salt 331 crypto/aead.c err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, salt 32 crypto/chacha20poly1305.c u8 salt[]; salt 92 crypto/chacha20poly1305.c memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); salt 486 crypto/chacha20poly1305.c memcpy(ctx->salt, key + keylen, ctx->saltlen); salt 74 crypto/echainiv.c memcpy(&a, ctx->salt + ivsize - 8, 8); salt 70 crypto/essiv.c u8 salt[HASH_MAX_DIGESTSIZE]; salt 85 crypto/essiv.c err = crypto_shash_digest(desc, key, keylen, salt); salt 93 crypto/essiv.c err = crypto_cipher_setkey(tctx->essiv_cipher, salt, salt 108 crypto/essiv.c u8 salt[HASH_MAX_DIGESTSIZE]; salt 128 crypto/essiv.c crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); salt 135 crypto/essiv.c err = crypto_cipher_setkey(tctx->essiv_cipher, salt, salt 102 crypto/seqiv.c crypto_xor(info, ctx->salt, ivsize); salt 2804 drivers/crypto/bcm/cipher.c ctx->salt, ctx->salt_len); salt 3018 drivers/crypto/bcm/cipher.c memcpy(ctx->salt, key + keylen - GCM_ESP_SALT_SIZE, GCM_ESP_SALT_SIZE); salt 3022 drivers/crypto/bcm/cipher.c flow_dump("salt: ", ctx->salt, GCM_ESP_SALT_SIZE); salt 3046 drivers/crypto/bcm/cipher.c memcpy(ctx->salt, key + keylen - GCM_ESP_SALT_SIZE, GCM_ESP_SALT_SIZE); salt 3051 drivers/crypto/bcm/cipher.c flow_dump("salt: ", ctx->salt, GCM_ESP_SALT_SIZE); salt 3075 drivers/crypto/bcm/cipher.c memcpy(ctx->salt, key + keylen - CCM_ESP_SALT_SIZE, CCM_ESP_SALT_SIZE); salt 3078 drivers/crypto/bcm/cipher.c flow_dump("salt: ", ctx->salt, CCM_ESP_SALT_SIZE); salt 183 drivers/crypto/bcm/cipher.h u8 salt[MAX_SALT_SIZE]; salt 102 drivers/crypto/caam/pdb.h u8 salt[4]; salt 114 drivers/crypto/caam/pdb.h u8 salt[4]; salt 178 drivers/crypto/caam/pdb.h u8 salt[4]; salt 188 drivers/crypto/caam/pdb.h u8 salt[4]; salt 408 drivers/crypto/caam/pdb.h u16 salt[7]; salt 423 drivers/crypto/caam/pdb.h u16 salt[7]; salt 2794 drivers/crypto/chelsio/chcr_algo.c memcpy(ivptr + 1, &aeadctx->salt[0], 3); salt 3069 drivers/crypto/chelsio/chcr_algo.c memcpy(ivptr, aeadctx->salt, 4); salt 3337 drivers/crypto/chelsio/chcr_algo.c memcpy(aeadctx->salt, key + keylen, 3); salt 3364 drivers/crypto/chelsio/chcr_algo.c memcpy(aeadctx->salt, key + keylen, 4); salt 68 drivers/crypto/chelsio/chcr_core.h u8 salt[MAX_SALT]; salt 191 drivers/crypto/chelsio/chcr_core.h char salt[MAX_SALT]; salt 231 drivers/crypto/chelsio/chcr_crypto.h u8 salt[MAX_SALT]; salt 144 drivers/crypto/chelsio/chcr_ipsec.c memcpy(sa_entry->salt, key + keylen, 4); salt 501 drivers/crypto/chelsio/chcr_ipsec.c memcpy(key_ctx->salt, sa_entry->salt, MAX_SALT); salt 261 drivers/crypto/chelsio/chtls/chtls_hw.c memcpy(kctx->salt, gcm_ctx->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); salt 181 drivers/crypto/ixp4xx_crypto.c u8 salt[MAX_IVLEN]; salt 1898 drivers/gpu/drm/drm_dp_mst_topology.c u64 salt; salt 1903 drivers/gpu/drm/drm_dp_mst_topology.c salt = get_jiffies_64(); salt 1905 drivers/gpu/drm/drm_dp_mst_topology.c memcpy(&guid[0], &salt, sizeof(u64)); salt 1906 drivers/gpu/drm/drm_dp_mst_topology.c memcpy(&guid[8], &salt, sizeof(u64)); salt 4235 drivers/infiniband/hw/mlx5/main.c memcpy(&accel_attrs.keymat.aes_gcm.salt, &aes_gcm->salt, salt 4236 drivers/infiniband/hw/mlx5/main.c sizeof(accel_attrs.keymat.aes_gcm.salt)); salt 146 drivers/md/dm-verity-target.c r = verity_hash_update(v, req, v->salt, v->salt_size, wait); salt 157 drivers/md/dm-verity-target.c r = verity_hash_update(v, req, v->salt, v->salt_size, wait); salt 708 drivers/md/dm-verity-target.c DMEMIT("%02x", v->salt[x]); salt 791 drivers/md/dm-verity-target.c kfree(v->salt); salt 1095 drivers/md/dm-verity-target.c v->salt = kmalloc(v->salt_size, GFP_KERNEL); salt 1096 drivers/md/dm-verity-target.c if (!v->salt) { salt 1102 drivers/md/dm-verity-target.c hex2bin(v->salt, argv[9], v->salt_size)) { salt 41 drivers/md/dm-verity.h u8 *salt; /* salt: its size is salt_size */ salt 22 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c u32 key[], u32 salt) salt 30 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); salt 74 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c u32 key[], u32 salt, u32 mode, u32 ip_idx) salt 90 