/linux-3.4.99/fs/ecryptfs/ |
D | debug.c | 34 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 45 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 46 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
D | keystore.c | 1484 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 2360 memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, in write_tag_3_packet()
|
/linux-3.4.99/drivers/md/ |
D | dm-verity.c | 43 u8 *salt; /* salt: its size is salt_size */ member 226 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level() 240 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_level() 326 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io() 361 r = crypto_shash_update(desc, v->salt, v->salt_size); in verity_verify_io() 546 DMEMIT("%02x", v->salt[x]); in verity_status() 617 kfree(v->salt); in verity_dtr() 780 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr() 781 if (!v->salt) { in verity_ctr() 787 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
|
D | dm-crypt.c | 88 u8 *salt; member 267 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init() 274 err = crypto_cipher_setkey(essiv_tfm, essiv->salt, in crypt_iv_essiv_init() 291 memset(essiv->salt, 0, salt_size); in crypt_iv_essiv_wipe() 295 r = crypto_cipher_setkey(essiv_tfm, essiv->salt, salt_size); in crypt_iv_essiv_wipe() 306 u8 *salt, unsigned saltsize) in setup_essiv_cpu() argument 326 err = crypto_cipher_setkey(essiv_tfm, salt, saltsize); in setup_essiv_cpu() 346 kzfree(essiv->salt); in crypt_iv_essiv_dtr() 347 essiv->salt = NULL; in crypt_iv_essiv_dtr() 365 u8 *salt = NULL; in crypt_iv_essiv_ctr() local [all …]
|
/linux-3.4.99/Documentation/device-mapper/ |
D | verity.txt | 13 <algorithm> <digest> <salt> 19 The salt is appended when hashing, digests are stored continuously and 23 The salt is prepended when hashing and each digest is 59 and the salt. This hash should be trusted as there is no other authenticity 62 <salt> 63 The hexadecimal encoding of the salt value.
|
/linux-3.4.99/crypto/ |
D | seqiv.c | 29 u8 salt[] __attribute__ ((aligned(__alignof__(u32)))); member 95 crypto_xor(info, ctx->salt, ivsize); in seqiv_geniv() 200 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_givencrypt_first() 223 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in seqiv_aead_givencrypt_first()
|
D | eseqiv.c | 39 char salt[]; member 128 memcpy(req->creq.info, ctx->salt, ivsize); in eseqiv_givencrypt() 160 err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, in eseqiv_givencrypt_first()
|
D | Kconfig | 202 xoring it with a salt. This algorithm is mainly useful for CTR
|
/linux-3.4.99/Documentation/filesystems/ |
D | ecryptfs.txt | 44 You should be prompted for a passphrase and a salt (the salt may be
|
/linux-3.4.99/net/sched/ |
D | sch_sfb.c | 257 int *qerr, u32 *salt) in sfb_classify() argument 273 *salt = TC_H_MIN(res.classid); in sfb_classify() 287 u32 r, slot, salt, sfbhash; in sfb_enqueue() local 311 if (!sfb_classify(skb, q, &ret, &salt)) in sfb_enqueue() 313 keys.src = salt; in sfb_enqueue()
|
D | cls_rsvp.h | 339 static unsigned int gen_handle(struct tcf_proto *tp, unsigned salt) in gen_handle() argument 349 h = data->hgenerator|salt; in gen_handle()
|
/linux-3.4.99/include/linux/ |
D | ecryptfs.h | 86 u8 salt[ECRYPTFS_SALT_SIZE]; member
|
/linux-3.4.99/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 128 arcfour_hmac_md5_usage_to_salt(unsigned int usage, u8 salt[4]) in arcfour_hmac_md5_usage_to_salt() 142 salt[0] = (ms_usage >> 0) & 0xff; in arcfour_hmac_md5_usage_to_salt() 143 salt[1] = (ms_usage >> 8) & 0xff; in arcfour_hmac_md5_usage_to_salt() 144 salt[2] = (ms_usage >> 16) & 0xff; in arcfour_hmac_md5_usage_to_salt() 145 salt[3] = (ms_usage >> 24) & 0xff; in arcfour_hmac_md5_usage_to_salt()
|
/linux-3.4.99/drivers/crypto/ |
D | picoxcell_crypto.c | 177 u8 salt[AES_BLOCK_SIZE]; member 762 memcpy(req->areq.iv, ctx->salt, ivsize); in spacc_aead_givencrypt() 807 get_random_bytes(ctx->salt, sizeof(ctx->salt)); in spacc_aead_cra_init()
|
D | ixp4xx_crypto.c | 185 u8 salt[MAX_IVLEN]; member 1215 get_random_bytes(ctx->salt, ivsize); in aead_givencrypt() 1218 memcpy(req->areq.iv, ctx->salt, ivsize); in aead_givencrypt()
|
/linux-3.4.99/net/ipv4/ |
D | route.c | 1355 u32 salt; in ip_select_fb_ident() local 1358 salt = secure_ip_id((__force __be32)ip_fallback_id ^ iph->daddr); in ip_select_fb_ident() 1359 iph->id = htons(salt & 0xFFFF); in ip_select_fb_ident() 1360 ip_fallback_id = salt; in ip_select_fb_ident()
|
/linux-3.4.99/Documentation/ |
D | edac.txt | 71 The presence of PCI Parity errors must be examined with a grain of salt.
|
/linux-3.4.99/Documentation/sound/oss/ |
D | README.OSS | 16 they are gone forever. Keeping this in mind and with a grain of salt this
|