Searched refs:salt (Results 1 - 26 of 26) sorted by relevance

/linux-4.1.27/fs/ecryptfs/
H A Ddebug.c34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; ecryptfs_dump_auth_tok() local
43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, ecryptfs_dump_auth_tok()
45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; ecryptfs_dump_auth_tok()
46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); ecryptfs_dump_auth_tok()
H A Dkeystore.c1482 memcpy((*new_auth_tok)->token.password.salt, parse_tag_3_packet()
2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, write_tag_3_packet()
2359 (*packet_size) += ECRYPTFS_SALT_SIZE; /* salt */ write_tag_3_packet()
H A Decryptfs_kernel.h323 * This struct is to enable a mount-wide passphrase/salt combo. This
/linux-4.1.27/drivers/crypto/caam/
H A Dpdb.h68 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_ccm
76 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_gcm
105 u32 salt; member in struct:ipsec_decap_ctr
110 u32 salt; member in struct:ipsec_decap_ccm
117 u32 salt; member in struct:ipsec_decap_gcm
329 u16 salt[7]; member in struct:srtp_encap_pdb
344 u16 salt[7]; member in struct:srtp_decap_pdb
H A Dcaamalg.c1766 * The last four bytes of the key material are used as the salt value rfc4106_setkey()
1805 * The last four bytes of the key material are used as the salt value rfc4543_setkey()
/linux-4.1.27/include/linux/
H A Decryptfs.h74 /* Iterated-hash concatenation of salt and passphrase */
78 u8 salt[ECRYPTFS_SALT_SIZE]; member in struct:ecryptfs_password
/linux-4.1.27/drivers/md/
H A Ddm-verity.c62 u8 *salt; /* salt: its size is salt_size */ member in struct:dm_verity
298 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level()
312 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level()
399 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io()
428 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io()
619 DMEMIT("%02x", v->salt[x]); verity_status()
700 kfree(v->salt); verity_dtr()
729 * <salt> Hex string or "-" if no salt.
869 v->salt = kmalloc(v->salt_size, GFP_KERNEL); verity_ctr()
870 if (!v->salt) { verity_ctr()
871 ti->error = "Cannot allocate salt"; verity_ctr()
876 hex2bin(v->salt, argv[9], v->salt_size)) { verity_ctr()
877 ti->error = "Invalid salt"; verity_ctr()
H A Ddm-crypt.c90 u8 *salt; member in struct:iv_essiv_private
205 * essiv: "encrypted sector|salt initial vector", the sector number is
206 * encrypted with the bulk cipher using a salt as key. The salt
261 /* Initialise ESSIV - compute salt but no local memory allocations */ crypt_iv_essiv_init()
274 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); crypt_iv_essiv_init()
280 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, crypt_iv_essiv_init()
288 /* Wipe salt and reset key derived from volume key */ crypt_iv_essiv_wipe()
296 memset(essiv->salt, 0, salt_size); crypt_iv_essiv_wipe()
299 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); crypt_iv_essiv_wipe()
309 u8 *salt, unsigned saltsize) setup_essiv_cpu()
314 /* Setup the essiv_tfm with the given salt */ setup_essiv_cpu()
329 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); setup_essiv_cpu()
347 kzfree(essiv->salt); crypt_iv_essiv_dtr()
348 essiv->salt = NULL; crypt_iv_essiv_dtr()
363 u8 *salt = NULL; crypt_iv_essiv_ctr() local
379 salt = kzalloc(crypto_hash_digestsize(hash_tfm), GFP_KERNEL); crypt_iv_essiv_ctr()
380 if (!salt) { crypt_iv_essiv_ctr()
381 ti->error = "Error kmallocing salt storage in ESSIV"; crypt_iv_essiv_ctr()
386 cc->iv_gen_private.essiv.salt = salt; crypt_iv_essiv_ctr()
389 essiv_tfm = setup_essiv_cpu(cc, ti, salt, crypt_iv_essiv_ctr()
402 kfree(salt); crypt_iv_essiv_ctr()
307 setup_essiv_cpu(struct crypt_config *cc, struct dm_target *ti, u8 *salt, unsigned saltsize) setup_essiv_cpu() argument
/linux-4.1.27/crypto/
H A Dseqiv.c5 * with a salt. This algorithm is mainly useful for CTR and similar modes.