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); salt 327 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c r->key, r->salt, salt 335 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); salt 607 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); salt 686 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c rsa.salt, rsa.mode, rsa.iptbl_ind); salt 716 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); salt 726 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); salt 36 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.h u32 salt; salt 53 drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.h u32 salt; salt 299 drivers/net/ethernet/intel/ixgbevf/ipsec.c ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); salt 352 drivers/net/ethernet/intel/ixgbevf/ipsec.c ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); salt 22 drivers/net/ethernet/intel/ixgbevf/ipsec.h u32 salt; salt 38 drivers/net/ethernet/intel/ixgbevf/ipsec.h u32 salt; salt 173 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c memcpy(&aes_gcm->seq_iv, &geniv_ctx->salt, ivsize); salt 174 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c memcpy(&aes_gcm->salt, x->aead->alg_key + key_len, salt 175 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c sizeof(aes_gcm->salt)); salt 18 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c salt = info->salt; \ salt 20 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c salt_sz = sizeof(info->salt); \ salt 30 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c char *salt, *rec_seq; salt 38 drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c memcpy(gcm_iv, salt, salt_sz); salt 475 drivers/net/ethernet/mellanox/mlx5/core/fpga/ipsec.c memcpy(&hw_sa->ipsec_sa_v1.gcm.salt, &aes_gcm->salt, salt 476 drivers/net/ethernet/mellanox/mlx5/core/fpga/ipsec.c sizeof(aes_gcm->salt)); salt 521 drivers/net/ethernet/mellanox/mlx5/core/fpga/tls.c crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); salt 42 drivers/net/ethernet/netronome/nfp/crypto/fw.h __be32 salt; salt 341 drivers/net/ethernet/netronome/nfp/crypto/tls.c memcpy(&back->salt, tls_ci->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); salt 49 drivers/net/netdevsim/ipsec.c sap->xs->id.proto, sap->salt, sap->crypt); salt 168 drivers/net/netdevsim/ipsec.c ret = nsim_ipsec_parse_proto_keys(xs, sa.key, &sa.salt); salt 37 drivers/net/netdevsim/netdevsim.h u32 salt; salt 114 fs/crypto/keysetup.c static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) salt 145 fs/crypto/keysetup.c return crypto_shash_digest(desc, key, keysize, salt); salt 154 fs/crypto/keysetup.c u8 salt[SHA256_DIGEST_SIZE]; salt 165 fs/crypto/keysetup.c err = derive_essiv_salt(raw_key, keysize, salt); salt 174 fs/crypto/keysetup.c err = crypto_cipher_setkey(essiv_tfm, salt, sizeof(salt)); salt 179 fs/crypto/keysetup.c memzero_explicit(salt, sizeof(salt)); salt 20 fs/ecryptfs/debug.c char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; salt 29 fs/ecryptfs/debug.c ecryptfs_to_hex(salt, auth_tok->token.password.salt, salt 31 fs/ecryptfs/debug.c salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; salt 32 fs/ecryptfs/debug.c ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); salt 1463 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->token.password.salt, salt 2365 fs/ecryptfs/keystore.c memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, salt 1929 fs/namei.c unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) salt 1931 fs/namei.c unsigned long a, x = 0, y = (unsigned long)salt; salt 1950 fs/namei.c u64 hashlen_string(const void *salt, const char *name) salt 1952 fs/namei.c unsigned long a = 0, x = 0, y = (unsigned long)salt; salt 1978 fs/namei.c static inline u64 hash_name(const void *salt, const char *name) salt 1980 fs/namei.c unsigned long a = 0, b, x = 0, y = (unsigned long)salt; salt 2006 fs/namei.c unsigned int full_name_hash(const void *salt, const char *name, unsigned int len) salt 2008 fs/namei.c unsigned long hash = init_name_hash(salt); salt 2016 fs/namei.c u64 hashlen_string(const void *salt, const char *name) salt 2018 fs/namei.c unsigned long hash = init_name_hash(salt); salt 