Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 23 of 23) sorted by relevance

/linux-4.4.14/fs/ecryptfs/
Ddebug.c34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
Dkeystore.c1482 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, in write_tag_3_packet()
/linux-4.4.14/drivers/crypto/caam/
Dpdb.h68 u32 salt; /* lower 24 bits */ member
76 u32 salt; /* lower 24 bits */ member
105 u32 salt; member
110 u32 salt; member
117 u32 salt; member
329 u16 salt[7]; member
344 u16 salt[7]; member
/linux-4.4.14/Documentation/device-mapper/
Dverity.txt13 <algorithm> <digest> <salt>
20 The salt is appended when hashing, digests are stored continuously and
24 The salt is prepended when hashing and each digest is
60 and the salt. This hash should be trusted as there is no other authenticity
63 <salt>
64 The hexadecimal encoding of the salt value.
/linux-4.4.14/drivers/md/
Ddm-verity.c60 u8 *salt; /* salt: its size is salt_size */ member
294 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level()
308 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level()
395 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io()
424 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io()
616 DMEMIT("%02x", v->salt[x]); in verity_status()
678 kfree(v->salt); in verity_dtr()
847 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr()
848 if (!v->salt) { in verity_ctr()
854 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
Ddm-crypt.c90 u8 *salt; member
275 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init()
281 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, in crypt_iv_essiv_init()
297 memset(essiv->salt, 0, salt_size); in crypt_iv_essiv_wipe()
300 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); in crypt_iv_essiv_wipe()
310 u8 *salt, unsigned saltsize) in setup_essiv_cpu() argument
330 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); in setup_essiv_cpu()
348 kzfree(essiv->salt); in crypt_iv_essiv_dtr()
349 essiv->salt = NULL; in crypt_iv_essiv_dtr()
364 u8 *salt = NULL; in crypt_iv_essiv_ctr() local
[all …]
/linux-4.4.14/crypto/
Deseqiv.c39 char salt[]; member
128 memcpy(req->creq.info, ctx->salt, ivsize); in eseqiv_givencrypt()
182 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in eseqiv_init()
Dseqiv.c30 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
99 crypto_xor(info, ctx->salt, ivsize); in seqiv_geniv()
196 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
245 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_init()
Dchacha20poly1305.c38 u8 salt[]; member
92 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv()
493 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey()
Dechainiv.c142 crypto_xor(info, ctx->salt, ivsize); in echainiv_encrypt()
Daead.c291 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in aead_init_geniv()
DKconfig269 xoring it with a salt. This algorithm is mainly useful for CTR
279 a sequence number xored with a salt. This is the default
/linux-4.4.14/include/crypto/internal/
Dgeniv.h24 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
/linux-4.4.14/Documentation/filesystems/
Decryptfs.txt44 You should be prompted for a passphrase and a salt (the salt may be
/linux-4.4.14/net/sched/
Dsch_sfb.c256 int *qerr, u32 *salt) in sfb_classify() argument
272 *salt = TC_H_MIN(res.classid); in sfb_classify()
311 u32 salt; in sfb_enqueue() local
314 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue()
316 sfbhash = jhash_1word(salt, q->bins[slot].perturbation); in sfb_enqueue()
Dcls_rsvp.h382 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) in gen_handle() argument
392 h = data->hgenerator|salt; in gen_handle()
/linux-4.4.14/include/linux/
Decryptfs.h78 u8 salt[ECRYPTFS_SALT_SIZE]; member
/linux-4.4.14/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) in arcfour_hmac_md5_usage_to_salt()
142 salt[0] = (ms_usage >> 0) & 0xff; in arcfour_hmac_md5_usage_to_salt()
143 salt[1] = (ms_usage >> 8) & 0xff; in arcfour_hmac_md5_usage_to_salt()
144 salt[2] = (ms_usage >> 16) & 0xff; in arcfour_hmac_md5_usage_to_salt()
145 salt[3] = (ms_usage >> 24) & 0xff; in arcfour_hmac_md5_usage_to_salt()
/linux-4.4.14/drivers/gpu/drm/
Ddrm_dp_mst_topology.c1333 u64 salt = get_jiffies_64(); in drm_dp_validate_guid() local
1334 memcpy(&guid[0], &salt, sizeof(u64)); in drm_dp_validate_guid()
1335 memcpy(&guid[8], &salt, sizeof(u64)); in drm_dp_validate_guid()
/linux-4.4.14/drivers/crypto/
Dixp4xx_crypto.c186 u8 salt[MAX_IVLEN]; member
/linux-4.4.14/net/bluetooth/
Dsmp.c257 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local
267 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5()
/linux-4.4.14/Documentation/
Dedac.txt53 The presence of PCI Parity errors must be examined with a grain of salt.
/linux-4.4.14/Documentation/sound/oss/
DREADME.OSS16 they are gone forever. Keeping this in mind and with a grain of salt this