/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | server.py | 168 def hash_token(algo, salt, token): argument 170 h.update(salt.encode("utf-8")) 172 return ":".join([algo, salt, h.hexdigest()]) 644 algo, salt, _ = db_token.split(":") 648 if hash_token(algo, salt, token) != db_token:
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | macsec.c | 66 salt_t salt; member 138 salt_t salt; member 268 salt_p = MLX5_ADDR_OF(macsec_offload_obj, obj, salt); in mlx5e_macsec_create_object() 270 memcpy((u32 *)salt_p + i, &attrs->salt.bytes[4 * (2 - i)], 4); in mlx5e_macsec_create_object() 379 memcpy(&obj_attrs.salt, &sa->salt, sizeof(sa->salt)); in mlx5e_macsec_init_sa() 493 sa->salt = key->salt; in update_macsec_epn()
|
H A D | ipsec_offload.c | 153 salt_p = MLX5_ADDR_OF(ipsec_obj, obj, salt); in mlx5_create_ipsec_obj() 154 memcpy(salt_p, &aes_gcm->salt, sizeof(aes_gcm->salt)); in mlx5_create_ipsec_obj()
|
H A D | ipsec.h | 48 u32 salt; member
|
/openbmc/linux/drivers/scsi/qla2xxx/ |
H A D | qla_edif.h | 83 __le32 salt; member
|
H A D | qla_edif_bsg.h | 178 uint32_t salt; member
|
/openbmc/linux/include/uapi/rdma/ |
H A D | ib_user_ioctl_verbs.h | 158 __u32 salt; member
|
/openbmc/linux/net/tls/ |
H A D | tls_main.c | 67 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \ 73 .salt_offset = offsetof(struct ci, salt), \ 81 .salt = cipher ## _SALT_SIZE, \ 93 .salt = cipher ## _SALT_SIZE, \ 488 cctx->iv + cipher_desc->salt, cipher_desc->iv); in do_tls_getsockopt_conf()
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/ |
H A D | 0003-tpm-openssl-tpm-engine-parse-an-encrypted-tpm-SRK-pa.patch | 11 AES password and salt is set in bb file. 13 encrypt it with the same AES password and salt by AES algorithm.
|
/openbmc/linux/crypto/ |
H A D | geniv.c | 122 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
|
H A D | echainiv.c | 74 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
|
H A D | chacha20poly1305.c | 30 u8 salt[]; member 90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
|
H A D | seqiv.c | 99 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
|
/openbmc/linux/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.h | 364 __le32 salt; member
|
/openbmc/linux/Documentation/filesystems/ |
H A D | fsverity.rst | 126 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is 127 provided. The salt is a value that is prepended to every hashed 129 file or device. Currently the maximum salt size is 32 bytes. 130 - ``salt_ptr`` is the pointer to the salt, or NULL if no salt is 174 - ``EMSGSIZE``: the salt or builtin signature is too long 393 If a salt was specified, then it's zero-padded to the closest multiple 395 64 bytes for SHA-256 or 128 bytes for SHA-512. The padded salt is 401 of the salt padding is to make the salting "free" when the salted hash 429 __u8 salt_size; /* size of salt in bytes; 0 if none */ 433 __u8 salt[32]; /* salt prepended to each hashed block */
|
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
H A D | chcr_ipsec.c | 179 memcpy(sa_entry->salt, key + keylen, 4); in ch_ipsec_setkey() 538 memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); in copy_key_cpltx_pktxt()
|
/openbmc/qemu/crypto/ |
H A D | block-luks.c | 726 if (qcrypto_random_bytes(slot->salt, in qcrypto_block_luks_store_key() 739 slot->salt, in qcrypto_block_luks_store_key() 776 slot->salt, in qcrypto_block_luks_store_key() 913 slot->salt, QCRYPTO_BLOCK_LUKS_SALT_LEN, in qcrypto_block_luks_load_key() 1146 memset(slot->salt, 0, QCRYPTO_BLOCK_LUKS_SALT_LEN); in qcrypto_block_luks_erase_key()
|
/openbmc/linux/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | ipsec.c | 93 u32 salt; /* Initialized with SA */ member 445 cfg->aesgcm_fields.salt = get_unaligned_be32(x->aead->alg_key + key_len); in nfp_net_xfrm_add_state()
|
H A D | tls.c | 342 memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in nfp_net_tls_add()
|
/openbmc/linux/fs/fscache/ |
H A D | internal.h | 80 extern unsigned int fscache_hash(unsigned int salt, const void *data, size_t len);
|
/openbmc/linux/drivers/crypto/chelsio/ |
H A D | chcr_crypto.h | 235 u8 salt[MAX_SALT]; member
|
/openbmc/linux/drivers/crypto/bcm/ |
H A D | cipher.h | 186 u8 salt[MAX_SALT_SIZE]; member
|
/openbmc/linux/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 313 ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbevf_ipsec_add_sa() 366 ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbevf_ipsec_add_sa()
|
/openbmc/linux/fs/ |
H A D | namei.c | 2117 unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) in full_name_hash() argument 2119 unsigned long a, x = 0, y = (unsigned long)salt; in full_name_hash() 2138 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument 2140 unsigned long a = 0, x = 0, y = (unsigned long)salt; in hashlen_string() 2166 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument 2168 unsigned long a = 0, b, x = 0, y = (unsigned long)salt; in hash_name() 2196 unsigned long hash = init_name_hash(salt); in full_name_hash() 2204 u64 hashlen_string(const void *salt, const char *name) in hashlen_string() argument 2206 unsigned long hash = init_name_hash(salt); in hashlen_string() 2223 static inline u64 hash_name(const void *salt, const char *name) in hash_name() argument [all …]
|
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.c | 79 unsigned char *key, *salt; in chcr_ktls_save_keys() local 94 salt = info_128_gcm->salt; in chcr_ktls_save_keys() 158 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 1422 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()
|