Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 18 of 18) sorted by relevance

/linux-3.4.99/fs/ecryptfs/
Ddebug.c34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
Dkeystore.c1484 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
2360 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, in write_tag_3_packet()
/linux-3.4.99/drivers/md/
Ddm-verity.c43 u8 *salt; /* salt: its size is salt_size */ member
226 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level()
240 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level()
326 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io()
361 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io()
546 DMEMIT("%02x", v->salt[x]); in verity_status()
617 kfree(v->salt); in verity_dtr()
780 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr()
781 if (!v->salt) { in verity_ctr()
787 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
Ddm-crypt.c88 u8 *salt; member
267 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init()
274 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, in crypt_iv_essiv_init()
291 memset(essiv->salt, 0, salt_size); in crypt_iv_essiv_wipe()
295 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); in crypt_iv_essiv_wipe()
306 u8 *salt, unsigned saltsize) in setup_essiv_cpu() argument
326 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); in setup_essiv_cpu()
346 kzfree(essiv->salt); in crypt_iv_essiv_dtr()
347 essiv->salt = NULL; in crypt_iv_essiv_dtr()
365 u8 *salt = NULL; in crypt_iv_essiv_ctr() local
[all …]
/linux-3.4.99/Documentation/device-mapper/
Dverity.txt13 <algorithm> <digest> <salt>
19 The salt is appended when hashing, digests are stored continuously and
23 The salt is prepended when hashing and each digest is
59 and the salt. This hash should be trusted as there is no other authenticity
62 <salt>
63 The hexadecimal encoding of the salt value.
/linux-3.4.99/crypto/
Dseqiv.c29 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member
95 crypto_xor(info, ctx->salt, ivsize); in seqiv_geniv()
200 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_givencrypt_first()
223 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_aead_givencrypt_first()
Deseqiv.c39 char salt[]; member
128 memcpy(req->creq.info, ctx->salt, ivsize); in eseqiv_givencrypt()
160 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in eseqiv_givencrypt_first()
DKconfig202 xoring it with a salt. This algorithm is mainly useful for CTR
/linux-3.4.99/Documentation/filesystems/
Decryptfs.txt44 You should be prompted for a passphrase and a salt (the salt may be
/linux-3.4.99/net/sched/
Dsch_sfb.c257 int *qerr, u32 *salt) in sfb_classify() argument
273 *salt = TC_H_MIN(res.classid); in sfb_classify()
287 u32 r, slot, salt, sfbhash; in sfb_enqueue() local
311 if (!sfb_classify(skb, q, &ret, &salt)) in sfb_enqueue()
313 keys.src = salt; in sfb_enqueue()
Dcls_rsvp.h339 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) in gen_handle() argument
349 h = data->hgenerator|salt; in gen_handle()
/linux-3.4.99/include/linux/
Decryptfs.h86 u8 salt[ECRYPTFS_SALT_SIZE]; member
/linux-3.4.99/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) in arcfour_hmac_md5_usage_to_salt()
142 salt[0] = (ms_usage >> 0) & 0xff; in arcfour_hmac_md5_usage_to_salt()
143 salt[1] = (ms_usage >> 8) & 0xff; in arcfour_hmac_md5_usage_to_salt()
144 salt[2] = (ms_usage >> 16) & 0xff; in arcfour_hmac_md5_usage_to_salt()
145 salt[3] = (ms_usage >> 24) & 0xff; in arcfour_hmac_md5_usage_to_salt()
/linux-3.4.99/drivers/crypto/
Dpicoxcell_crypto.c177 u8 salt[AES_BLOCK_SIZE]; member
762 memcpy(req->areq.iv, ctx->salt, ivsize); in spacc_aead_givencrypt()
807 get_random_bytes(ctx->salt, sizeof(ctx->salt)); in spacc_aead_cra_init()
Dixp4xx_crypto.c185 u8 salt[MAX_IVLEN]; member
1215 get_random_bytes(ctx->salt, ivsize); in aead_givencrypt()
1218 memcpy(req->areq.iv, ctx->salt, ivsize); in aead_givencrypt()
/linux-3.4.99/net/ipv4/
Droute.c1355 u32 salt; in ip_select_fb_ident() local
1358 salt = secure_ip_id((__force __be32)ip_fallback_id ^ iph->daddr); in ip_select_fb_ident()
1359 iph->id = htons(salt & 0xFFFF); in ip_select_fb_ident()
1360 ip_fallback_id = salt; in ip_select_fb_ident()
/linux-3.4.99/Documentation/
Dedac.txt71 The presence of PCI Parity errors must be examined with a grain of salt.
/linux-3.4.99/Documentation/sound/oss/
DREADME.OSS16 they are gone forever. Keeping this in mind and with a grain of salt this