| /OK3568_Linux_fs/kernel/fs/incfs/ |
| H A D | verity.c | 71 static int incfs_end_enable_verity(struct file *filp, u8 *sig, size_t sig_size) in incfs_end_enable_verity() argument 76 .len = sig_size, in incfs_end_enable_verity() 212 u8 *signature, size_t sig_size) in incfs_calc_verity_digest_from_desc() argument 242 err = __fsverity_verify_signature(inode, signature, sig_size, in incfs_calc_verity_digest_from_desc() 499 .sig_size = sizeof(sig), in incfs_add_signature_record() 543 if (arg->sig_size) { in incfs_enable_verity() 545 arg->sig_size); in incfs_enable_verity() 554 arg->sig_size, arg->hash_algorithm); in incfs_enable_verity() 561 err = incfs_end_enable_verity(filp, signature, arg->sig_size); in incfs_enable_verity() 601 if (arg.sig_size > FS_VERITY_MAX_SIGNATURE_SIZE) in incfs_ioctl_enable_verity() [all …]
|
| H A D | data_mgmt.c | 1462 if (dst.len < sig->sig_size) in incfs_read_file_signature() 1465 read_res = incfs_kread(bfc, dst.data, sig->sig_size, sig->sig_offset); in incfs_read_file_signature() 1470 if (read_res != sig->sig_size) in incfs_read_file_signature() 1567 signature->sig_size = le32_to_cpu(sg->sg_sig_size); in process_file_signature_md() 1569 buf = kzalloc(signature->sig_size, GFP_NOFS); in process_file_signature_md() 1576 signature->sig_size, signature->sig_offset); in process_file_signature_md() 1582 if (read != signature->sig_size) { in process_file_signature_md() 1587 hash_tree = incfs_alloc_mtree(range(buf, signature->sig_size), in process_file_signature_md()
|
| H A D | format.h | 258 u32 sig_size; member
|
| /OK3568_Linux_fs/kernel/fs/verity/ |
| H A D | signature.c | 41 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument 46 return __fsverity_verify_signature(vi->inode, signature, sig_size, in fsverity_verify_signature() 64 size_t sig_size, const u8 *file_digest, in __fsverity_verify_signature() argument 75 if (sig_size == 0) { in __fsverity_verify_signature() 93 signature, sig_size, fsverity_keyring, in __fsverity_verify_signature()
|
| H A D | enable.c | 205 size_t desc_size = sizeof(*desc) + arg->sig_size; in enable_verity() 227 if (arg->sig_size && in enable_verity() 229 arg->sig_size)) { in enable_verity() 233 desc->sig_size = cpu_to_le32(arg->sig_size); in enable_verity() 290 if (arg->sig_size) in enable_verity() 292 arg->sig_size); in enable_verity() 362 if (arg.sig_size > FS_VERITY_MAX_SIGNATURE_SIZE) in fsverity_ioctl_enable()
|
| H A D | open.c | 134 __le32 sig_size = desc->sig_size; in compute_file_digest() local 137 desc->sig_size = 0; in compute_file_digest() 139 desc->sig_size = sig_size; in compute_file_digest() 185 le32_to_cpu(desc->sig_size)); in fsverity_create_info() 254 if (le32_to_cpu(desc->sig_size) > desc_size - sizeof(*desc)) { in validate_fsverity_descriptor()
|
| H A D | read_metadata.c | 110 desc->sig_size = 0; in fsverity_read_descriptor() 129 if (desc->sig_size == 0) { in fsverity_read_signature() 139 le32_to_cpu(desc->sig_size)); in fsverity_read_signature()
|
| H A D | fsverity_private.h | 143 const u8 *signature, size_t sig_size); 149 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
|
| /OK3568_Linux_fs/kernel/drivers/md/ |
| H A D | dm-verity-verify-sig.c | 56 sig_opts->sig_size = ukp->datalen; in verity_verify_get_sig_from_key() 58 memcpy(sig_opts->sig, ukp->data, sig_opts->sig_size); in verity_verify_get_sig_from_key() 132 sig_opts->sig_size = 0; in verity_verify_sig_opts_cleanup()
|
| H A D | dm-verity-verify-sig.h | 15 unsigned int sig_size; member
|
| /OK3568_Linux_fs/kernel/drivers/nfc/s3fwrn5/ |
