Searched refs:salt (Results 1 - 30 of 30) sorted by relevance

/linux-4.4.14/fs/ecryptfs/
H A Ddebug.c34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; ecryptfs_dump_auth_tok() local
43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, ecryptfs_dump_auth_tok()
45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; ecryptfs_dump_auth_tok()
46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); ecryptfs_dump_auth_tok()
H A Dkeystore.c1482 memcpy((*new_auth_tok)->token.password.salt, parse_tag_3_packet()
2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, write_tag_3_packet()
2359 (*packet_size) += ECRYPTFS_SALT_SIZE; /* salt */ write_tag_3_packet()
H A Decryptfs_kernel.h322 * This struct is to enable a mount-wide passphrase/salt combo. This
/linux-4.4.14/include/crypto/internal/
H A Dgeniv.h24 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member in struct:aead_geniv_ctx
/linux-4.4.14/drivers/crypto/caam/
H A Dpdb.h68 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_ccm
76 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_gcm
105 u32 salt; member in struct:ipsec_decap_ctr
110 u32 salt; member in struct:ipsec_decap_ccm
117 u32 salt; member in struct:ipsec_decap_gcm
329 u16 salt[7]; member in struct:srtp_encap_pdb
344 u16 salt[7]; member in struct:srtp_decap_pdb
H A Dcaamalg.c1396 * The last four bytes of the key material are used as the salt value rfc4106_setkey()
1435 * The last four bytes of the key material are used as the salt value rfc4543_setkey()
/linux-4.4.14/crypto/
H A Deseqiv.c5 * with a salt and then encrypting it with the same key as used to encrypt
39 char salt[]; member in struct:eseqiv_ctx
128 memcpy(req->creq.info, ctx->salt, ivsize); eseqiv_givencrypt()
182 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, eseqiv_init()
H A Dseqiv.c5 * with a salt. This algorithm is mainly useful for CTR and similar modes.
30 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member in struct:seqiv_ctx
99 crypto_xor(info, ctx->salt, ivsize); seqiv_geniv()
196 crypto_xor(info, ctx->salt, ivsize); seqiv_aead_encrypt()
245 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, seqiv_init()
H A Dechainiv.c5 * with a salt and then encrypting it with the same key as used to encrypt
142 crypto_xor(info, ctx->salt, ivsize); echainiv_encrypt()
H A Dchacha20poly1305.c38 u8 salt[]; member in struct:chachapoly_ctx
92 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); chacha_iv()
493 memcpy(ctx->salt, key + keylen, ctx->saltlen); chachapoly_setkey()
H A Daead.c291 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, aead_init_geniv()
/linux-4.4.14/include/linux/
H A Decryptfs.h74 /* Iterated-hash concatenation of salt and passphrase */
78 u8 salt[ECRYPTFS_SALT_SIZE]; member in struct:ecryptfs_password
/linux-4.4.14/drivers/md/
H A Ddm-verity.c60 u8 *salt; /* salt: its size is salt_size */ member in struct:dm_verity
294 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level()
308 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level()
395 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io()
424 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io()
616 DMEMIT("%02x", v->salt[x]); verity_status()
678 kfree(v->salt); verity_dtr()
707 * <salt> Hex string or "-" if no salt.
847 v->salt = kmalloc(v->salt_size, GFP_KERNEL); verity_ctr()
848 if (!v->salt) { verity_ctr()
849 ti->error = "Cannot allocate salt"; verity_ctr()
854 hex2bin(v->salt, argv[9], v->salt_size)) { verity_ctr()
855 ti->error = "Invalid salt"; verity_ctr()
H A Ddm-crypt.c90 u8 *salt; member in struct:iv_essiv_private
206 * essiv: "encrypted sector|salt initial vector", the sector number is
207 * encrypted with the bulk cipher using a salt as key. The salt
262 /* Initialise ESSIV - compute salt but no local memory allocations */ crypt_iv_essiv_init()
275 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); crypt_iv_essiv_init()
281 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, crypt_iv_essiv_init()
289 /* Wipe salt and reset key derived from volume key */ crypt_iv_essiv_wipe()
297 memset(essiv->salt, 0, salt_size); crypt_iv_essiv_wipe()
