| /linux/crypto/ |
| H A D | hkdf.c | 140 u16 salt_size; member 159 .salt_size = 13, 182 .salt_size = 80, 205 .salt_size = 0, 220 .salt_size = 13, 237 .salt_size = 32, 257 .salt_size = 13, 281 .salt_size = 80, 305 .salt_size = 0, 321 .salt_size = 13, [all …]
|
| /linux/fs/verity/ |
| H A D | open.c | 34 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 51 if (salt_size) { in fsverity_init_merkle_tree_params() 53 fsverity_prepare_hash_state(hash_alg, salt, salt_size); in fsverity_init_merkle_tree_params() 192 desc->salt, desc->salt_size); in fsverity_create_info() 293 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor() 294 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size); in validate_fsverity_descriptor()
|
| H A D | enable.c | 198 if (arg->salt_size && in enable_verity() 200 arg->salt_size)) { in enable_verity() 204 desc->salt_size = arg->salt_size; in enable_verity() 221 desc->salt, desc->salt_size); in enable_verity() 332 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
| H A D | hash_algs.c | 56 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 70 padded_salt_size = round_up(salt_size, alg->block_size); in fsverity_prepare_hash_state() 74 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
| H A D | fsverity_private.h | 91 const u8 *salt, size_t salt_size); 125 const u8 *salt, size_t salt_size);
|
| /linux/include/uapi/linux/ |
| H A D | fsverity.h | 23 __u32 salt_size; member 51 __u8 salt_size; /* size of salt in bytes; 0 if none */ member
|
| /linux/drivers/md/ |
| H A D | dm-verity-target.c | 142 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_hash() 870 if (!v->salt_size) in verity_status() 873 for (x = 0; x < v->salt_size; x++) in verity_status() 946 if (!v->salt_size) in verity_status() 949 for (x = 0; x < v->salt_size; x++) in verity_status() 1359 v->salt_size = strlen(arg) / 2; in verity_setup_salt_and_hashstate() 1360 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_setup_salt_and_hashstate() 1365 if (strlen(arg) != v->salt_size * 2 || in verity_setup_salt_and_hashstate() 1366 hex2bin(v->salt, arg, v->salt_size)) { in verity_setup_salt_and_hashstate() 1381 v->salt, v->salt_size); in verity_setup_salt_and_hashstate() [all …]
|
| H A D | dm-verity.h | 55 unsigned int salt_size; member
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.h | 53 u32 salt_size; member
|
| /linux/fs/fuse/ |
| H A D | ioctl.c | 150 if (enable.salt_size > max_buffer_len || enable.sig_size > max_buffer_len) in fuse_setup_enable_verity() 153 if (enable.salt_size > 0) { in fuse_setup_enable_verity() 158 iov->iov_len = enable.salt_size; in fuse_setup_enable_verity()
|
| /linux/net/tls/ |
| H A D | tls.h | 318 tls_bigint_increment(ctx->iv + prot->salt_size, in tls_advance_record_sn() 347 ctx->tx.iv + prot->salt_size, iv_size); in tls_fill_prepend()
|
| H A D | tls_sw.c | 558 prot->iv_size + prot->salt_size); in tls_do_encryption() 1590 prot->iv_size + prot->salt_size); in tls_decrypt_sg() 1593 &dctx->iv[iv_offset] + prot->salt_size, in tls_decrypt_sg() 1597 memcpy(&dctx->iv[iv_offset], tls_ctx->rx.iv, prot->salt_size); in tls_decrypt_sg() 2763 prot->salt_size = cipher_desc->salt; in init_prot_info()
|
| /linux/include/net/ |
| H A D | tls.h | 217 u16 salt_size; member
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 116 __u32 salt_size; 136 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is 444 __u8 salt_size; /* size of salt in bytes; 0 if none */
|
| /linux/fs/btrfs/ |
| H A D | send.c | 5113 le8_to_cpu(desc->salt_size)); in send_verity()
|