Searched refs:salt (Results 1 – 8 of 8) sorted by relevance
| /net/tls/ |
| A D | tls_device_fallback.c | 73 memcpy(iv + cipher_desc->salt, buf + TLS_HEADER_SIZE, cipher_desc->iv); in tls_enc_record() 308 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local 320 buf_len = cipher_desc->salt + cipher_desc->iv + TLS_AAD_SPACE_SIZE + in tls_enc_skb() 327 salt = crypto_info_salt(&tls_ctx->crypto_send.info, cipher_desc); in tls_enc_skb() 328 memcpy(iv, salt, cipher_desc->salt); in tls_enc_skb() 329 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
|
| A D | tls_main.c | 68 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \ 74 .salt_offset = offsetof(struct ci, salt), \ 82 .salt = cipher ## _SALT_SIZE, \ 94 .salt = cipher ## _SALT_SIZE, \ 488 cctx->iv + cipher_desc->salt, cipher_desc->iv); in do_tls_getsockopt_conf()
|
| A D | tls_sw.c | 2740 prot->salt_size = cipher_desc->salt; in init_prot_info() 2762 char *iv, *rec_seq, *key, *salt; in tls_set_sw_offload() local 2812 salt = crypto_info_salt(src_crypto_info, cipher_desc); in tls_set_sw_offload() 2857 memcpy(cctx->iv, salt, cipher_desc->salt); in tls_set_sw_offload() 2858 memcpy(cctx->iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_sw_offload()
|
| A D | tls.h | 58 unsigned int salt; member
|
| A D | tls_device.c | 1105 memcpy(ctx->tx.iv + cipher_desc->salt, iv, cipher_desc->iv); in tls_set_device_offload()
|
| /net/tipc/ |
| A D | crypto.c | 156 u32 salt; member 657 aead->salt = src->salt; in tipc_aead_clone() 745 u32 salt; in tipc_aead_encrypt() local 792 salt = aead->salt; in tipc_aead_encrypt() 794 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_encrypt() 797 memcpy(iv, &salt, 4); in tipc_aead_encrypt() 897 u32 salt; in tipc_aead_decrypt() local 926 salt = aead->salt; in tipc_aead_decrypt() 928 salt ^= __be32_to_cpu(ehdr->addr); in tipc_aead_decrypt() 930 salt ^= tipc_own_addr(net); in tipc_aead_decrypt() [all …]
|
| /net/sched/ |
| A D | sch_sfb.c | 255 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 316 u32 salt; in sfb_enqueue() local 319 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 321 sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); in sfb_enqueue()
|
| /net/bluetooth/ |
| A D | smp.c | 243 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local 253 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5() 356 const u8 salt[16], u8 res[16]) in smp_h7() 360 SMP_DBG("w %16phN salt %16phN", w, salt); in smp_h7() 362 err = aes_cmac(tfm_cmac, salt, w, 16, res); in smp_h7() 1164 const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; in sc_generate_link_key() local 1166 if (smp_h7(smp->tfm_cmac, smp->tk, salt, smp->link_key)) { in sc_generate_link_key() 1222 const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; in sc_generate_ltk() local 1224 if (smp_h7(smp->tfm_cmac, key->val, salt, smp->tk)) in sc_generate_ltk()
|
Completed in 34 milliseconds