| /OK3568_Linux_fs/buildroot/package/mkpasswd/ |
| H A D | mkpasswd.c | 141 char *salt = NULL; in main() local 272 salt = NOFAIL(malloc(strlen(salt_prefix) + strlen(rounds_str) in main() 274 *salt = '\0'; in main() 275 strcat(salt, salt_prefix); in main() 276 strcat(salt, rounds_str); in main() 277 strcat(salt, salt_arg); in main() 281 salt = crypt_gensalt(salt_prefix, NULL); in main() 282 if (!salt) in main() 287 salt = crypt_gensalt(salt_prefix, rounds, entropy, 64); in main() 288 if (!salt) { in main() [all …]
|
| /OK3568_Linux_fs/buildroot/package/linux-pam/ |
| H A D | 0002-Remove-support-for-legacy-xcrypt.patch | 109 sp = crypt_gensalt_rn(algoid, rounds, NULL, 0, salt, sizeof(salt)); 117 - salt, sizeof(salt)); 120 - sp = stpcpy(salt, algoid); 122 - sp += snprintf(sp, sizeof(salt) - (16 + 1 + (sp - salt)), "rounds=%u$", rounds); 126 + sp = stpcpy(salt, algoid); 128 + sp += snprintf(sp, sizeof(salt) - (16 + 1 + (sp - salt)), "rounds=%u$", rounds);
|
| /OK3568_Linux_fs/kernel/fs/ecryptfs/ |
| H A D | debug.c | 20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok() 32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | stringhash.h | 39 #define init_name_hash(salt) (unsigned long)(salt) argument 66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int); 77 extern u64 __pure hashlen_string(const void *salt, const char *name);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | pkcs12.h | 104 ASN1_OCTET_STRING *salt; member 185 const char *pass, int passlen, unsigned char *salt, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 225 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 228 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 238 unsigned char *salt, int saltlen, int iter, 240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| H A D | ktls_txrx.c | 16 salt = info->salt; \ 18 salt_sz = sizeof(info->salt); \ 29 char *salt, *rec_seq; in fill_static_params() local 40 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | tls.h | 92 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member 100 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member 108 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
|
| /OK3568_Linux_fs/kernel/drivers/crypto/caam/ |
| H A D | pdb.h | 102 u8 salt[4]; member 114 u8 salt[4]; member 178 u8 salt[4]; member 188 u8 salt[4]; member 408 u16 salt[7]; member 423 u16 salt[7]; member
|
| /OK3568_Linux_fs/kernel/fs/verity/ |
| H A D | open.c | 32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params() 82 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 164 desc->salt, desc->salt_size); in fsverity_create_info() 242 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
|
| /OK3568_Linux_fs/tools/linux/Linux_SecurityAVB/scripts/ |
| H A D | avbtool | 1257 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)] 1276 self.salt = bytearray() 1300 o.write(' Salt: {}\n'.format(str(self.salt).encode( 1313 num_bytes_following = (self.SIZE + len(encoded_name) + len(self.salt) + 1322 len(encoded_name), len(self.salt), len(self.root_digest), 1325 ret = desc + encoded_name + self.salt + self.root_digest + padding 1349 self.hash_algorithm, self.salt, 1430 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)] 1441 self.salt = bytearray() 1455 o.write(' Salt: {}\n'.format(str(self.salt).encode( [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
| H A D | chtls_hw.c | 256 unsigned char *key_p, *salt; in chtls_key_info() local 276 salt = gcm_ctx_128->salt; in chtls_key_info() 289 salt = gcm_ctx_256->salt; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
| /OK3568_Linux_fs/u-boot/lib/rsa/ |
| H A D | rsa-verify.c | 258 uint8_t *salt, int salt_len, in compute_hash_prime() argument 268 region[2].data = salt; in compute_hash_prime() 291 uint8_t *db = NULL, *salt = NULL; in padding_pss_verify() local 303 salt = malloc(salt_len); in padding_pss_verify() 305 if (!masked_db || !h || !db_mask || !db || !salt || !hprime) { in padding_pss_verify() 350 memcpy(salt, &db[1], salt_len); in padding_pss_verify() 355 salt, salt_len, hprime); in padding_pss_verify() 362 free(salt); in padding_pss_verify()
|
| /OK3568_Linux_fs/u-boot/scripts/ |
| H A D | avbtool.py | 646 def create_avb_hashtree_hasher(algorithm, salt): argument 650 return hashlib.new('blake2b', salt, digest_size=32) 652 return hashlib.new(algorithm, salt) 1420 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)] 1440 self.salt = b'' 1467 o.write(' Salt: {}\n'.format(self.salt.hex())) 1480 + len(self.salt) + len(self.root_digest) - 16) 1488 len(partition_name_encoded), len(self.salt), 1490 ret = (desc + partition_name_encoded + self.salt + self.root_digest + 1523 self.hash_algorithm, self.salt, [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | hkdf.h | 73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 103 const unsigned char *salt, size_t salt_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | hkdf.h | 73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 103 const unsigned char *salt, size_t salt_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | hkdf.h | 73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 103 const unsigned char *salt, size_t salt_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | hkdf.h | 73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 103 const unsigned char *salt, size_t salt_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 46 size_t secret_len, const uint8_t *salt,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 46 size_t secret_len, const uint8_t *salt,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 46 size_t secret_len, const uint8_t *salt,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 46 size_t secret_len, const uint8_t *salt,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 46 size_t secret_len, const uint8_t *salt,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | hkdf.h | 37 const uint8_t *salt, size_t salt_len, 46 size_t secret_len, const uint8_t *salt,
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/intel/ixgbevf/ |
| H A D | ipsec.h | 22 u32 salt; member 38 u32 salt; member
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/intel/ixgbe/ |
| H A D | ixgbe_ipsec.h | 36 u32 salt; member 53 u32 salt; member
|