Home
last modified time | relevance | path

Searched refs:salt (Results 101 - 125 of 160) sorted by relevance

1234567

/kernel/linux/linux-5.10/include/linux/mlx5/
H A Dmlx5_ifc_fpga.h551 __be32 salt; member
554 u8 salt[16]; member
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/crypto/
H A Dipsec.c93 u32 salt; /* Initialized with SA */ member
407 /* Aead->alg_key_len includes 32-bit salt */ in nfp_net_xfrm_add_state()
444 /* Load up the salt */ in nfp_net_xfrm_add_state()
445 cfg->aesgcm_fields.salt = get_unaligned_be32(x->aead->alg_key + key_len); in nfp_net_xfrm_add_state()
H A Dtls.c342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
/kernel/linux/linux-5.10/crypto/
H A Dchacha20poly1305.c30 u8 salt[]; member
90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv()
483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
H A Dseqiv.c6 * with a salt. This algorithm is mainly useful for CTR and similar modes.
100 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/
H A Dchcr_ipsec.c179 keylen -= 4; /* nonce/salt is present in the last 4 bytes */ in ch_ipsec_setkey()
180 memcpy(sa_entry->salt, key + keylen, 4); in ch_ipsec_setkey()
534 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/
H A Dchcr_ipsec.c178 keylen -= 4; /* nonce/salt is present in the last 4 bytes */ in ch_ipsec_setkey()
179 memcpy(sa_entry->salt, key + keylen, 4); in ch_ipsec_setkey()
538 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
/kernel/linux/linux-5.10/net/tls/
H A Dtls_sw.c2323 char *iv, *rec_seq, *key, *salt, *cipher_name; in tls_set_sw_offload() local
2389 salt = gcm_128_info->salt; in tls_set_sw_offload()
2406 salt = gcm_256_info->salt; in tls_set_sw_offload()
2423 salt = ccm_128_info->salt; in tls_set_sw_offload()
2462 /* Note: 128 & 256 bit salt are the same size */ in tls_set_sw_offload()
2464 memcpy(cctx->iv, salt, salt_size); in tls_set_sw_offload()
/kernel/linux/linux-5.10/drivers/crypto/chelsio/
H A Dchcr_crypto.h233 u8 salt[MAX_SALT]; member
/kernel/linux/linux-5.10/drivers/net/netdevsim/
H A Dnetdevsim.h40 u32 salt; member
/kernel/linux/linux-6.6/fs/fscache/
H A Dinternal.h80 extern unsigned int fscache_hash(unsigned int salt, const void *data, size_t len);
/kernel/linux/linux-6.6/drivers/scsi/qla2xxx/
H A Dqla_edif_bsg.h178 uint32_t salt; member
/kernel/linux/linux-6.6/drivers/crypto/chelsio/
H A Dchcr_crypto.h235 u8 salt[MAX_SALT]; member
/kernel/linux/linux-6.6/crypto/
H A Dseqiv.c6 * with a salt. This algorithm is mainly useful for CTR and similar modes.
99 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
/kernel/linux/linux-5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
H A Dchcr_ktls.c79 unsigned char *key, *salt; in chcr_ktls_save_keys() local
94 salt = info_128_gcm->salt; in chcr_ktls_save_keys()
162 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys()
1425 /* copy the 16 byte IV for AES-CTR, which includes 4 bytes of salt, 8 in chcr_ktls_xmit_wr_short()
1428 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()
/kernel/linux/linux-6.6/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
H A Dchcr_ktls.c79 unsigned char *key, *salt; in chcr_ktls_save_keys() local
94 salt = info_128_gcm->salt; in chcr_ktls_save_keys()
158 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys()
1419 /* copy the 16 byte IV for AES-CTR, which includes 4 bytes of salt, 8 in chcr_ktls_xmit_wr_short()
1422 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.c203 * ixgbevf_ipsec_parse_proto_keys - find the key and salt based on the protocol
206 * @mysalt: pointer to salt value to populate
208 * This copies the protocol keys and salt to our own data tables. The
242 * 160 accounts for 16 byte key and 4 byte salt in ixgbevf_ipsec_parse_proto_keys()
249 netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n"); in ixgbevf_ipsec_parse_proto_keys()
306 /* get the key and salt */ in ixgbevf_ipsec_add_sa()
307 ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbevf_ipsec_add_sa()
360 ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbevf_ipsec_add_sa()
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/crypto/
H A Dtls.c342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.c203 * ixgbevf_ipsec_parse_proto_keys - find the key and salt based on the protocol
206 * @mysalt: pointer to salt value to populate
208 * This copies the protocol keys and salt to our own data tables. The
242 * 160 accounts for 16 byte key and 4 byte salt in ixgbevf_ipsec_parse_proto_keys()
