/Linux-v5.4/include/linux/ |
D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
D | ecryptfs.h | 79 u8 salt[ECRYPTFS_SALT_SIZE]; member
|
/Linux-v5.4/fs/ecryptfs/ |
D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/Linux-v5.4/include/uapi/linux/ |
D | tls.h | 92 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 100 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 108 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
|
/Linux-v5.4/drivers/crypto/caam/ |
D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
/Linux-v5.4/fs/crypto/ |
D | keysetup.c | 114 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument 145 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt() 154 u8 salt[SHA256_DIGEST_SIZE]; in init_essiv_generator() local 165 err = derive_essiv_salt(raw_key, keysize, salt); in init_essiv_generator() 174 err = crypto_cipher_setkey(essiv_tfm, salt, sizeof(salt)); in init_essiv_generator() 179 memzero_explicit(salt, sizeof(salt)); in init_essiv_generator()
|
/Linux-v5.4/fs/verity/ |
D | fsverity_private.h | 89 __u8 salt[32]; /* salt prepended to each hashed block */ member 120 const u8 *salt, size_t salt_size); 145 const u8 *salt, size_t salt_size);
|
D | open.c | 32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 82 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 171 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info() 191 desc->salt, desc->salt_size); in fsverity_create_info()
|
D | enable.c | 178 copy_from_user(desc->salt, in enable_verity() 202 desc->salt, desc->salt_size); in enable_verity() 318 if (arg.salt_size > FIELD_SIZEOF(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
D | hash_algs.c | 105 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 141 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
/Linux-v5.4/drivers/net/ethernet/intel/ixgbevf/ |
D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/Linux-v5.4/drivers/net/ethernet/intel/ixgbe/ |
D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|
D | ixgbe_ipsec.c | 22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa() 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa() 327 r->key, r->salt, in ixgbe_ipsec_restore() 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore() 607 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa() 686 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa() 716 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa() 726 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
|
/Linux-v5.4/crypto/ |
D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 85 err = crypto_shash_digest(desc, key, keylen, salt); in essiv_skcipher_setkey() 93 err = crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 108 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 128 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 135 err = crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
/Linux-v5.4/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
D | ktls_tx.c | 18 salt = info->salt; \ 20 salt_sz = sizeof(info->salt); \ 30 char *salt, *rec_seq; in fill_static_params_ctx() local 38 memcpy(gcm_iv, salt, salt_sz); in fill_static_params_ctx()
|
/Linux-v5.4/drivers/crypto/chelsio/ |
D | chcr_core.h | 68 u8 salt[MAX_SALT]; member 191 char salt[MAX_SALT]; member
|
/Linux-v5.4/include/crypto/internal/ |
D | geniv.h | 19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
|
/Linux-v5.4/Documentation/admin-guide/device-mapper/ |
D | verity.rst | 17 <algorithm> <digest> <salt> 24 The salt is appended when hashing, digests are stored continuously and 28 The salt is prepended when hashing and each digest is 64 and the salt. This hash should be trusted as there is no other authenticity 67 <salt> 68 The hexadecimal encoding of the salt value.
|
/Linux-v5.4/tools/include/uapi/linux/ |
D | tls.h | 74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
/Linux-v5.4/net/sched/ |
D | sch_sfb.c | 255 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 313 u32 salt; in sfb_enqueue() local 316 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 318 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
|
/Linux-v5.4/Documentation/filesystems/ |
D | ecryptfs.txt | 44 You should be prompted for a passphrase and a salt (the salt may be
|
/Linux-v5.4/drivers/md/ |
D | dm-verity-target.c | 146 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init() 157 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final() 708 DMEMIT("%02x", v->salt[x]); in verity_status() 791 kfree(v->salt); in verity_dtr() 1095 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr() 1096 if (!v->salt) { in verity_ctr() 1102 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
|
/Linux-v5.4/drivers/net/ethernet/netronome/nfp/crypto/ |
D | fw.h | 42 __be32 salt; member
|
/Linux-v5.4/include/uapi/rdma/ |
D | ib_user_ioctl_verbs.h | 109 __u32 salt; member
|
/Linux-v5.4/include/linux/mlx5/ |
D | accel.h | 69 u32 salt; member
|