/openbmc/qemu/tests/unit/ |
H A D | test-crypto-pbkdf.c | 38 const char *salt; member 59 .salt = "ATHENA.MIT.EDUraeburn", 73 .salt = "ATHENA.MIT.EDUraeburn", 87 .salt = "ATHENA.MIT.EDUraeburn", 101 .salt = "\0224VxxV4\022", /* "\x1234567878563412 */ 116 .salt = "pass phrase equals block size", 131 .salt = "pass phrase exceeds block size", 145 .salt = "EXAMPLE.COMpianist", 161 .salt = "salt", 173 .salt = "salt", [all …]
|
/openbmc/qemu/crypto/ |
H A D | pbkdf-nettle.c | 48 const uint8_t *salt, size_t nsalt, in qcrypto_pbkdf2() argument 77 MD5_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 83 SHA1_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 89 SHA224_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 95 SHA256_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 101 SHA384_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 107 SHA512_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 113 RIPEMD160_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2() 119 SM3_DIGEST_SIZE, iterations, nsalt, salt, nout, out); in qcrypto_pbkdf2()
|
H A D | ivgen-essiv.c | 34 uint8_t *salt; in qcrypto_ivgen_essiv_init() local 44 salt = g_new0(uint8_t, MAX(nhash, nsalt)); in qcrypto_ivgen_essiv_init() 47 &salt, &nhash, in qcrypto_ivgen_essiv_init() 50 g_free(salt); in qcrypto_ivgen_essiv_init() 57 salt, MIN(nhash, nsalt), in qcrypto_ivgen_essiv_init() 61 g_free(salt); in qcrypto_ivgen_essiv_init() 65 g_free(salt); in qcrypto_ivgen_essiv_init()
|
H A D | pbkdf.c | 93 const uint8_t *salt; member 106 const uint8_t *salt = iters_data->salt; in threaded_qcrypto_pbkdf2_count_iters() local 122 salt, nsalt, in threaded_qcrypto_pbkdf2_count_iters() 169 const uint8_t *salt, size_t nsalt, in qcrypto_pbkdf2_count_iters() argument 174 hash, key, nkey, salt, nsalt, nout, 0, errp in qcrypto_pbkdf2_count_iters()
|
H A D | pbkdf-gnutls.c | 44 const uint8_t *salt, size_t nsalt, in qcrypto_pbkdf2() argument 60 const gnutls_datum_t gsalt = { (unsigned char *)salt, nsalt }; in qcrypto_pbkdf2()
|
H A D | pbkdf-gcrypt.c | 47 const uint8_t *salt, size_t nsalt, in qcrypto_pbkdf2() argument 83 salt, nsalt, iterations, in qcrypto_pbkdf2()
|
/openbmc/linux/include/uapi/linux/ |
H A D | tls.h | 129 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 137 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 145 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member 153 unsigned char salt[TLS_CIPHER_CHACHA20_POLY1305_SALT_SIZE]; member 161 unsigned char salt[TLS_CIPHER_SM4_GCM_SALT_SIZE]; member 169 unsigned char salt[TLS_CIPHER_SM4_CCM_SALT_SIZE]; member 177 unsigned char salt[TLS_CIPHER_ARIA_GCM_128_SALT_SIZE]; member 185 unsigned char salt[TLS_CIPHER_ARIA_GCM_256_SALT_SIZE]; member
|
/openbmc/qemu/tests/tcg/aarch64/ |
H A D | pauth-5.c | 9 unsigned long salt = 0; in main() local 26 salt++; in main() 27 asm("pacda %0, %1" : "=r"(p1) : "r"(salt), "0"(p0)); in main() 35 asm("pacda %0, %1" : "=r"(p2) : "r"(salt), "0"(p1)); in main() 38 asm("autda %0, %1" : "=r"(p3) : "r"(salt), "0"(p2)); in main()
|
/openbmc/linux/include/linux/ |
H A D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
/openbmc/linux/fs/ecryptfs/ |
H A D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | ktls_txrx.c | 16 salt = info->salt; \ 18 salt_sz = sizeof(info->salt); \ 29 char *salt, *rec_seq; in fill_static_params() local 59 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
|
/openbmc/linux/net/tls/ |
H A D | tls_device_fallback.c | 92 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record() 332 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local 343 salt = tls_ctx->crypto_send.aes_gcm_128.salt; in tls_enc_skb() 346 salt = tls_ctx->crypto_send.aes_gcm_256.salt; in tls_enc_skb() 352 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb() 359 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb() 360 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-verify.c | 159 uint8_t *salt, int salt_len, in compute_hash_prime() argument 169 region[2].data = salt; in compute_hash_prime() 192 uint8_t *db = NULL, *salt = NULL; in padding_pss_verify() local 204 salt = malloc(salt_len); in padding_pss_verify() 206 if (!masked_db || !h || !db_mask || !db || !salt || !hprime) { in padding_pss_verify() 251 memcpy(salt, &db[1], salt_len); in padding_pss_verify() 256 salt, salt_len, hprime); in padding_pss_verify() 263 free(salt); in padding_pss_verify()
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
/openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
H A D | image_types_verity.bbclass | 29 # The root hash is calculated using a salt to make attacks more difficult. Thus, 30 # please grant each image recipe its own salt which could be generated e.g. via 77 salt = d.getVar('VERITY_SALT') 78 if salt == d.getVar('CLASS_VERITY_SALT'): 95 '--salt={}'.format(salt),
|
/openbmc/qemu/include/crypto/ |
H A D | pbkdf.h | 124 const uint8_t *salt, size_t nsalt, 152 const uint8_t *salt, size_t nsalt,
|
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 256 unsigned char *key_p, *salt; in chtls_key_info() local 276 salt = gcm_ctx_128->salt; in chtls_key_info() 289 salt = gcm_ctx_256->salt; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
/openbmc/linux/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
/openbmc/linux/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|
H A D | ixgbe_ipsec.c | 22 u32 key[], u32 salt) in ixgbe_ipsec_set_tx_sa() argument 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_tx_sa() 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) in ixgbe_ipsec_set_rx_sa() argument 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); in ixgbe_ipsec_set_rx_sa() 327 r->key, r->salt, in ixgbe_ipsec_restore() 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); in ixgbe_ipsec_restore() 618 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); in ixgbe_ipsec_add_sa() 697 rsa.salt, rsa.mode, rsa.iptbl_ind); in ixgbe_ipsec_add_sa() 727 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); in ixgbe_ipsec_add_sa() 737 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); in ixgbe_ipsec_add_sa()
|
/openbmc/linux/fs/fscache/ |
H A D | main.c | 59 unsigned int fscache_hash(unsigned int salt, const void *data, size_t len) in fscache_hash() argument 62 unsigned int a, x = 0, y = salt, n = len / sizeof(__le32); in fscache_hash()
|
/openbmc/linux/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth_ktls.c | 50 memcpy(req.salt, c->salt, sizeof(c->salt)); in fun_ktls_add()
|
/openbmc/linux/fs/verity/ |
H A D | open.c | 33 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 50 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 194 desc->salt, desc->salt_size); in fsverity_create_info() 301 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
|
H A D | fsverity_private.h | 85 const u8 *salt, size_t salt_size); 109 const u8 *salt, size_t salt_size);
|
/openbmc/linux/crypto/ |
H A D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|