/linux-4.4.14/fs/ecryptfs/ |
H A D | debug.c | 34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; ecryptfs_dump_auth_tok() local 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, ecryptfs_dump_auth_tok() 45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; ecryptfs_dump_auth_tok() 46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); ecryptfs_dump_auth_tok()
|
H A D | keystore.c | 1482 memcpy((*new_auth_tok)->token.password.salt, parse_tag_3_packet() 2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, write_tag_3_packet() 2359 (*packet_size) += ECRYPTFS_SALT_SIZE; /* salt */ write_tag_3_packet()
|
H A D | ecryptfs_kernel.h | 322 * This struct is to enable a mount-wide passphrase/salt combo. This
|
/linux-4.4.14/include/crypto/internal/ |
H A D | geniv.h | 24 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member in struct:aead_geniv_ctx
|
/linux-4.4.14/drivers/crypto/caam/ |
H A D | pdb.h | 68 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_ccm 76 u32 salt; /* lower 24 bits */ member in struct:ipsec_encap_gcm 105 u32 salt; member in struct:ipsec_decap_ctr 110 u32 salt; member in struct:ipsec_decap_ccm 117 u32 salt; member in struct:ipsec_decap_gcm 329 u16 salt[7]; member in struct:srtp_encap_pdb 344 u16 salt[7]; member in struct:srtp_decap_pdb
|
H A D | caamalg.c | 1396 * The last four bytes of the key material are used as the salt value rfc4106_setkey() 1435 * The last four bytes of the key material are used as the salt value rfc4543_setkey()
|
/linux-4.4.14/crypto/ |
H A D | eseqiv.c | 5 * with a salt and then encrypting it with the same key as used to encrypt 39 char salt[]; member in struct:eseqiv_ctx 128 memcpy(req->creq.info, ctx->salt, ivsize); eseqiv_givencrypt() 182 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, eseqiv_init()
|
H A D | seqiv.c | 5 * with a salt. This algorithm is mainly useful for CTR and similar modes. 30 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member in struct:seqiv_ctx 99 crypto_xor(info, ctx->salt, ivsize); seqiv_geniv() 196 crypto_xor(info, ctx->salt, ivsize); seqiv_aead_encrypt() 245 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, seqiv_init()
|
H A D | echainiv.c | 5 * with a salt and then encrypting it with the same key as used to encrypt 142 crypto_xor(info, ctx->salt, ivsize); echainiv_encrypt()
|
H A D | chacha20poly1305.c | 38 u8 salt[]; member in struct:chachapoly_ctx 92 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); chacha_iv() 493 memcpy(ctx->salt, key + keylen, ctx->saltlen); chachapoly_setkey()
|
H A D | aead.c | 291 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, aead_init_geniv()
|
/linux-4.4.14/include/linux/ |
H A D | ecryptfs.h | 74 /* Iterated-hash concatenation of salt and passphrase */ 78 u8 salt[ECRYPTFS_SALT_SIZE]; member in struct:ecryptfs_password
|
/linux-4.4.14/drivers/md/ |
H A D | dm-verity.c | 60 u8 *salt; /* salt: its size is salt_size */ member in struct:dm_verity 294 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level() 308 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_level() 395 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io() 424 r = crypto_shash_update(desc, v->salt, v->salt_size); verity_verify_io() 616 DMEMIT("%02x", v->salt[x]); verity_status() 678 kfree(v->salt); verity_dtr() 707 * <salt> Hex string or "-" if no salt. 847 v->salt = kmalloc(v->salt_size, GFP_KERNEL); verity_ctr() 848 if (!v->salt) { verity_ctr() 849 ti->error = "Cannot allocate salt"; verity_ctr() 854 hex2bin(v->salt, argv[9], v->salt_size)) { verity_ctr() 855 ti->error = "Invalid salt"; verity_ctr()
|