249 netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n"); in ixgbevf_ipsec_parse_proto_keys()
312 /* get the key and salt */ in ixgbevf_ipsec_add_sa()
313 ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbevf_ipsec_add_sa()
366 ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbevf_ipsec_add_sa()
/kernel/linux/linux-6.6/net/tls/
H A Dtls_sw.c2667 char *iv, *rec_seq, *key, *salt; in tls_set_sw_offload() local
2707 salt = crypto_info_salt(crypto_info, cipher_desc); in tls_set_sw_offload()
2732 prot->salt_size = cipher_desc->salt; in tls_set_sw_offload()
2733 cctx->iv = kmalloc(cipher_desc->iv + cipher_desc->salt, GFP_KERNEL); in tls_set_sw_offload()
2738 /* Note: 128 & 256 bit salt are the same size */ in tls_set_sw_offload()
2740 memcpy(cctx->iv, salt, cipher_desc->salt); in tls_set_sw_offload()
2741 memcpy(cctx->iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_sw_offload()
/kernel/linux/linux-5.10/net/bluetooth/
H A Dsmp.c236 /* The btle, salt and length "magic" values are as defined in in smp_f5()
238 * the btle value ends up being 'btle'. The salt is just a in smp_f5()
243 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local
253 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5()
356 const u8 salt[16], u8 res[16]) in smp_h7()
360 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7()
362 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7()
1165 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local
1167 if (smp_h7(smp->tfm_cmac, smp->tk, salt, sm in sc_generate_link_key()
355 smp_h7(struct crypto_shash *tfm_cmac, const u8 w[16], const u8 salt[16], u8 res[16]) smp_h7() argument
1223 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; sc_generate_ltk() local
[all...]
/kernel/linux/linux-6.6/net/bluetooth/
H A Dsmp.c237 /* The btle, salt and length "magic" values are as defined in in smp_f5()
239 * the btle value ends up being 'btle'. The salt is just a in smp_f5()
244 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local
254 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5()
357 const u8 salt[16], u8 res[16]) in smp_h7()
361 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7()
363 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7()
1171 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local
1173 if (smp_h7(smp->tfm_cmac, smp->tk, salt, sm in sc_generate_link_key()
356 smp_h7(struct crypto_shash *tfm_cmac, const u8 w[16], const u8 salt[16], u8 res[16]) smp_h7() argument
1229 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; sc_generate_ltk() local
[all...]
/kernel/linux/linux-5.10/fs/
H A Dnamei.c1989 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument
1991 unsigned long a, x = 0, y = (unsigned long)salt; in full_name_hash()
2010 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument
2012 unsigned long a = 0, x = 0, y = (unsigned long)salt; in hashlen_string()
2038 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument
2040 unsigned long a = 0, b, x = 0, y = (unsigned long)salt; in hash_name()
2066 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument
2068 unsigned long hash = init_name_hash(salt); in full_name_hash()
2076 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument
2078 unsigned long hash = init_name_hash(salt); in hashlen_string()
2095 hash_name(const void *salt, const char *name) hash_name() argument
[all...]
/kernel/linux/linux-6.6/fs/
H A Dnamei.c2117 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument
2119 unsigned long a, x = 0, y = (unsigned long)salt; in full_name_hash()
2138 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument
2140 unsigned long a = 0, x = 0, y = (unsigned long)salt; in hashlen_string()
2166 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument
2168 unsigned long a = 0, b, x = 0, y = (unsigned long)salt; in hash_name()
2194 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument
2196 unsigned long hash = init_name_hash(salt); in full_name_hash()
2204 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument
2206 unsigned long hash = init_name_hash(salt); in hashlen_string()
2223 hash_name(const void *salt, const char *name) hash_name() argument
[all...]
/kernel/linux/linux-5.10/drivers/crypto/bcm/
H A Dcipher.h40 /* size of salt value for AES-GCM-ESP and AES-CCM-ESP */
130 /* IV or counter. Size to include salt. Also used for XTS tweek. */
185 u8 salt[MAX_SALT_SIZE]; member
308 * concatenated with salt, includes the salt.

Completed in 39 milliseconds

1234567