| H A D | firmware.c | 111 const void *sig_data, u16 sig_size) in s3fwrn5_fw_enter_update_mode() argument 121 args.signature_size = sig_size; in s3fwrn5_fw_enter_update_mode() 164 sig_data, sig_size); in s3fwrn5_fw_enter_update_mode() 308 memcpy(&fw->sig_size, fw->fw->data + 0x18, 4); in s3fwrn5_fw_request_firmware() 392 fw_info->sig_size = s3fwrn5_fw_is_custom(&bootinfo) ? in s3fwrn5_fw_setup() 393 fw_info->fw.custom_sig_size : fw_info->fw.sig_size; in s3fwrn5_fw_setup() 454 SHA1_DIGEST_SIZE, fw_info->sig, fw_info->sig_size); in s3fwrn5_fw_download()
|
| H A D | firmware.h | 70 u32 sig_size; member 83 u32 sig_size; member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/ |
| H A D | signed_hdr.h | 56 uint16_t sig_size; member 70 (x)->sig_size)
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | fsverity.h | 25 __u32 sig_size; member 53 __le32 sig_size; member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/ |
| H A D | signed_hdr.h | 39 uint16_t sig_size; member 57 ADD_OVERFLOW(s, shdr->sig_size, &s)) in shdr_get_size()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/ |
| H A D | signed_hdr.h | 39 uint16_t sig_size; member 57 ADD_OVERFLOW(s, shdr->sig_size, &s)) in shdr_get_size()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | fsverity.h | 238 size_t sig_size, const u8 *file_digest, 242 const u8 *signature, size_t sig_size, in __fsverity_verify_signature() argument
|
| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | sign-file.c | 226 unsigned long module_size, sig_size; in main() local 394 sig_size = BIO_number_written(bd) - module_size; in main() 395 sig_info.sig_len = htonl(sig_size); in main()
|
| /OK3568_Linux_fs/kernel/drivers/media/rc/ |
| H A D | redrat3.c | 166 __be16 sig_size; member 343 unsigned int i, sig_size, offset, val; in redrat3_process_ir_data() local 360 sig_size = be16_to_cpu(rr3->irdata.sig_size); in redrat3_process_ir_data() 361 for (i = 0; i < sig_size; i++) { in redrat3_process_ir_data() 824 irdata->sig_size = cpu_to_be16(count + RR3_TX_TRAILER_LEN); in redrat3_transmit_ir()
|
| /OK3568_Linux_fs/kernel/security/integrity/ |
| H A D | digsig_asymmetric.c | 95 if (siglen != be16_to_cpu(hdr->sig_size)) in asymmetric_verify()
|
| H A D | integrity.h | 121 __be16 sig_size; /* signature size */ member
|
| /OK3568_Linux_fs/u-boot/lib/rsa/ |
| H A D | rsa-sign.c | 416 uint8_t **sigp, uint *sig_size) in rsa_sign_with_key() argument 496 debug("Got signature: %d bytes, expected %zu\n", *sig_size, size); in rsa_sign_with_key() 498 *sig_size = size; in rsa_sign_with_key()
|
| /OK3568_Linux_fs/kernel/arch/x86/um/ |
| H A D | signal.c | 458 int sig_size = (_NSIG_WORDS - 1) * sizeof(unsigned long); in sys_sigreturn() local 461 copy_from_user(&set.sig[1], frame->extramask, sig_size)) in sys_sigreturn()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/filesystems/incfs/ |
| H A D | incfs_test.c | 3859 .sig_size = 0, in enable_verity() 3867 __le32 sig_size; /* must be 0 */ in enable_verity() member 3888 size_t sig_size = 0; in enable_verity() local 3907 sizeof(fsverity_signed_digest), &sig, &sig_size), in enable_verity() 3910 fear.sig_size = sig_size; in enable_verity() 3932 &sig, &sig_size), in enable_verity() 3936 fear.sig_size = sig_size; in enable_verity() 3937 file->verity_sig_size = sig_size; in enable_verity() 3942 fear.sig_size = 0; in enable_verity()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 355 - int sig_err = EVP_VerifyFinal(&sig_ctx, sig_buf, sig_size, pk); 356 + int sig_err = EVP_VerifyFinal(sig_ctx, sig_buf, sig_size, pk);
|