Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 8 of 8) sorted by relevance

/net/tls/
Dtls_device_fallback.c92 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record()
332 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local
343 salt = tls_ctx->crypto_send.aes_gcm_128.salt; in tls_enc_skb()
346 salt = tls_ctx->crypto_send.aes_gcm_256.salt; in tls_enc_skb()
352 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb()
359 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb()
360 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
Dtls_main.c67 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \
73 .salt_offset = offsetof(struct ci, salt), \
81 .salt = cipher ## _SALT_SIZE, \
93 .salt = cipher ## _SALT_SIZE, \
488 cctx->iv + cipher_desc->salt, cipher_desc->iv); in do_tls_getsockopt_conf()
Dtls_sw.c2670 char *iv, *rec_seq, *key, *salt; in tls_set_sw_offload() local
2710 salt = crypto_info_salt(crypto_info, cipher_desc); in tls_set_sw_offload()
2735 prot->salt_size = cipher_desc->salt; in tls_set_sw_offload()
2736 cctx->iv = kmalloc(cipher_desc->iv + cipher_desc->salt, GFP_KERNEL); in tls_set_sw_offload()
2743 memcpy(cctx->iv, salt, cipher_desc->salt); in tls_set_sw_offload()
2744 memcpy(cctx->iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_sw_offload()
Dtls_device.c1097 prot->salt_size = cipher_desc->salt; in tls_set_device_offload()
1098 ctx->tx.iv = kmalloc(cipher_desc->iv + cipher_desc->salt, GFP_KERNEL); in tls_set_device_offload()
1104 memcpy(ctx->tx.iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_device_offload()
Dtls.h58 unsigned int salt; member
/net/tipc/
Dcrypto.c156 u32 salt; member
604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init()
657 aead->salt = src->salt; in tipc_aead_clone()
745 u32 salt; in tipc_aead_encrypt() local
792 salt = aead->salt; in tipc_aead_encrypt()
794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt()
796 salt ^= tipc_node_get_addr(__dnode); in tipc_aead_encrypt()
797 memcpy(iv, &salt, 4); in tipc_aead_encrypt()
888 u32 salt; in tipc_aead_decrypt() local
917 salt = aead->salt; in tipc_aead_decrypt()
[all …]
/net/sched/
Dsch_sfb.c255 int *qerr, u32 *salt) in sfb_classify() argument
273 *salt = TC_H_MIN(res.classid); in sfb_classify()
315 u32 salt; in sfb_enqueue() local
318 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue()
320 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
/net/bluetooth/
Dsmp.c244 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local
254 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5()
357 const u8 salt[16], u8 res[16]) in smp_h7()
361 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7()
363 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7()
1172 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local
1174 if (smp_h7(smp->tfm_cmac, smp->tk, salt, smp->link_key)) { in sc_generate_link_key()
1230 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; in sc_generate_ltk() local
1232 if (smp_h7(smp->tfm_cmac, key->val, salt, smp->tk)) in sc_generate_ltk()