Home
last modified time | relevance | path

Searched refs:salt (Results 51 – 75 of 111) sorted by relevance

12345

/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dserver.py168 def hash_token(algo, salt, token): argument
170 h.update(salt.encode("utf-8"))
172 return ":".join([algo, salt, h.hexdigest()])
644 algo, salt, _ = db_token.split(":")
648 if hash_token(algo, salt, token) != db_token:
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dmacsec.c66 salt_t salt; member
138 salt_t salt; member
268 salt_p = MLX5_ADDR_OF(macsec_offload_obj, obj, salt); in mlx5e_macsec_create_object()
270 memcpy((u32 *)salt_p + i, &attrs->salt.bytes[4 * (2 - i)], 4); in mlx5e_macsec_create_object()
379 memcpy(&obj_attrs.salt, &sa->salt, sizeof(sa->salt)); in mlx5e_macsec_init_sa()
493 sa->salt = key->salt; in update_macsec_epn()
H A Dipsec_offload.c153 salt_p = MLX5_ADDR_OF(ipsec_obj, obj, salt); in mlx5_create_ipsec_obj()
154 memcpy(salt_p, &aes_gcm->salt, sizeof(aes_gcm->salt)); in mlx5_create_ipsec_obj()
H A Dipsec.h48 u32 salt; member
/openbmc/linux/drivers/scsi/qla2xxx/
H A Dqla_edif.h83 __le32 salt; member
H A Dqla_edif_bsg.h178 uint32_t salt; member
/openbmc/linux/include/uapi/rdma/
H A Dib_user_ioctl_verbs.h158 __u32 salt; member
/openbmc/linux/net/tls/
H A Dtls_main.c67 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \
73 .salt_offset = offsetof(struct ci, salt), \
81 .salt = cipher ## _SALT_SIZE, \
93 .salt = cipher ## _SALT_SIZE, \
488 cctx->iv + cipher_desc->salt, cipher_desc->iv); in do_tls_getsockopt_conf()
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/
H A D0003-tpm-openssl-tpm-engine-parse-an-encrypted-tpm-SRK-pa.patch11 AES password and salt is set in bb file.
13 encrypt it with the same AES password and salt by AES algorithm.
/openbmc/linux/crypto/
H A Dgeniv.c122 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
H A Dechainiv.c74 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
H A Dchacha20poly1305.c30 u8 salt[]; member
90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv()
483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
H A Dseqiv.c99 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
/openbmc/linux/drivers/crypto/hisilicon/sec2/
H A Dsec_crypto.h364 __le32 salt; member
/openbmc/linux/Documentation/filesystems/
H A Dfsverity.rst126 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is
127 provided. The salt is a value that is prepended to every hashed
129 file or device. Currently the maximum salt size is 32 bytes.
130 - ``salt_ptr`` is the pointer to the salt, or NULL if no salt is
174 - ``EMSGSIZE``: the salt or builtin signature is too long
393 If a salt was specified, then it's zero-padded to the closest multiple
395 64 bytes for SHA-256 or 128 bytes for SHA-512. The padded salt is
401 of the salt padding is to make the salting "free" when the salted hash
429 __u8 salt_size; /* size of salt in bytes; 0 if none */
433 __u8 salt[32]; /* salt prepended to each hashed block */
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/
H A Dchcr_ipsec.c179 memcpy(sa_entry->salt, key + keylen, 4); in ch_ipsec_setkey()
538 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
/openbmc/qemu/crypto/
H A Dblock-luks.c726 if (qcrypto_random_bytes(slot->salt, in qcrypto_block_luks_store_key()
739 slot->salt, in qcrypto_block_luks_store_key()
776 slot->salt, in qcrypto_block_luks_store_key()
913 slot->salt, QCRYPTO_BLOCK_LUKS_SALT_LEN, in qcrypto_block_luks_load_key()
1146 memset(slot->salt, 0, QCRYPTO_BLOCK_LUKS_SALT_LEN); in qcrypto_block_luks_erase_key()
/openbmc/linux/drivers/net/ethernet/netronome/nfp/crypto/
H A Dipsec.c93 u32 salt; /* Initialized with SA */ member
445 cfg->aesgcm_fields.salt = get_unaligned_be32(x->aead->alg_key + key_len); in nfp_net_xfrm_add_state()
H A Dtls.c342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
/openbmc/linux/fs/fscache/
H A Dinternal.h80 extern unsigned int fscache_hash(unsigned int salt, const void *data, size_t len);
/openbmc/linux/drivers/crypto/chelsio/
H A Dchcr_crypto.h235 u8 salt[MAX_SALT]; member
/openbmc/linux/drivers/crypto/bcm/
H A Dcipher.h186 u8 salt[MAX_SALT_SIZE]; member
/openbmc/linux/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.c313 ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbevf_ipsec_add_sa()
366 ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbevf_ipsec_add_sa()
/openbmc/linux/fs/
H A Dnamei.c2117 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument
2119 unsigned long a, x = 0, y = (unsigned long)salt; in full_name_hash()
2138 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument
2140 unsigned long a = 0, x = 0, y = (unsigned long)salt; in hashlen_string()
2166 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument
2168 unsigned long a = 0, b, x = 0, y = (unsigned long)salt; in hash_name()
2196 unsigned long hash = init_name_hash(salt); in full_name_hash()
2204 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument
2206 unsigned long hash = init_name_hash(salt); in hashlen_string()
2223 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument
[all …]
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
H A Dchcr_ktls.c79 unsigned char *key, *salt; in chcr_ktls_save_keys() local
94 salt = info_128_gcm->salt; in chcr_ktls_save_keys()
158 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys()
1422 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()

12345