Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 6 of 6) sorted by relevance

/crypto/
Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey()
89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
Dgeniv.c122 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
Dechainiv.c74 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
Dchacha20poly1305.c30 u8 salt[]; member
90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv()
483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
Dseqiv.c100 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
DKconfig391 xoring it with a salt. This algorithm is mainly useful for CTR
401 a sequence number xored with a salt. This is the default
573 Encrypted salt-sector initialization vector (ESSIV) is an IV