H A D | dm-crypt.c | 90 u8 *salt; member in struct:iv_essiv_private 206 * essiv: "encrypted sector|salt initial vector", the sector number is 207 * encrypted with the bulk cipher using a salt as key. The salt 262 /* Initialise ESSIV - compute salt but no local memory allocations */ crypt_iv_essiv_init() 275 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); crypt_iv_essiv_init() 281 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, crypt_iv_essiv_init() 289 /* Wipe salt and reset key derived from volume key */ crypt_iv_essiv_wipe() 297 memset(essiv->salt, 0, salt_size); crypt_iv_essiv_wipe() 300 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); crypt_iv_essiv_wipe() 310 u8 *salt, unsigned saltsize) setup_essiv_cpu() 315 /* Setup the essiv_tfm with the given salt */ setup_essiv_cpu() 330 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); setup_essiv_cpu() 348 kzfree(essiv->salt); crypt_iv_essiv_dtr() 349 essiv->salt = NULL; crypt_iv_essiv_dtr() 364 u8 *salt = NULL; crypt_iv_essiv_ctr() local 380 salt = kzalloc(crypto_hash_digestsize(hash_tfm), GFP_KERNEL); crypt_iv_essiv_ctr() 381 if (!salt) { crypt_iv_essiv_ctr() 382 ti->error = "Error kmallocing salt storage in ESSIV"; crypt_iv_essiv_ctr() 387 cc->iv_gen_private.essiv.salt = salt; crypt_iv_essiv_ctr() 390 essiv_tfm = setup_essiv_cpu(cc, ti, salt, crypt_iv_essiv_ctr() 403 kfree(salt); crypt_iv_essiv_ctr() 308 setup_essiv_cpu(struct crypt_config *cc, struct dm_target *ti, u8 *salt, unsigned saltsize) setup_essiv_cpu() argument
|
/linux-4.4.14/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 64 * Removed auth_tok->token.password.salt and ecryptfs_fill_auth_tok()
|
/linux-4.4.14/sound/firewire/digi00x/ |
H A D | amdtp-dot.c | 61 * @return salt to XOR with given data 76 * the lower nibble of the salt. Interleaved sequence. dot_scrt() 82 /* circular list for the salt's hi nibble. */ dot_scrt() 89 * hir[] is not used and - coincidentally - the salt's hi nibble is dot_scrt()
|
/linux-4.4.14/net/sched/ |
H A D | sch_sfb.c | 256 int *qerr, u32 *salt) sfb_classify() 272 *salt = TC_H_MIN(res.classid); sfb_classify() 311 u32 salt; sfb_enqueue() local 314 if (!sfb_classify(skb, fl, &ret, &salt)) sfb_enqueue() 316 sfbhash = jhash_1word(salt, q->bins[slot].perturbation); sfb_enqueue() 255 sfb_classify(struct sk_buff *skb, struct tcf_proto *fl, int *qerr, u32 *salt) sfb_classify() argument
|
H A D | cls_rsvp.h | 382 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) gen_handle() argument 392 h = data->hgenerator|salt; gen_handle()
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) arcfour_hmac_md5_usage_to_salt() argument 142 salt[0] = (ms_usage >> 0) & 0xff; arcfour_hmac_md5_usage_to_salt() 143 salt[1] = (ms_usage >> 8) & 0xff; arcfour_hmac_md5_usage_to_salt() 144 salt[2] = (ms_usage >> 16) & 0xff; arcfour_hmac_md5_usage_to_salt() 145 salt[3] = (ms_usage >> 24) & 0xff; arcfour_hmac_md5_usage_to_salt()
|
/linux-4.4.14/drivers/watchdog/ |
H A D | max63xx_wdt.c | 64 * these values with a grain of salt. Same goes for the initial delay
|
/linux-4.4.14/drivers/gpu/drm/i915/ |
H A D | dvo_ns2501.c | 202 * read all this with a grain of salt.
|
/linux-4.4.14/arch/x86/crypto/ |
H A D | aesni-intel_avx-x86_64.S | 1498 # u8 *iv, /* Pre-counter block j0: 4 byte salt 1519 # u8 *iv, /* Pre-counter block j0: 4 byte salt 2775 # u8 *iv, /* Pre-counter block j0: 4 byte salt 2796 # u8 *iv, /* Pre-counter block j0: 4 byte salt
|
H A D | aesni-intel_glue.c | 119 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association) 140 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association)
|
H A D | aesni-intel_asm.S | 1201 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association) 1464 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
|
/linux-4.4.14/drivers/gpu/drm/ |
H A D | drm_dp_mst_topology.c | 1333 u64 salt = get_jiffies_64(); drm_dp_validate_guid() local 1334 memcpy(&guid[0], &salt, sizeof(u64)); drm_dp_validate_guid() 1335 memcpy(&guid[8], &salt, sizeof(u64)); drm_dp_validate_guid()
|
/linux-4.4.14/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 186 u8 salt[MAX_IVLEN]; member in struct:ixp_ctx
|
/linux-4.4.14/net/bluetooth/ |
H A D | smp.c | 250 /* The btle, salt and length "magic" values are as defined in smp_f5() 252 * the btle value ends up being 'btle'. The salt is just a smp_f5() 257 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, smp_f5() local 267 err = aes_cmac(tfm_cmac, salt, w, 32, t); smp_f5()
|
/linux-4.4.14/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_sriov.c | 345 * salt away the number of multi cast addresses assigned ixgbe_set_vf_multicasts()
|
/linux-4.4.14/drivers/net/ |
H A D | vxlan.c | 99 /* salt for hash table */
|
/linux-4.4.14/drivers/net/ethernet/intel/igb/ |
H A D | igb_main.c | 5739 /* salt away the number of multicast addresses assigned igb_set_vf_multicasts()
|