/kernel/linux/linux-5.10/include/linux/ |
D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
D | unicode.h | 30 int utf8_casefold_hash(const struct unicode_map *um, const void *salt,
|
/kernel/linux/linux-5.10/fs/ecryptfs/ |
D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
D | ktls_txrx.c | 16 salt = info->salt; \ 18 salt_sz = sizeof(info->salt); \ 29 char *salt, *rec_seq; in fill_static_params() local 40 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
D | tls.h | 61 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 68 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 75 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
D | tls.h | 92 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 100 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 108 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
|
/kernel/linux/linux-5.10/drivers/crypto/caam/ |
D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
/kernel/linux/linux-5.10/fs/verity/ |
D | open.c | 32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 82 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 172 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info() 192 desc->salt, desc->salt_size); in fsverity_create_info()
|
D | fsverity_private.h | 92 __u8 salt[32]; /* salt prepended to each hashed block */ member 127 const u8 *salt, size_t salt_size); 152 const u8 *salt, size_t salt_size);
|
D | enable.c | 219 copy_from_user(desc->salt, u64_to_user_ptr(arg->salt_ptr), in enable_verity() 241 desc->salt, desc->salt_size); in enable_verity() 359 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/ |
D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/kernel/linux/linux-5.10/fs/hmdfs/comm/ |
D | crypto.c | 42 memcpy(cctx->iv, crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in tls_crypto_set_key() 75 memcpy(tcp->connect->send_crypto_info.salt, in tls_crypto_info_init() 98 memcpy(tcp->connect->recv_crypto_info.salt, in tls_crypto_info_init() 132 memcpy(tcp->connect->send_crypto_info.salt, in tls_set_tx() 163 memcpy(tcp->connect->recv_crypto_info.salt, in tls_set_rx()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbe/ |
D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|
D | ixgbe_ipsec.c | 22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa() 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa() 327 r->key, r->salt, in ixgbe_ipsec_restore() 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore() 612 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa() 691 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa() 721 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa() 731 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
D | chtls_hw.c | 256 unsigned char *key_p, *salt; in chtls_key_info() local 276 salt = gcm_ctx_128->salt; in chtls_key_info() 289 salt = gcm_ctx_256->salt; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
/kernel/linux/linux-5.10/crypto/ |
D | essiv.c | 69 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 80 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 88 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 98 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 114 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 121 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
/kernel/linux/linux-5.10/fs/fscache/ |
D | main.c | 124 unsigned int fscache_hash(unsigned int salt, unsigned int *data, unsigned int n) in fscache_hash() argument 126 unsigned int a, x = 0, y = salt; in fscache_hash()
|
/kernel/linux/linux-5.10/include/crypto/internal/ |
D | geniv.h | 19 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
|
/kernel/linux/linux-5.10/Documentation/admin-guide/device-mapper/ |
D | verity.rst | 17 <algorithm> <digest> <salt> 24 The salt is appended when hashing, digests are stored continuously and 28 The salt is prepended when hashing and each digest is 64 and the salt. This hash should be trusted as there is no other authenticity 67 <salt> 68 The hexadecimal encoding of the salt value.
|
/kernel/linux/linux-5.10/net/tipc/ |
D | crypto.c | 154 u32 salt; member 597 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init() 650 aead->salt = src->salt; in tipc_aead_clone() 738 u32 salt; in tipc_aead_encrypt() local 796 salt = aead->salt; in tipc_aead_encrypt() 798 salt ^= ehdr->addr; /* __be32 */ in tipc_aead_encrypt() 800 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt() 801 memcpy(iv, &salt, 4); in tipc_aead_encrypt() 892 u32 salt; in tipc_aead_decrypt() local 921 salt = aead->salt; in tipc_aead_decrypt() [all …]
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
D | tls.h | 34 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
/kernel/linux/linux-5.10/tools/include/uapi/linux/ |
D | tls.h | 74 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
D | chcr_ipsec.h | 53 char salt[MAX_SALT]; member
|
/kernel/linux/linux-5.10/include/net/ |
D | macsec.h | 23 typedef union salt { union 55 salt_t salt; member
|
/kernel/linux/linux-5.10/net/sched/ |
D | sch_sfb.c | 255 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 315 u32 salt; in sfb_enqueue() local 318 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 320 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
|