Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 64) sorted by relevance

123

/Linux-v5.4/include/linux/
Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt) argument
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
Decryptfs.h79 u8 salt[ECRYPTFS_SALT_SIZE]; member
/Linux-v5.4/fs/ecryptfs/
Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/Linux-v5.4/include/uapi/linux/
Dtls.h92 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
100 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member
108 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
/Linux-v5.4/drivers/crypto/caam/
Dpdb.h102 u8 salt[4]; member
114 u8 salt[4]; member
178 u8 salt[4]; member
188 u8 salt[4]; member
408 u16 salt[7]; member
423 u16 salt[7]; member
/Linux-v5.4/fs/crypto/
Dkeysetup.c114 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument
145 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt()
154 u8 salt[SHA256_DIGEST_SIZE]; in init_essiv_generator() local
165 err = derive_essiv_salt(raw_key, keysize, salt); in init_essiv_generator()
174 err = crypto_cipher_setkey(essiv_tfm, salt, sizeof(salt)); in init_essiv_generator()
179 memzero_explicit(salt, sizeof(salt)); in init_essiv_generator()
/Linux-v5.4/fs/verity/
Dfsverity_private.h89 __u8 salt[32]; /* salt prepended to each hashed block */ member
120 const u8 *salt, size_t salt_size);
145 const u8 *salt, size_t salt_size);
Dopen.c32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params()
82 (int)salt_size, salt); in fsverity_init_merkle_tree_params()
171 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info()
191 desc->salt, desc->salt_size); in fsverity_create_info()
Denable.c178 copy_from_user(desc->salt, in enable_verity()
202 desc->salt, desc->salt_size); in enable_verity()
318 if (arg.salt_size > FIELD_SIZEOF(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
Dhash_algs.c105 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument
141 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
/Linux-v5.4/drivers/net/ethernet/intel/ixgbevf/
Dipsec.h22 u32 salt; member
38 u32 salt; member
/Linux-v5.4/drivers/net/ethernet/intel/ixgbe/
Dixgbe_ipsec.h36 u32 salt; member
53 u32 salt; member
Dixgbe_ipsec.c22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument
30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa()
74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument
90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa()
327 r->key, r->salt, in ixgbe_ipsec_restore()
335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore()
607 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa()
686 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa()
716 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa()
726 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
/Linux-v5.4/crypto/
Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
85 err = crypto_shash_digest(desc, key, keylen, salt); in essiv_skcipher_setkey()
93 err = crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
108 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
128 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
135 err = crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
/Linux-v5.4/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
Dktls_tx.c18 salt = info->salt; \
20 salt_sz = sizeof(info->salt); \
30 char *salt, *rec_seq; in fill_static_params_ctx() local
38 memcpy(gcm_iv, salt, salt_sz); in fill_static_params_ctx()
/Linux-v5.4/drivers/crypto/chelsio/
Dchcr_core.h68 u8 salt[MAX_SALT]; member
191 char salt[MAX_SALT]; member
/Linux-v5.4/include/crypto/internal/
Dgeniv.h19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
/Linux-v5.4/Documentation/admin-guide/device-mapper/
Dverity.rst17 <algorithm> <digest> <salt>
24 The salt is appended when hashing, digests are stored continuously and
28 The salt is prepended when hashing and each digest is
64 and the salt. This hash should be trusted as there is no other authenticity
67 <salt>
68 The hexadecimal encoding of the salt value.
/Linux-v5.4/tools/include/uapi/linux/
Dtls.h74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
/Linux-v5.4/net/sched/
Dsch_sfb.c255 int *qerr, u32 *salt) in sfb_classify() argument
273 *salt = TC_H_MIN(res.classid); in sfb_classify()
313 u32 salt; in sfb_enqueue() local
316 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue()
318 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
/Linux-v5.4/Documentation/filesystems/
Decryptfs.txt44 You should be prompted for a passphrase and a salt (the salt may be
/Linux-v5.4/drivers/md/
Ddm-verity-target.c146 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init()
157 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final()
708 DMEMIT("%02x", v->salt[x]); in verity_status()
791 kfree(v->salt); in verity_dtr()
1095 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr()
1096 if (!v->salt) { in verity_ctr()
1102 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
/Linux-v5.4/drivers/net/ethernet/netronome/nfp/crypto/
Dfw.h42 __be32 salt; member
/Linux-v5.4/include/uapi/rdma/
Dib_user_ioctl_verbs.h109 __u32 salt; member
/Linux-v5.4/include/linux/mlx5/
Daccel.h69 u32 salt; member

123