/linux-4.1.27/fs/ecryptfs/ |
D | debug.c | 34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
D | keystore.c | 1482 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, in write_tag_3_packet()
|
/linux-4.1.27/drivers/crypto/caam/ |
D | pdb.h | 68 u32 salt; /* lower 24 bits */ member 76 u32 salt; /* lower 24 bits */ member 105 u32 salt; member 110 u32 salt; member 117 u32 salt; member 329 u16 salt[7]; member 344 u16 salt[7]; member
|
/linux-4.1.27/Documentation/device-mapper/ |
D | verity.txt | 13 <algorithm> <digest> <salt> 20 The salt is appended when hashing, digests are stored continuously and 24 The salt is prepended when hashing and each digest is 60 and the salt. This hash should be trusted as there is no other authenticity 63 <salt> 64 The hexadecimal encoding of the salt value.
|
/linux-4.1.27/drivers/md/ |
D | dm-verity.c | 62 u8 *salt; /* salt: its size is salt_size */ member 298 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level() 312 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level() 399 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io() 428 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io() 619 DMEMIT("%02x", v->salt[x]); in verity_status() 700 kfree(v->salt); in verity_dtr() 869 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr() 870 if (!v->salt) { in verity_ctr() 876 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
|
D | dm-crypt.c | 90 u8 *salt; member 274 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init() 280 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, in crypt_iv_essiv_init() 296 memset(essiv->salt, 0, salt_size); in crypt_iv_essiv_wipe() 299 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); in crypt_iv_essiv_wipe() 309 u8 *salt, unsigned saltsize) in setup_essiv_cpu() argument 329 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); in setup_essiv_cpu() 347 kzfree(essiv->salt); in crypt_iv_essiv_dtr() 348 essiv->salt = NULL; in crypt_iv_essiv_dtr() 363 u8 *salt = NULL; in crypt_iv_essiv_ctr() local [all …]
|
/linux-4.1.27/crypto/ |
D | seqiv.c | 29 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member 95 crypto_xor(info, ctx->salt, ivsize); in seqiv_geniv() 200 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_givencrypt_first() 223 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_aead_givencrypt_first()
|
D | eseqiv.c | 39 char salt[]; member 128 memcpy(req->creq.info, ctx->salt, ivsize); in eseqiv_givencrypt() 160 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in eseqiv_givencrypt_first()
|
D | Kconfig | 227 xoring it with a salt. This algorithm is mainly useful for CTR
|
/linux-4.1.27/Documentation/filesystems/ |
D | ecryptfs.txt | 44 You should be prompted for a passphrase and a salt (the salt may be
|
/linux-4.1.27/net/sched/ |
D | sch_sfb.c | 257 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 288 u32 r, slot, salt, sfbhash; in sfb_enqueue() local 313 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue() 315 keys.src = salt; in sfb_enqueue()
|
D | cls_rsvp.h | 372 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) in gen_handle() argument 382 h = data->hgenerator|salt; in gen_handle()
|
/linux-4.1.27/include/linux/ |
D | ecryptfs.h | 78 u8 salt[ECRYPTFS_SALT_SIZE]; member
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) in arcfour_hmac_md5_usage_to_salt() 142 salt[0] = (ms_usage >> 0) & 0xff; in arcfour_hmac_md5_usage_to_salt() 143 salt[1] = (ms_usage >> 8) & 0xff; in arcfour_hmac_md5_usage_to_salt() 144 salt[2] = (ms_usage >> 16) & 0xff; in arcfour_hmac_md5_usage_to_salt() 145 salt[3] = (ms_usage >> 24) & 0xff; in arcfour_hmac_md5_usage_to_salt()
|
/linux-4.1.27/drivers/crypto/ |
D | picoxcell_crypto.c | 177 u8 salt[AES_BLOCK_SIZE]; member 746 memcpy(req->areq.iv, ctx->salt, ivsize); in spacc_aead_givencrypt() 791 get_random_bytes(ctx->salt, sizeof(ctx->salt)); in spacc_aead_cra_init()
|
D | ixp4xx_crypto.c | 185 u8 salt[MAX_IVLEN]; member 1196 get_random_bytes(ctx->salt, ivsize); in aead_givencrypt() 1199 memcpy(req->areq.iv, ctx->salt, ivsize); in aead_givencrypt()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 117 uint8_t salt[AES_BLOCK_SIZE]; member 524 if (crypto_rng_get_bytes(crypto_default_rng, ctx->salt, AES_BLOCK_SIZE)) in qat_alg_aead_init_sessions() 943 memcpy(req->giv, ctx->salt, AES_BLOCK_SIZE); in qat_alg_aead_genivenc()
|
/linux-4.1.27/drivers/gpu/drm/ |
D | drm_dp_mst_topology.c | 1333 u64 salt = get_jiffies_64(); in drm_dp_validate_guid() local 1334 memcpy(&guid[0], &salt, sizeof(u64)); in drm_dp_validate_guid() 1335 memcpy(&guid[8], &salt, sizeof(u64)); in drm_dp_validate_guid()
|
/linux-4.1.27/net/bluetooth/ |
D | smp.c | 251 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local 261 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5()
|
/linux-4.1.27/Documentation/ |
D | edac.txt | 71 The presence of PCI Parity errors must be examined with a grain of salt.
|
/linux-4.1.27/Documentation/sound/oss/ |
D | README.OSS | 16 they are gone forever. Keeping this in mind and with a grain of salt this
|