Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 21 of 21) sorted by relevance

/linux-4.1.27/fs/ecryptfs/
Ddebug.c34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
Dkeystore.c1482 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
2357 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, in write_tag_3_packet()
/linux-4.1.27/drivers/crypto/caam/
Dpdb.h68 u32 salt; /* lower 24 bits */ member
76 u32 salt; /* lower 24 bits */ member
105 u32 salt; member
110 u32 salt; member
117 u32 salt; member
329 u16 salt[7]; member
344 u16 salt[7]; member
/linux-4.1.27/Documentation/device-mapper/
Dverity.txt13 <algorithm> <digest> <salt>
20 The salt is appended when hashing, digests are stored continuously and
24 The salt is prepended when hashing and each digest is
60 and the salt. This hash should be trusted as there is no other authenticity
63 <salt>
64 The hexadecimal encoding of the salt value.
/linux-4.1.27/drivers/md/
Ddm-verity.c62 u8 *salt; /* salt: its size is salt_size */ member
298 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level()
312 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level()
399 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io()
428 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io()
619 DMEMIT("%02x", v->salt[x]); in verity_status()
700 kfree(v->salt); in verity_dtr()
869 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr()
870 if (!v->salt) { in verity_ctr()
876 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
Ddm-crypt.c90 u8 *salt; member
274 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init()
280 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, in crypt_iv_essiv_init()
296 memset(essiv->salt, 0, salt_size); in crypt_iv_essiv_wipe()
299 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); in crypt_iv_essiv_wipe()
309 u8 *salt, unsigned saltsize) in setup_essiv_cpu() argument
329 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); in setup_essiv_cpu()
347 kzfree(essiv->salt); in crypt_iv_essiv_dtr()
348 essiv->salt = NULL; in crypt_iv_essiv_dtr()
363 u8 *salt = NULL; in crypt_iv_essiv_ctr() local
[all …]
/linux-4.1.27/crypto/
Dseqiv.c29 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
95 crypto_xor(info, ctx->salt, ivsize); in seqiv_geniv()
200 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_givencrypt_first()
223 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_aead_givencrypt_first()
Deseqiv.c39 char salt[]; member
128 memcpy(req->creq.info, ctx->salt, ivsize); in eseqiv_givencrypt()
160 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in eseqiv_givencrypt_first()
DKconfig227 xoring it with a salt. This algorithm is mainly useful for CTR
/linux-4.1.27/Documentation/filesystems/
Decryptfs.txt44 You should be prompted for a passphrase and a salt (the salt may be
/linux-4.1.27/net/sched/
Dsch_sfb.c257 int *qerr, u32 *salt) in sfb_classify() argument
273 *salt = TC_H_MIN(res.classid); in sfb_classify()
288 u32 r, slot, salt, sfbhash; in sfb_enqueue() local
313 if (!sfb_classify(skb, fl, &ret, &salt)) in sfb_enqueue()
315 keys.src = salt; in sfb_enqueue()
Dcls_rsvp.h372 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) in gen_handle() argument
382 h = data->hgenerator|salt; in gen_handle()
/linux-4.1.27/include/linux/
Decryptfs.h78 u8 salt[ECRYPTFS_SALT_SIZE]; member
/linux-4.1.27/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) in arcfour_hmac_md5_usage_to_salt()
142 salt[0] = (ms_usage >> 0) & 0xff; in arcfour_hmac_md5_usage_to_salt()
143 salt[1] = (ms_usage >> 8) & 0xff; in arcfour_hmac_md5_usage_to_salt()
144 salt[2] = (ms_usage >> 16) & 0xff; in arcfour_hmac_md5_usage_to_salt()
145 salt[3] = (ms_usage >> 24) & 0xff; in arcfour_hmac_md5_usage_to_salt()
/linux-4.1.27/drivers/crypto/
Dpicoxcell_crypto.c177 u8 salt[AES_BLOCK_SIZE]; member
746 memcpy(req->areq.iv, ctx->salt, ivsize); in spacc_aead_givencrypt()
791 get_random_bytes(ctx->salt, sizeof(ctx->salt)); in spacc_aead_cra_init()
Dixp4xx_crypto.c185 u8 salt[MAX_IVLEN]; member
1196 get_random_bytes(ctx->salt, ivsize); in aead_givencrypt()
1199 memcpy(req->areq.iv, ctx->salt, ivsize); in aead_givencrypt()
/linux-4.1.27/drivers/crypto/qat/qat_common/
Dqat_algs.c117 uint8_t salt[AES_BLOCK_SIZE]; member
524 if (crypto_rng_get_bytes(crypto_default_rng, ctx->salt, AES_BLOCK_SIZE)) in qat_alg_aead_init_sessions()
943 memcpy(req->giv, ctx->salt, AES_BLOCK_SIZE); in qat_alg_aead_genivenc()
/linux-4.1.27/drivers/gpu/drm/
Ddrm_dp_mst_topology.c1333 u64 salt = get_jiffies_64(); in drm_dp_validate_guid() local
1334 memcpy(&guid[0], &salt, sizeof(u64)); in drm_dp_validate_guid()
1335 memcpy(&guid[8], &salt, sizeof(u64)); in drm_dp_validate_guid()
/linux-4.1.27/net/bluetooth/
Dsmp.c251 const u8 salt[16] = { 0xbe, 0x83, 0x60, 0x5a, 0xdb, 0x0b, 0x37, 0x60, in smp_f5() local
261 err = aes_cmac(tfm_cmac, salt, w, 32, t); in smp_f5()
/linux-4.1.27/Documentation/
Dedac.txt71 The presence of PCI Parity errors must be examined with a grain of salt.
/linux-4.1.27/Documentation/sound/oss/
DREADME.OSS16 they are gone forever. Keeping this in mind and with a grain of salt this