|
/Linux-v4.19/drivers/crypto/chelsio/ |
D | chcr_core.h | 71 u8 salt[MAX_SALT]; member 168 char salt[MAX_SALT]; member
|
D | chcr_ipsec.c | 142 memcpy(sa_entry->salt, key + keylen, 4); in chcr_ipsec_setkey() 414 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
|
/Linux-v4.19/Documentation/device-mapper/ |
D | verity.txt | 13 <algorithm> <digest> <salt> 20 The salt is appended when hashing, digests are stored continuously and 24 The salt is prepended when hashing and each digest is 60 and the salt. This hash should be trusted as there is no other authenticity 63 <salt> 64 The hexadecimal encoding of the salt value.
|
/Linux-v4.19/include/crypto/internal/ |
D | geniv.h | 24 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
|
/Linux-v4.19/include/uapi/linux/ |
D | tls.h | 74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
/Linux-v4.19/Documentation/filesystems/ |
D | ecryptfs.txt | 44 You should be prompted for a passphrase and a salt (the salt may be
|
/Linux-v4.19/net/sched/ |
D | sch_sfb.c | 258 int *qerr, u32 *salt) in sfb_classify() argument 276 *salt = TC_H_MIN(res.classid); in sfb_classify() 316 u32 salt; in sfb_enqueue() local 319 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 321 sfbhash = jhash_1word(salt, q->bins[slot].perturbation); in sfb_enqueue()
|
/Linux-v4.19/drivers/md/ |
D | dm-crypt.c | 103 u8 *salt; member 337 err = crypto_shash_digest(desc, cc->key, cc->key_size, essiv->salt); in crypt_iv_essiv_init() 344 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, in crypt_iv_essiv_init() 360 memset(essiv->salt, 0, salt_size); in crypt_iv_essiv_wipe() 363 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); in crypt_iv_essiv_wipe() 373 const u8 *salt, in alloc_essiv_cipher() argument 393 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); in alloc_essiv_cipher() 411 kzfree(essiv->salt); in crypt_iv_essiv_dtr() 412 essiv->salt = NULL; in crypt_iv_essiv_dtr() 427 u8 *salt = NULL; in crypt_iv_essiv_ctr() local [all …]
|
D | dm-verity-target.c | 146 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init() 157 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final() 708 DMEMIT("%02x", v->salt[x]); in verity_status() 786 kfree(v->salt); in verity_dtr() 1067 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr() 1068 if (!v->salt) { in verity_ctr() 1074 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
|
D | dm-verity.h | 42 u8 *salt; /* salt: its size is salt_size */ member
|
/Linux-v4.19/include/uapi/rdma/ |
D | ib_user_ioctl_verbs.h | 108 __u32 salt; member
|
/Linux-v4.19/include/linux/mlx5/ |
D | accel.h | 69 u32 salt; member
|
D | mlx5_ifc_fpga.h | 551 __be32 salt; member 554 u8 salt[16]; member
|
/Linux-v4.19/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
D | ipsec.c | 173 memcpy(&aes_gcm->seq_iv, &geniv_ctx->salt, ivsize); in mlx5e_ipsec_build_accel_xfrm_attrs() 174 memcpy(&aes_gcm->salt, x->aead->alg_key + key_len, in mlx5e_ipsec_build_accel_xfrm_attrs() 175 sizeof(aes_gcm->salt)); in mlx5e_ipsec_build_accel_xfrm_attrs()
|
/Linux-v4.19/drivers/net/netdevsim/ |
D | ipsec.c | 49 sap->xs->id.proto, sap->salt, sap->crypt); in nsim_dbg_netdev_ops_read() 168 ret = nsim_ipsec_parse_proto_keys(xs, sa.key, &sa.salt); in nsim_ipsec_add_sa()
|
D | netdevsim.h | 56 u32 salt; member
|
/Linux-v4.19/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 142 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) in arcfour_hmac_md5_usage_to_salt() 156 salt[0] = (ms_usage >> 0) & 0xff; in arcfour_hmac_md5_usage_to_salt() 157 salt[1] = (ms_usage >> 8) & 0xff; in arcfour_hmac_md5_usage_to_salt() 158 salt[2] = (ms_usage >> 16) & 0xff; in arcfour_hmac_md5_usage_to_salt() 159 salt[3] = (ms_usage >> 24) & 0xff; in arcfour_hmac_md5_usage_to_salt()
|
/Linux-v4.19/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 269 memcpy(kctx->salt, gcm_ctx->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in chtls_key_info()
|