2035 fs/namei.c static inline u64 hash_name(const void *salt, const char *name) salt 2037 fs/namei.c unsigned long hash = init_name_hash(salt); salt 178 fs/verity/enable.c copy_from_user(desc->salt, salt 202 fs/verity/enable.c desc->salt, desc->salt_size); salt 318 fs/verity/enable.c if (arg.salt_size > FIELD_SIZEOF(struct fsverity_descriptor, salt)) salt 89 fs/verity/fsverity_private.h __u8 salt[32]; /* salt prepended to each hashed block */ salt 120 fs/verity/fsverity_private.h const u8 *salt, size_t salt_size); salt 145 fs/verity/fsverity_private.h const u8 *salt, size_t salt_size); salt 105 fs/verity/hash_algs.c const u8 *salt, size_t salt_size) salt 141 fs/verity/hash_algs.c memcpy(padded_salt, salt, salt_size); salt 32 fs/verity/open.c const u8 *salt, size_t salt_size) salt 48 fs/verity/open.c params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, salt 82 fs/verity/open.c (int)salt_size, salt); salt 171 fs/verity/open.c if (desc->salt_size > sizeof(desc->salt)) { salt 191 fs/verity/open.c desc->salt, desc->salt_size); salt 19 include/crypto/internal/geniv.h u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); salt 79 include/linux/ecryptfs.h u8 salt[ECRYPTFS_SALT_SIZE]; salt 69 include/linux/mlx5/accel.h u32 salt; salt 551 include/linux/mlx5/mlx5_ifc_fpga.h __be32 salt; salt 554 include/linux/mlx5/mlx5_ifc_fpga.h u8 salt[16]; salt 5454 include/linux/platform_data/cros_ec_commands.h uint8_t salt[FP_CONTEXT_SALT_BYTES]; salt 39 include/linux/stringhash.h #define init_name_hash(salt) (unsigned long)(salt) salt 66 include/linux/stringhash.h extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); salt 77 include/linux/stringhash.h extern u64 __pure hashlen_string(const void *salt, const char *name); salt 92 include/uapi/linux/tls.h unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; salt 100 include/uapi/linux/tls.h unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; salt 108 include/uapi/linux/tls.h unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; salt 109 include/uapi/rdma/ib_user_ioctl_verbs.h __u32 salt; salt 247 net/bluetooth/smp.c const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, salt 257 net/bluetooth/smp.c err = aes_cmac(tfm_cmac, salt, w, 32, t); salt 360 net/bluetooth/smp.c const u8 salt[16], u8 res[16]) salt 364 net/bluetooth/smp.c SMP_DBG("w %16phN salt %16phN", w, salt); salt 366 net/bluetooth/smp.c err = aes_cmac(tfm_cmac, salt, w, 16, res); salt 1155 net/bluetooth/smp.c const u8 salt[16] = { 0x31, 0x70, 0x6d, 0x74 }; salt 1157 net/bluetooth/smp.c if (smp_h7(smp->tfm_cmac, smp->tk, salt, smp->link_key)) { salt 1213 net/bluetooth/smp.c const u8 salt[16] = { 0x32, 0x70, 0x6d, 0x74 }; salt 1215 net/bluetooth/smp.c if (smp_h7(smp->tfm_cmac, key->val, salt, smp->tk)) salt 391 net/sched/cls_rsvp.h static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) salt 401 net/sched/cls_rsvp.h h = data->hgenerator|salt; salt 255 net/sched/sch_sfb.c int *qerr, u32 *salt) salt 273 net/sched/sch_sfb.c *salt = TC_H_MIN(res.classid); salt 313 net/sched/sch_sfb.c u32 salt; salt 316 net/sched/sch_sfb.c if (!sfb_classify(skb, fl, &ret, &salt)) salt 318 net/sched/sch_sfb.c sfbhash = siphash_1u32(salt, &q->bins[slot].perturbation); salt 142 net/sunrpc/auth_gss/gss_krb5_crypto.c arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) salt 156 net/sunrpc/auth_gss/gss_krb5_crypto.c salt[0] = (ms_usage >> 0) & 0xff; salt 157 net/sunrpc/auth_gss/gss_krb5_crypto.c salt[1] = (ms_usage >> 8) & 0xff; salt 158 net/sunrpc/auth_gss/gss_krb5_crypto.c salt[2] = (ms_usage >> 16) & 0xff; salt 159 net/sunrpc/auth_gss/gss_krb5_crypto.c salt[3] = (ms_usage >> 24) & 0xff; salt 335 net/tls/tls_device_fallback.c memcpy(iv, tls_ctx->crypto_send.aes_gcm_128.salt, salt 2273 net/tls/tls_sw.c char *iv, *rec_seq, *key, *salt, *cipher_name; salt 2339 net/tls/tls_sw.c salt = gcm_128_info->salt; salt 2356 net/tls/tls_sw.c salt = gcm_256_info->salt; salt 2373 net/tls/tls_sw.c salt = ccm_128_info->salt; salt 2414 net/tls/tls_sw.c memcpy(cctx->iv, salt, salt_size); salt 74 tools/include/uapi/linux/tls.h unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE];