Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 146) sorted by relevance

123456

/OK3568_Linux_fs/buildroot/package/mkpasswd/
H A Dmkpasswd.c141 char *salt = NULL; in main() local
272 salt = NOFAIL(malloc(strlen(salt_prefix) + strlen(rounds_str) in main()
274 *salt = '\0'; in main()
275 strcat(salt, salt_prefix); in main()
276 strcat(salt, rounds_str); in main()
277 strcat(salt, salt_arg); in main()
281 salt = crypt_gensalt(salt_prefix, NULL); in main()
282 if (!salt) in main()
287 salt = crypt_gensalt(salt_prefix, rounds, entropy, 64); in main()
288 if (!salt) { in main()
[all …]
/OK3568_Linux_fs/buildroot/package/linux-pam/
H A D0002-Remove-support-for-legacy-xcrypt.patch109 sp = crypt_gensalt_rn(algoid, rounds, NULL, 0, salt, sizeof(salt));
117 - salt, sizeof(salt));
120 - sp = stpcpy(salt, algoid);
122 - sp += snprintf(sp, sizeof(salt) - (16 + 1 + (sp - salt)), "rounds=%u$", rounds);
126 + sp = stpcpy(salt, algoid);
128 + sp += snprintf(sp, sizeof(salt) - (16 + 1 + (sp - salt)), "rounds=%u$", rounds);
/OK3568_Linux_fs/kernel/fs/ecryptfs/
H A Ddebug.c20 char salt[ECRYPTFS_SALT_SIZE * 2 + 1]; in ecryptfs_dump_auth_tok() local
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
31 salt[ECRYPTFS_SALT_SIZE * 2] = '\0'; in ecryptfs_dump_auth_tok()
32 ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt); in ecryptfs_dump_auth_tok()
/OK3568_Linux_fs/kernel/include/linux/
H A Dstringhash.h39 #define init_name_hash(salt) (unsigned long)(salt) argument
66 extern unsigned int __pure full_name_hash(const void *salt, const char *, unsigned int);
77 extern u64 __pure hashlen_string(const void *salt, const char *name);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/
H A Dpkcs12.h104 ASN1_OCTET_STRING *salt; member
185 const char *pass, int passlen, unsigned char *salt,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
225 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
228 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
238 unsigned char *salt, int saltlen, int iter,
240 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
/OK3568_Linux_fs/kernel/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dktls_txrx.c16 salt = info->salt; \
18 salt_sz = sizeof(info->salt); \
29 char *salt, *rec_seq; in fill_static_params() local
40 memcpy(gcm_iv, salt, salt_sz); in fill_static_params()
/OK3568_Linux_fs/kernel/include/uapi/linux/
H A Dtls.h92 unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; member
100 unsigned char salt[TLS_CIPHER_AES_GCM_256_SALT_SIZE]; member
108 unsigned char salt[TLS_CIPHER_AES_CCM_128_SALT_SIZE]; member
/OK3568_Linux_fs/kernel/drivers/crypto/caam/
H A Dpdb.h102 u8 salt[4]; member
114 u8 salt[4]; member
178 u8 salt[4]; member
188 u8 salt[4]; member
408 u16 salt[7]; member
423 u16 salt[7]; member
/OK3568_Linux_fs/kernel/fs/verity/
H A Dopen.c32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
48 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, in fsverity_init_merkle_tree_params()
82 (int)salt_size, salt); in fsverity_init_merkle_tree_params()
164 desc->salt, desc->salt_size); in fsverity_create_info()
242 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor()
/OK3568_Linux_fs/tools/linux/Linux_SecurityAVB/scripts/
H A Davbtool1257 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)]
1276 self.salt = bytearray()
1300 o.write(' Salt: {}\n'.format(str(self.salt).encode(
1313 num_bytes_following = (self.SIZE + len(encoded_name) + len(self.salt) +
1322 len(encoded_name), len(self.salt), len(self.root_digest),
1325 ret = desc + encoded_name + self.salt + self.root_digest + padding
1349 self.hash_algorithm, self.salt,
1430 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)]
1441 self.salt = bytearray()
1455 o.write(' Salt: {}\n'.format(str(self.salt).encode(
[all …]
/OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c256 unsigned char *key_p, *salt; in chtls_key_info() local
276 salt = gcm_ctx_128->salt; in chtls_key_info()
289 salt = gcm_ctx_256->salt; in chtls_key_info()
327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
/OK3568_Linux_fs/u-boot/lib/rsa/
H A Drsa-verify.c258 uint8_t *salt, int salt_len, in compute_hash_prime() argument
268 region[2].data = salt; in compute_hash_prime()
291 uint8_t *db = NULL, *salt = NULL; in padding_pss_verify() local
303 salt = malloc(salt_len); in padding_pss_verify()
305 if (!masked_db || !h || !db_mask || !db || !salt || !hprime) { in padding_pss_verify()
350 memcpy(salt, &db[1], salt_len); in padding_pss_verify()
355 salt, salt_len, hprime); in padding_pss_verify()
362 free(salt); in padding_pss_verify()
/OK3568_Linux_fs/u-boot/scripts/
H A Davbtool.py646 def create_avb_hashtree_hasher(algorithm, salt): argument
650 return hashlib.new('blake2b', salt, digest_size=32)
652 return hashlib.new(algorithm, salt)
1420 self.salt = data[(self.SIZE + o):(self.SIZE + o + salt_len)]
1440 self.salt = b''
1467 o.write(' Salt: {}\n'.format(self.salt.hex()))
1480 + len(self.salt) + len(self.root_digest) - 16)
1488 len(partition_name_encoded), len(self.salt),
1490 ret = (desc + partition_name_encoded + self.salt + self.root_digest +
1523 self.hash_algorithm, self.salt,
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dhkdf.h73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt,
103 const unsigned char *salt, size_t salt_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dhkdf.h73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt,
103 const unsigned char *salt, size_t salt_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dhkdf.h73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt,
103 const unsigned char *salt, size_t salt_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dhkdf.h73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt,
103 const unsigned char *salt, size_t salt_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Dhkdf.h37 const uint8_t *salt, size_t salt_len,
46 size_t secret_len, const uint8_t *salt,
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Dhkdf.h37 const uint8_t *salt, size_t salt_len,
46 size_t secret_len, const uint8_t *salt,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dhkdf.h37 const uint8_t *salt, size_t salt_len,
46 size_t secret_len, const uint8_t *salt,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dhkdf.h37 const uint8_t *salt, size_t salt_len,
46 size_t secret_len, const uint8_t *salt,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dhkdf.h37 const uint8_t *salt, size_t salt_len,
46 size_t secret_len, const uint8_t *salt,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dhkdf.h37 const uint8_t *salt, size_t salt_len,
46 size_t secret_len, const uint8_t *salt,
/OK3568_Linux_fs/kernel/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.h22 u32 salt; member
38 u32 salt; member
/OK3568_Linux_fs/kernel/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_ipsec.h36 u32 salt; member
53 u32 salt; member

123456