300 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); crypt_iv_essiv_wipe()
310 u8 *salt, unsigned saltsize) setup_essiv_cpu()
315 /* Setup the essiv_tfm with the given salt */ setup_essiv_cpu()
330 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); setup_essiv_cpu()
348 kzfree(essiv->salt); crypt_iv_essiv_dtr()
349 essiv->salt = NULL; crypt_iv_essiv_dtr()
364 u8 *salt = NULL; crypt_iv_essiv_ctr() local
380 salt = kzalloc(crypto_hash_digestsize(hash_tfm), GFP_KERNEL); crypt_iv_essiv_ctr()
381 if (!salt) { crypt_iv_essiv_ctr()
382 ti->error = "Error kmallocing salt storage in ESSIV"; crypt_iv_essiv_ctr()
387 cc->iv_gen_private.essiv.salt = salt; crypt_iv_essiv_ctr()
390 essiv_tfm = setup_essiv_cpu(cc, ti, salt, crypt_iv_essiv_ctr()
403 kfree(salt); crypt_iv_essiv_ctr()
308 setup_essiv_cpu(struct crypt_config *cc, struct dm_target *ti, u8 *salt, unsigned saltsize) setup_essiv_cpu() argument
/linux-4.4.14/security/keys/encrypted-keys/
H A Decryptfs_format.c64 * Removed auth_tok->token.password.salt and ecryptfs_fill_auth_tok()
/linux-4.4.14/sound/firewire/digi00x/
H A Damdtp-dot.c61 * @return salt to XOR with given data
76 * the lower nibble of the salt. Interleaved sequence. dot_scrt()
82 /* circular list for the salt's hi nibble. */ dot_scrt()
89 * hir[] is not used and - coincidentally - the salt's hi nibble is dot_scrt()
/linux-4.4.14/net/sched/
H A Dsch_sfb.c256 int *qerr, u32 *salt) sfb_classify()
272 *salt = TC_H_MIN(res.classid); sfb_classify()
311 u32 salt; sfb_enqueue() local
314 if (!sfb_classify(skb, fl, &ret, &salt)) sfb_enqueue()
316 sfbhash = jhash_1word(salt, q->bins[slot].perturbation); sfb_enqueue()
255 sfb_classify(struct sk_buff *skb, struct tcf_proto *fl, int *qerr, u32 *salt) sfb_classify() argument
H A Dcls_rsvp.h382 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) gen_handle() argument
392 h = data->hgenerator|salt; gen_handle()
/linux-4.4.14/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) arcfour_hmac_md5_usage_to_salt() argument
142 salt[0] = (ms_usage >> 0) & 0xff; arcfour_hmac_md5_usage_to_salt()
143 salt[1] = (ms_usage >> 8) & 0xff; arcfour_hmac_md5_usage_to_salt()
144 salt[2] = (ms_usage >> 16) & 0xff; arcfour_hmac_md5_usage_to_salt()
145 salt[3] = (ms_usage >> 24) & 0xff; arcfour_hmac_md5_usage_to_salt()
/linux-4.4.14/drivers/watchdog/
H A Dmax63xx_wdt.c64 * these values with a grain of salt. Same goes for the initial delay
/linux-4.4.14/drivers/gpu/drm/i915/
H A Ddvo_ns2501.c202 * read all this with a grain of salt.
/linux-4.4.14/arch/x86/crypto/
H A Daesni-intel_avx-x86_64.S1498 # u8 *iv, /* Pre-counter block j0: 4 byte salt
1519 # u8 *iv, /* Pre-counter block j0: 4 byte salt
2775 # u8 *iv, /* Pre-counter block j0: 4 byte salt
2796 # u8 *iv, /* Pre-counter block j0: 4 byte salt
H A Daesni-intel_glue.c119 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association)
140 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association)
H A Daesni-intel_asm.S1201 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
1464 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
/linux-4.4.14/drivers/gpu/drm/
H A Ddrm_dp_mst_topology.c1333 u64 salt = get_jiffies_64(); drm_dp_validate_guid() local
1334 memcpy(&guid[0], &salt, sizeof(u64)); drm_dp_validate_guid()
1335 memcpy(&guid[8], &salt, sizeof(u64)); drm_dp_validate_guid()
/linux-4.4.14/drivers/crypto/
H A Dixp4xx_crypto.c186 u8 salt[MAX_IVLEN]; member in struct:ixp_ctx
/linux-4.4.14/net/bluetooth/
H A Dsmp.c250 /* The btle, salt and length "magic" values are as defined in smp_f5()
252 * the btle value ends up being 'btle'. The salt is just a smp_f5()
257 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, smp_f5() local
267 err = aes_cmac(tfm_cmac, salt, w, 32, t); smp_f5()
/linux-4.4.14/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_sriov.c345 * salt away the number of multi cast addresses assigned ixgbe_set_vf_multicasts()
/linux-4.4.14/drivers/net/
H A Dvxlan.c99 /* salt for hash table */
/linux-4.4.14/drivers/net/ethernet/intel/igb/
H A Digb_main.c5739 /* salt away the number of multicast addresses assigned igb_set_vf_multicasts()

Completed in 1052 milliseconds