/net/tls/ |
D | tls_device_fallback.c | 92 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record() 332 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local 343 salt = tls_ctx->crypto_send.aes_gcm_128.salt; in tls_enc_skb() 346 salt = tls_ctx->crypto_send.aes_gcm_256.salt; in tls_enc_skb() 352 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb() 359 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb() 360 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
|
D | tls_main.c | 67 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \ 73 .salt_offset = offsetof(struct ci, salt), \ 81 .salt = cipher ## _SALT_SIZE, \ 93 .salt = cipher ## _SALT_SIZE, \ 488 cctx->iv + cipher_desc->salt, cipher_desc->iv); in do_tls_getsockopt_conf()
|
D | tls_sw.c | 2670 char *iv, *rec_seq, *key, *salt; in tls_set_sw_offload() local 2710 salt = crypto_info_salt(crypto_info, cipher_desc); in tls_set_sw_offload() 2735 prot->salt_size = cipher_desc->salt; in tls_set_sw_offload() 2736 cctx->iv = kmalloc(cipher_desc->iv + cipher_desc->salt, GFP_KERNEL); in tls_set_sw_offload() 2743 memcpy(cctx->iv, salt, cipher_desc->salt); in tls_set_sw_offload() 2744 memcpy(cctx->iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_sw_offload()
|
D | tls_device.c | 1097 prot->salt_size = cipher_desc->salt; in tls_set_device_offload() 1098 ctx->tx.iv = kmalloc(cipher_desc->iv + cipher_desc->salt, GFP_KERNEL); in tls_set_device_offload() 1104 memcpy(ctx->tx.iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_device_offload()
|
D | tls.h | 58 unsigned int salt; member
|
/net/tipc/ |
D | crypto.c | 156 u32 salt; member 604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init() 657 aead->salt = src->salt; in tipc_aead_clone() 745 u32 salt; in tipc_aead_encrypt() local 792 salt = aead->salt; in tipc_aead_encrypt() 794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt() 796 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt() 797 memcpy(iv, &salt, 4); in tipc_aead_encrypt() 888 u32 salt; in tipc_aead_decrypt() local 917 salt = aead->salt; in tipc_aead_decrypt() [all …]
|
/net/sched/ |
D | sch_sfb.c | 255 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 315 u32 salt; in sfb_enqueue() local 318 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 320 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
|
/net/bluetooth/ |
D | smp.c | 244 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local 254 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5() 357 const u8 salt[16], u8 res[16]) in smp_h7() 361 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7() 363 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7() 1172 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local 1174 if (smp_h7(smp->tfm_cmac, smp->tk, salt, smp->link_key)) { in sc_generate_link_key() 1230 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; in sc_generate_ltk() local 1232 if (smp_h7(smp->tfm_cmac, key->val, salt, smp->tk)) in sc_generate_ltk()
|