/kernel/linux/linux-5.10/include/linux/mlx5/ |
H A D | mlx5_ifc_fpga.h | 551 __be32 salt; member 554 u8 salt[16]; member
|
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | ipsec.c | 93 u32 salt; /* Initialized with SA */ member 407 /* Aead->alg_key_len includes 32-bit salt */ in nfp_net_xfrm_add_state() 444 /* Load up the salt */ in nfp_net_xfrm_add_state() 445 cfg->aesgcm_fields.salt = get_unaligned_be32(x->aead->alg_key + key_len); in nfp_net_xfrm_add_state()
|
H A D | tls.c | 342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | chacha20poly1305.c | 30 u8 salt[]; member 90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
|
H A D | seqiv.c | 6 * with a salt. This algorithm is mainly useful for CTR and similar modes. 100 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
H A D | chcr_ipsec.c | 179 keylen -= 4; /* nonce/salt is present in the last 4 bytes */ in ch_ipsec_setkey() 180 memcpy(sa_entry->salt, key + keylen, 4); in ch_ipsec_setkey() 534 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
H A D | chcr_ipsec.c | 178 keylen -= 4; /* nonce/salt is present in the last 4 bytes */ in ch_ipsec_setkey() 179 memcpy(sa_entry->salt, key + keylen, 4); in ch_ipsec_setkey() 538 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
|
/kernel/linux/linux-5.10/net/tls/ |
H A D | tls_sw.c | 2323 char *iv, *rec_seq, *key, *salt, *cipher_name; in tls_set_sw_offload() local 2389 salt = gcm_128_info->salt; in tls_set_sw_offload() 2406 salt = gcm_256_info->salt; in tls_set_sw_offload() 2423 salt = ccm_128_info->salt; in tls_set_sw_offload() 2462 /* Note: 128 & 256 bit salt are the same size */ in tls_set_sw_offload() 2464 memcpy(cctx->iv, salt, salt_size); in tls_set_sw_offload()
|
/kernel/linux/linux-5.10/drivers/crypto/chelsio/ |
H A D | chcr_crypto.h | 233 u8 salt[MAX_SALT]; member
|
/kernel/linux/linux-5.10/drivers/net/netdevsim/ |
H A D | netdevsim.h | 40 u32 salt; member
|
/kernel/linux/linux-6.6/fs/fscache/ |
H A D | internal.h | 80 extern unsigned int fscache_hash(unsigned int salt, const void *data, size_t len);
|
/kernel/linux/linux-6.6/drivers/scsi/qla2xxx/ |
H A D | qla_edif_bsg.h | 178 uint32_t salt; member
|
/kernel/linux/linux-6.6/drivers/crypto/chelsio/ |
H A D | chcr_crypto.h | 235 u8 salt[MAX_SALT]; member
|
/kernel/linux/linux-6.6/crypto/ |
H A D | seqiv.c | 6 * with a salt. This algorithm is mainly useful for CTR and similar modes. 99 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.c | 79 unsigned char *key, *salt; in chcr_ktls_save_keys() local 94 salt = info_128_gcm->salt; in chcr_ktls_save_keys() 162 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 1425 /* copy the 16 byte IV for AES-CTR, which includes 4 bytes of salt, 8 in chcr_ktls_xmit_wr_short() 1428 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.c | 79 unsigned char *key, *salt; in chcr_ktls_save_keys() local 94 salt = info_128_gcm->salt; in chcr_ktls_save_keys() 158 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 1419 /* copy the 16 byte IV for AES-CTR, which includes 4 bytes of salt, 8 in chcr_ktls_xmit_wr_short() 1422 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 203 * ixgbevf_ipsec_parse_proto_keys - find the key and salt based on the protocol 206 * @mysalt: pointer to salt value to populate 208 * This copies the protocol keys and salt to our own data tables. The 242 * 160 accounts for 16 byte key and 4 byte salt in ixgbevf_ipsec_parse_proto_keys() 249 netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n"); in ixgbevf_ipsec_parse_proto_keys() 306 /* get the key and salt */ in ixgbevf_ipsec_add_sa() 307 ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbevf_ipsec_add_sa() 360 ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbevf_ipsec_add_sa()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | tls.c | 342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 203 * ixgbevf_ipsec_parse_proto_keys - find the key and salt based on the protocol 206 * @mysalt: pointer to salt value to populate 208 * This copies the protocol keys and salt to our own data tables. The 242 * 160 accounts for 16 byte key and 4 byte salt in ixgbevf_ipsec_parse_proto_keys() 249 netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n"); in ixgbevf_ipsec_parse_proto_keys() 312 /* get the key and salt */ in ixgbevf_ipsec_add_sa() 313 ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbevf_ipsec_add_sa() 366 ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbevf_ipsec_add_sa()