29 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member in struct:seqiv_ctx
95 crypto_xor(info, ctx->salt, ivsize); seqiv_geniv()
200 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, seqiv_givencrypt_first()
223 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, seqiv_aead_givencrypt_first()
H A Deseqiv.c5 * with a salt and then encrypting it with the same key as used to encrypt
39 char salt[]; member in struct:eseqiv_ctx
128 memcpy(req->creq.info, ctx->salt, ivsize); eseqiv_givencrypt()
160 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, eseqiv_givencrypt_first()
/linux-4.1.27/security/keys/encrypted-keys/
H A Decryptfs_format.c64 * Removed auth_tok->token.password.salt and ecryptfs_fill_auth_tok()
/linux-4.1.27/net/sched/
H A Dsch_sfb.c257 int *qerr, u32 *salt) sfb_classify()
273 *salt = TC_H_MIN(res.classid); sfb_classify()
288 u32 r, slot, salt, sfbhash; sfb_enqueue() local
313 if (!sfb_classify(skb, fl, &ret, &salt)) sfb_enqueue()
315 keys.src = salt; sfb_enqueue()
256 sfb_classify(struct sk_buff *skb, struct tcf_proto *fl, int *qerr, u32 *salt) sfb_classify() argument
H A Dcls_rsvp.h372 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) gen_handle() argument
382 h = data->hgenerator|salt; gen_handle()
/linux-4.1.27/drivers/watchdog/
H A Dmax63xx_wdt.c52 * these values with a grain of salt. Same goes for the initial delay
/linux-4.1.27/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) arcfour_hmac_md5_usage_to_salt() argument
142 salt[0] = (ms_usage >> 0) & 0xff; arcfour_hmac_md5_usage_to_salt()
143 salt[1] = (ms_usage >> 8) & 0xff; arcfour_hmac_md5_usage_to_salt()
144 salt[2] = (ms_usage >> 16) & 0xff; arcfour_hmac_md5_usage_to_salt()
145 salt[3] = (ms_usage >> 24) & 0xff; arcfour_hmac_md5_usage_to_salt()
/linux-4.1.27/drivers/crypto/
H A Dpicoxcell_crypto.c177 u8 salt[AES_BLOCK_SIZE]; member in struct:spacc_aead_ctx
746 memcpy(req->areq.iv, ctx->salt, ivsize); spacc_aead_givencrypt()
791 get_random_bytes(ctx->salt, sizeof(ctx->salt)); spacc_aead_cra_init()
H A Dixp4xx_crypto.c185 u8 salt[MAX_IVLEN]; member in struct:ixp_ctx
1196 get_random_bytes(ctx->salt, ivsize); aead_givencrypt()
1199 memcpy(req->areq.iv, ctx->salt, ivsize); aead_givencrypt()
/linux-4.1.27/drivers/crypto/qat/qat_common/
H A Dqat_algs.c117 uint8_t salt[AES_BLOCK_SIZE]; member in struct:qat_alg_aead_ctx
524 if (crypto_rng_get_bytes(crypto_default_rng, ctx->salt, AES_BLOCK_SIZE)) qat_alg_aead_init_sessions()
943 memcpy(req->giv, ctx->salt, AES_BLOCK_SIZE); qat_alg_aead_genivenc()
/linux-4.1.27/arch/x86/crypto/
H A Daesni-intel_avx-x86_64.S1498 # u8 *iv, /* Pre-counter block j0: 4 byte salt
1519 # u8 *iv, /* Pre-counter block j0: 4 byte salt
2775 # u8 *iv, /* Pre-counter block j0: 4 byte salt
2796 # u8 *iv, /* Pre-counter block j0: 4 byte salt
H A Daesni-intel_glue.c119 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association)
140 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association)
H A Daesni-intel_asm.S1201 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
1464 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
/linux-4.1.27/net/bluetooth/
H A Dsmp.c244 /* The btle, salt and length "magic" values are as defined in smp_f5()
246 * the btle value ends up being 'btle'. The salt is just a smp_f5()
251 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, smp_f5() local
261 err = aes_cmac(tfm_cmac, salt, w, 32, t); smp_f5()
/linux-4.1.27/drivers/gpu/drm/
H A Ddrm_dp_mst_topology.c1333 u64 salt = get_jiffies_64(); drm_dp_validate_guid() local
1334 memcpy(&guid[0], &salt, sizeof(u64)); drm_dp_validate_guid()
1335 memcpy(&guid[8], &salt, sizeof(u64)); drm_dp_validate_guid()
/linux-4.1.27/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_sriov.c339 * salt away the number of multi cast addresses assigned ixgbe_set_vf_multicasts()
/linux-4.1.27/drivers/net/
H A Dvxlan.c139 /* salt for hash table */
/linux-4.1.27/drivers/net/ethernet/intel/igb/
H A Digb_main.c5747 /* salt away the number of multicast addresses assigned igb_set_vf_multicasts()

Completed in 1219 milliseconds