| /OK3568_Linux_fs/kernel/fs/verity/ |
| H A D | open.c | 32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 49 salt_size); in fsverity_init_merkle_tree_params() 82 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 164 desc->salt, desc->salt_size); in fsverity_create_info() 242 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor() 243 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size); in validate_fsverity_descriptor()
|
| H A D | enable.c | 218 if (arg->salt_size && in enable_verity() 220 arg->salt_size)) { in enable_verity() 224 desc->salt_size = arg->salt_size; in enable_verity() 241 desc->salt, desc->salt_size); in enable_verity() 359 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
| H A D | hash_algs.c | 157 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 167 if (salt_size == 0) in fsverity_prepare_hash_state() 184 padded_salt_size = round_up(salt_size, alg->block_size); in fsverity_prepare_hash_state() 190 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
| H A D | fsverity_private.h | 97 const u8 *salt, size_t salt_size); 122 const u8 *salt, size_t salt_size);
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | fsverity.h | 23 __u32 salt_size; member 51 __u8 salt_size; /* size of salt in bytes; 0 if none */ member
|
| /OK3568_Linux_fs/kernel/drivers/md/ |
| H A D | dm-verity-target.c | 146 if (likely(v->salt_size && (v->version >= 1))) in verity_hash_init() 147 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init() 157 if (unlikely(v->salt_size && (!v->version))) { in verity_hash_final() 158 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final() 741 if (!v->salt_size) in verity_status() 744 for (x = 0; x < v->salt_size; x++) in verity_status() 1138 v->salt_size = strlen(argv[9]) / 2; in verity_ctr() 1139 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr() 1145 if (strlen(argv[9]) != v->salt_size * 2 || in verity_ctr() 1146 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
|
| H A D | dm-verity.h | 44 unsigned salt_size; member
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
| H A D | chtls_hw.c | 258 int ck_size, key_ctx_size, kctx_mackey_size, salt_size; in chtls_key_info() local 278 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chtls_key_info() 291 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in chtls_key_info() 327 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
| /OK3568_Linux_fs/kernel/net/tls/ |
| H A D | tls_sw.c | 516 prot->iv_size + prot->salt_size); in tls_do_encryption() 1478 iv + iv_offset + prot->salt_size, in decrypt_internal() 1486 prot->iv_size + prot->salt_size); in decrypt_internal() 1488 memcpy(iv + iv_offset, tls_ctx->rx.iv, prot->salt_size); in decrypt_internal() 2311 u16 nonce_size, tag_size, iv_size, rec_seq_size, salt_size; in tls_set_sw_offload() local 2380 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in tls_set_sw_offload() 2397 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in tls_set_sw_offload() 2414 salt_size = TLS_CIPHER_AES_CCM_128_SALT_SIZE; in tls_set_sw_offload() 2446 prot->salt_size = salt_size; in tls_set_sw_offload() 2447 cctx->iv = kmalloc(iv_size + salt_size, GFP_KERNEL); in tls_set_sw_offload() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/filesystems/incfs/ |
| H A D | utils.c | 100 uint32_t salt_size; member 129 .salt_size = 0, in format_signature()
|
| H A D | incfs_test.c | 3866 __u8 salt_size; /* size of salt in bytes; 0 if none */ in enable_verity() member 4021 TESTEQUAL(desc.salt_size, 0); in validate_verity()
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.h | 53 u32 salt_size; member
|
| H A D | chcr_ktls.c | 88 tx_info->salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chcr_ktls_save_keys() 159 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 1423 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short() 1424 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short() 1425 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short()
|
| /OK3568_Linux_fs/kernel/fs/incfs/ |
| H A D | verity.c | 402 __le32 salt_size; in incfs_add_signature_record() member 598 if (arg.salt_size) in incfs_ioctl_enable_verity()
|
| /OK3568_Linux_fs/kernel/include/net/ |
| H A D | tls.h | 242 u16 salt_size; member
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | fsverity.rst | 94 __u32 salt_size; 114 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is 412 __u8 salt_size; /* size of salt in bytes; 0 if none */
|