/linux-4.1.27/fs/ecryptfs/ |
H A D | debug.c | 34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; ecryptfs_dump_auth_tok() local 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, ecryptfs_dump_auth_tok() 45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; ecryptfs_dump_auth_tok() 46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); ecryptfs_dump_auth_tok()
|
H A D | keystore.c | 1482 memcpy((*new_auth_tok)->token.password.salt, parse_tag_3_packet() 2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, write_tag_3_packet() 2359 (*packet_size) += ECRYPTFS_SALT_SIZE; /* salt */ write_tag_3_packet()
|
H A D | ecryptfs_kernel.h | 323 * This struct is to enable a mount-wide passphrase/salt combo. This
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | pdb.h | 68 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_ccm 76 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_gcm 105 u32 salt; member in struct:ipsec_decap_ctr 110 u32 salt; member in struct:ipsec_decap_ccm 117 u32 salt; member in struct:ipsec_decap_gcm 329 u16 salt[7]; member in struct:srtp_encap_pdb 344 u16 salt[7]; member in struct:srtp_decap_pdb
|
H A D | caamalg.c | 1766 * The last four bytes of the key material are used as the salt value rfc4106_setkey() 1805 * The last four bytes of the key material are used as the salt value rfc4543_setkey()
|
/linux-4.1.27/include/linux/ |
H A D | ecryptfs.h | 74 /* Iterated-hash concatenation of salt and passphrase */ 78 u8 salt[ECRYPTFS_SALT_SIZE]; member in struct:ecryptfs_password
|
/linux-4.1.27/drivers/md/ |
H A D | dm-verity.c | 62 u8 *salt; /* salt: its size is salt_size */ member in struct:dm_verity 298 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level() 312 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level() 399 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io() 428 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io() 619 DMEMIT("%02x", v->salt[x]); verity_status() 700 kfree(v->salt); verity_dtr() 729 * <salt> Hex string or "-" if no salt. 869 v->salt = kmalloc(v->salt_size, GFP_KERNEL); verity_ctr() 870 if (!v->salt) { verity_ctr() 871 ti->error = "Cannot allocate salt"; verity_ctr() 876 hex2bin(v->salt, argv[9], v->salt_size)) { verity_ctr() 877 ti->error = "Invalid salt"; verity_ctr()
|
H A D | dm-crypt.c | 90 u8 *salt; member in struct:iv_essiv_private 205 * essiv: "encrypted sector|salt initial vector", the sector number is 206 * encrypted with the bulk cipher using a salt as key. The salt 261 /* Initialise ESSIV - compute salt but no local memory allocations */ crypt_iv_essiv_init() 274 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); crypt_iv_essiv_init() 280 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, crypt_iv_essiv_init() 288 /* Wipe salt and reset key derived from volume key */ crypt_iv_essiv_wipe() 296 memset(essiv->salt, 0, salt_size); crypt_iv_essiv_wipe() 299 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); crypt_iv_essiv_wipe() 309 u8 *salt, unsigned saltsize) setup_essiv_cpu() 314 /* Setup the essiv_tfm with the given salt */ setup_essiv_cpu() 329 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); setup_essiv_cpu() 347 kzfree(essiv->salt); crypt_iv_essiv_dtr() 348 essiv->salt = NULL; crypt_iv_essiv_dtr() 363 u8 *salt = NULL; crypt_iv_essiv_ctr() local 379 salt = kzalloc(crypto_hash_digestsize(hash_tfm), GFP_KERNEL); crypt_iv_essiv_ctr() 380 if (!salt) { crypt_iv_essiv_ctr() 381 ti->error = "Error kmallocing salt storage in ESSIV"; crypt_iv_essiv_ctr() 386 cc->iv_gen_private.essiv.salt = salt; crypt_iv_essiv_ctr() 389 essiv_tfm = setup_essiv_cpu(cc, ti, salt, crypt_iv_essiv_ctr() 402 kfree(salt); crypt_iv_essiv_ctr() 307 setup_essiv_cpu(struct crypt_config *cc, struct dm_target *ti, u8 *salt, unsigned saltsize) setup_essiv_cpu() argument
|
/linux-4.1.27/crypto/ |
H A D | seqiv.c | 5 * with a salt. This algorithm is mainly useful for CTR and similar modes. 29 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member in struct:seqiv_ctx 95 crypto_xor(info, ctx->salt, ivsize); seqiv_geniv() 200 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, seqiv_givencrypt_first() 223 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, seqiv_aead_givencrypt_first()
