| /linux/crypto/ |
| H A D | hkdf.c | 140 u16 salt_size; member 159 .salt_size = 13, 182 .salt_size = 80, 205 .salt_size = 0, 220 .salt_size = 13, 237 .salt_size = 32, 257 .salt_size = 13, 281 .salt_size = 80, 305 .salt_size = 0, 321 .salt_size = 13, [all …]
|
| /linux/fs/verity/ |
| H A D | open.c | 42 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 59 if (salt_size) { in fsverity_init_merkle_tree_params() 61 fsverity_prepare_hash_state(hash_alg, salt, salt_size); in fsverity_init_merkle_tree_params() 200 desc->salt, desc->salt_size); in fsverity_create_info() 287 if (desc->salt_size > sizeof(desc->salt)) { in validate_fsverity_descriptor() 288 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size); in validate_fsverity_descriptor()
|
| H A D | enable.c | 199 if (arg->salt_size && in enable_verity() 201 arg->salt_size)) { in enable_verity() 205 desc->salt_size = arg->salt_size; in enable_verity() 222 desc->salt, desc->salt_size); in enable_verity() 345 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
| H A D | hash_algs.c | 56 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 70 padded_salt_size = round_up(salt_size, alg->block_size); in fsverity_prepare_hash_state() 74 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
| H A D | fsverity_private.h | 93 const u8 *salt, size_t salt_size); 127 const u8 *salt, size_t salt_size);
|
| /linux/include/uapi/linux/ |
| H A D | fsverity.h | 23 __u32 salt_size; member 51 __u8 salt_size; /* size of salt in bytes; 0 if none */ member
|
| /linux/drivers/md/ |
| H A D | dm-verity-target.c | 143 crypto_shash_update(desc, v->salt, v->salt_size) ?: in verity_hash() 868 if (!v->salt_size) in verity_status() 871 for (x = 0; x < v->salt_size; x++) in verity_status() 944 if (!v->salt_size) in verity_status() 947 for (x = 0; x < v->salt_size; x++) in verity_status() 1357 v->salt_size = strlen(arg) / 2; in verity_setup_salt_and_hashstate() 1358 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_setup_salt_and_hashstate() 1363 if (strlen(arg) != v->salt_size * 2 || in verity_setup_salt_and_hashstate() 1364 hex2bin(v->salt, arg, v->salt_size)) { in verity_setup_salt_and_hashstate() 1379 v->salt, v->salt_size); in verity_setup_salt_and_hashstate() [all …]
|
| H A D | dm-verity.h | 55 unsigned int salt_size; member
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
| H A D | chtls_hw.c | 249 int ck_size, key_ctx_size, kctx_mackey_size, salt_size; in chtls_key_info() local 269 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chtls_key_info() 282 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in chtls_key_info() 318 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
| /linux/fs/fuse/ |
| H A D | ioctl.c | 150 if (enable.salt_size > max_buffer_len || enable.sig_size > max_buffer_len) in fuse_setup_enable_verity() 153 if (enable.salt_size > 0) { in fuse_setup_enable_verity() 158 iov->iov_len = enable.salt_size; in fuse_setup_enable_verity()
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.h | 53 u32 salt_size; member
|
| H A D | chcr_ktls.c | 88 tx_info->salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chcr_ktls_save_keys() 159 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 1418 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short() 1419 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short() 1420 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short()
|
| /linux/net/tls/ |
| H A D | tls.h | 318 tls_bigint_increment(ctx->iv + prot->salt_size, in tls_advance_record_sn() 347 ctx->tx.iv + prot->salt_size, iv_size); in tls_fill_prepend()
|
| H A D | tls_sw.c | 559 prot->iv_size + prot->salt_size); in tls_do_encryption() 1601 prot->iv_size + prot->salt_size); in tls_decrypt_sg() 1604 &dctx->iv[iv_offset] + prot->salt_size, in tls_decrypt_sg() 1608 memcpy(&dctx->iv[iv_offset], tls_ctx->rx.iv, prot->salt_size); in tls_decrypt_sg() 2773 prot->salt_size = cipher_desc->salt; in init_prot_info()
|
| /linux/include/net/ |
| H A D | tls.h | 217 u16 salt_size; member
|
| /linux/drivers/net/phy/ |
| H A D | nxp-c45-tja11xx-macsec.c | 494 u32 salt_size = MACSEC_SALT_LEN / 4; in nxp_c45_sa_set_key() local 507 for (i = 0; i < salt_size; i++) { in nxp_c45_sa_set_key()
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 116 __u32 salt_size; 136 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is 460 __u8 salt_size; /* size of salt in bytes; 0 if none */
|
| /linux/fs/btrfs/ |
| H A D | send.c | 5113 le8_to_cpu(desc->salt_size)); in send_verity()
|