Searched refs:salt (Results 1 – 7 of 7) sorted by relevance
| /crypto/ |
| A D | hkdf.c | 45 unsigned int ikmlen, const u8 *salt, unsigned int saltlen, in hkdf_extract() argument 50 err = crypto_shash_setkey(hmac_tfm, salt, saltlen); in hkdf_extract() 135 const u8 *salt; member 158 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 204 .salt = NULL, 219 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 256 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 304 .salt = NULL, 320 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c", 410 .salt = NULL, [all …]
|
| A D | essiv.c | 70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local 81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey() 89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey() 99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey() 122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
|
| A D | chacha20poly1305.c | 29 u8 salt[] __counted_by(saltlen); 76 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 312 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
|
| A D | geniv.c | 121 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
|
| A D | echainiv.c | 62 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
|
| A D | seqiv.c | 88 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
|
| A D | Kconfig | 841 xoring it with a salt. This algorithm is mainly useful for CTR. 852 a sequence number xored with a salt. This is the default
|
Completed in 18 milliseconds