|
H A D | eseqiv.c | 5 * with a salt and then encrypting it with the same key as used to encrypt 39 char salt[]; member in struct:eseqiv_ctx 128 memcpy(req->creq.info, ctx->salt, ivsize); eseqiv_givencrypt() 160 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, eseqiv_givencrypt_first()
|
/linux-4.1.27/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 64 * Removed auth_tok->token.password.salt and ecryptfs_fill_auth_tok()
|
/linux-4.1.27/net/sched/ |
H A D | sch_sfb.c | 257 int *qerr, u32 *salt) sfb_classify() 273 *salt = TC_H_MIN(res.classid); sfb_classify() 288 u32 r, slot, salt, sfbhash; sfb_enqueue() local 313 if (!sfb_classify(skb, fl, &ret, &salt)) sfb_enqueue() 315 keys.src = salt; sfb_enqueue() 256 sfb_classify(struct sk_buff *skb, struct tcf_proto *fl, int *qerr, u32 *salt) sfb_classify() argument
|
H A D | cls_rsvp.h | 372 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) gen_handle() argument 382 h = data->hgenerator|salt; gen_handle()
|
/linux-4.1.27/drivers/watchdog/ |
H A D | max63xx_wdt.c | 52 * these values with a grain of salt. Same goes for the initial delay
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) arcfour_hmac_md5_usage_to_salt() argument 142 salt[0] = (ms_usage >> 0) & 0xff; arcfour_hmac_md5_usage_to_salt() 143 salt[1] = (ms_usage >> 8) & 0xff; arcfour_hmac_md5_usage_to_salt() 144 salt[2] = (ms_usage >> 16) & 0xff; arcfour_hmac_md5_usage_to_salt() 145 salt[3] = (ms_usage >> 24) & 0xff; arcfour_hmac_md5_usage_to_salt()
|
/linux-4.1.27/drivers/crypto/ |
H A D | picoxcell_crypto.c | 177 u8 salt[AES_BLOCK_SIZE]; member in struct:spacc_aead_ctx 746 memcpy(req->areq.iv, ctx->salt, ivsize); spacc_aead_givencrypt() 791 get_random_bytes(ctx->salt, sizeof(ctx->salt)); spacc_aead_cra_init()
|
H A D | ixp4xx_crypto.c | 185 u8 salt[MAX_IVLEN]; member in struct:ixp_ctx 1196 get_random_bytes(ctx->salt, ivsize); aead_givencrypt() 1199 memcpy(req->areq.iv, ctx->salt, ivsize); aead_givencrypt()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 117 uint8_t salt[AES_BLOCK_SIZE]; member in struct:qat_alg_aead_ctx 524 if (crypto_rng_get_bytes(crypto_default_rng, ctx->salt, AES_BLOCK_SIZE)) qat_alg_aead_init_sessions() 943 memcpy(req->giv, ctx->salt, AES_BLOCK_SIZE); qat_alg_aead_genivenc()
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | aesni-intel_avx-x86_64.S | 1498 # u8 *iv, /* Pre-counter block j0: 4 byte salt 1519 # u8 *iv, /* Pre-counter block j0: 4 byte salt 2775 # u8 *iv, /* Pre-counter block j0: 4 byte salt 2796 # u8 *iv, /* Pre-counter block j0: 4 byte salt
|
H A D | aesni-intel_glue.c | 119 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association) 140 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association)
|
H A D | aesni-intel_asm.S | 1201 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association) 1464 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
|
/linux-4.1.27/net/bluetooth/ |
H A D | smp.c | 244 /* The btle, salt and length "magic" values are as defined in smp_f5() 246 * the btle value ends up being 'btle'. The salt is just a smp_f5() 251 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, smp_f5() local 261 err = aes_cmac(tfm_cmac, salt, w, 32, t); smp_f5()
|
/linux-4.1.27/drivers/gpu/drm/ |
H A D | drm_dp_mst_topology.c | 1333 u64 salt = get_jiffies_64(); drm_dp_validate_guid() local 1334 memcpy(&guid[0], &salt, sizeof(u64)); drm_dp_validate_guid() 1335 memcpy(&guid[8], &salt, sizeof(u64)); drm_dp_validate_guid()
|
/linux-4.1.27/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_sriov.c | 339 * salt away the number of multi cast addresses assigned ixgbe_set_vf_multicasts()
|
/linux-4.1.27/drivers/net/ |
H A D | vxlan.c | 139 /* salt for hash table */
|
/linux-4.1.27/drivers/net/ethernet/intel/igb/ |
H A D | igb_main.c | 5747 /* salt away the number of multicast addresses assigned igb_set_vf_multicasts()
|