|
/kernel/linux/linux-6.6/net/tls/ |
H A D | tls_sw.c | 2667 char *iv, *rec_seq, *key, *salt; in tls_set_sw_offload() local 2707 salt = crypto_info_salt(crypto_info, cipher_desc); in tls_set_sw_offload() 2732 prot->salt_size = cipher_desc->salt; in tls_set_sw_offload() 2733 cctx->iv = kmalloc(cipher_desc->iv + cipher_desc->salt, GFP_KERNEL); in tls_set_sw_offload() 2738 /* Note: 128 & 256 bit salt are the same size */ in tls_set_sw_offload() 2740 memcpy(cctx->iv, salt, cipher_desc->salt); in tls_set_sw_offload() 2741 memcpy(cctx->iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_sw_offload()
|
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | smp.c | 236 /* The btle, salt and length "magic" values are as defined in in smp_f5() 238 * the btle value ends up being 'btle'. The salt is just a in smp_f5() 243 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local 253 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5() 356 const u8 salt[16], u8 res[16]) in smp_h7() 360 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7() 362 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7() 1165 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local 1167 if (smp_h7(smp->tfm_cmac, smp->tk, salt, sm in sc_generate_link_key() 355 smp_h7(struct crypto_shash *tfm_cmac, const u8 w[16], const u8 salt[16], u8 res[16]) smp_h7() argument 1223 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; sc_generate_ltk() local [all...] |
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | smp.c | 237 /* The btle, salt and length "magic" values are as defined in in smp_f5() 239 * the btle value ends up being 'btle'. The salt is just a in smp_f5() 244 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local 254 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5() 357 const u8 salt[16], u8 res[16]) in smp_h7() 361 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7() 363 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7() 1171 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local 1173 if (smp_h7(smp->tfm_cmac, smp->tk, salt, sm in sc_generate_link_key() 356 smp_h7(struct crypto_shash *tfm_cmac, const u8 w[16], const u8 salt[16], u8 res[16]) smp_h7() argument 1229 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; sc_generate_ltk() local [all...] |
/kernel/linux/linux-5.10/fs/ |
H A D | namei.c | 1989 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument 1991 unsigned long a, x = 0, y = (unsigned long)salt; in full_name_hash() 2010 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument 2012 unsigned long a = 0, x = 0, y = (unsigned long)salt; in hashlen_string() 2038 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument 2040 unsigned long a = 0, b, x = 0, y = (unsigned long)salt; in hash_name() 2066 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument 2068 unsigned long hash = init_name_hash(salt); in full_name_hash() 2076 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument 2078 unsigned long hash = init_name_hash(salt); in hashlen_string() 2095 hash_name(const void *salt, const char *name) hash_name() argument [all...] |
/kernel/linux/linux-6.6/fs/ |
H A D | namei.c | 2117 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument 2119 unsigned long a, x = 0, y = (unsigned long)salt; in full_name_hash() 2138 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument 2140 unsigned long a = 0, x = 0, y = (unsigned long)salt; in hashlen_string() 2166 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument 2168 unsigned long a = 0, b, x = 0, y = (unsigned long)salt; in hash_name() 2194 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument 2196 unsigned long hash = init_name_hash(salt); in full_name_hash() 2204 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument 2206 unsigned long hash = init_name_hash(salt); in hashlen_string() 2223 hash_name(const void *salt, const char *name) hash_name() argument [all...] |
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.h | 40 /* size of salt value for AES-GCM-ESP and AES-CCM-ESP */ 130 /* IV or counter. Size to include salt. Also used for XTS tweek. */ 185 u8 salt[MAX_SALT_SIZE]; member 308 * concatenated with salt, includes the salt.
|