Searched refs:salt (Results 1 – 6 of 6) sorted by relevance
/crypto/ |
D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
D | geniv.c | 122 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
|
D | echainiv.c | 74 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
|
D | chacha20poly1305.c | 30 u8 salt[]; member 90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
|
D | seqiv.c | 100 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
|
D | Kconfig | 391 xoring it with a salt. This algorithm is mainly useful for CTR 401 a sequence number xored with a salt. This is the default 573 Encrypted salt-sector initialization vector (ESSIV) is an IV
|