Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 7 of 7) sorted by relevance

/crypto/
A Dhkdf.c45 unsigned int ikmlen, const u8 *salt, unsigned int saltlen, in hkdf_extract() argument
50 err = crypto_shash_setkey(hmac_tfm, salt, saltlen); in hkdf_extract()
135 const u8 *salt; member
158 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
204 .salt = NULL,
219 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
256 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
304 .salt = NULL,
320 .salt = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
410 .salt = NULL,
[all …]
A Dessiv.c70 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_skcipher_setkey() local
81 err = crypto_shash_tfm_digest(tctx->hash, key, keylen, salt); in essiv_skcipher_setkey()
89 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_skcipher_setkey()
99 u8 salt[HASH_MAX_DIGESTSIZE]; in essiv_aead_setkey() local
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
122 return crypto_cipher_setkey(tctx->essiv_cipher, salt, in essiv_aead_setkey()
A Dchacha20poly1305.c29 u8 salt[] __counted_by(saltlen);
76 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv()
312 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
A Dgeniv.c121 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
A Dechainiv.c62 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
A Dseqiv.c88 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
A DKconfig841 xoring it with a salt. This algorithm is mainly useful for CTR.
852 a sequence number xored with a salt. This is the default

Completed in 18 milliseconds