Searched refs:salt_size (Results 1 - 15 of 15) sorted by relevance

/linux-master/include/uapi/linux/
H A Dfsverity.h23 __u32 salt_size; member in struct:fsverity_enable_arg
51 __u8 salt_size; /* size of salt in bytes; 0 if none */ member in struct:fsverity_descriptor
/linux-master/fs/verity/
H A Dhash_algs.c106 * @salt_size: salt size in bytes, possibly 0
112 const u8 *salt, size_t salt_size)
122 if (salt_size == 0)
136 padded_salt_size = round_up(salt_size, alg->block_size);
142 memcpy(padded_salt, salt, salt_size);
111 fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg, const u8 *salt, size_t salt_size) argument
H A Denable.c203 if (arg->salt_size &&
205 arg->salt_size)) {
209 desc->salt_size = arg->salt_size;
226 desc->salt, desc->salt_size);
337 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt))
H A Dfsverity_private.h84 const u8 *salt, size_t salt_size);
118 const u8 *salt, size_t salt_size);
H A Dopen.c22 * @salt_size: size of salt, possibly 0
33 const u8 *salt, size_t salt_size)
51 salt_size);
194 desc->salt, desc->salt_size);
300 if (desc->salt_size > sizeof(desc->salt)) {
301 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size);
29 fsverity_init_merkle_tree_params(struct merkle_tree_params *params, const struct inode *inode, unsigned int hash_algorithm, unsigned int log_blocksize, const u8 *salt, size_t salt_size) argument
/linux-master/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
H A Dchcr_ktls.h53 u32 salt_size; member in struct:chcr_ktls_info
H A Dchcr_ktls.c87 tx_info->salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE;
158 memcpy(kctx->salt, salt, tx_info->salt_size);
1417 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size);
1418 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size);
1419 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) =
/linux-master/drivers/md/
H A Ddm-verity-target.c157 if (likely(v->salt_size && (v->version >= 1)))
158 r = verity_hash_update(v, req, v->salt, v->salt_size, wait);
168 if (unlikely(v->salt_size && (!v->version))) {
169 r = verity_hash_update(v, req, v->salt, v->salt_size, wait);
895 if (!v->salt_size)
898 for (x = 0; x < v->salt_size; x++)
956 if (!v->salt_size)
959 for (x = 0; x < v->salt_size; x++)
1401 v->salt_size = strlen(argv[9]) / 2;
1402 v->salt = kmalloc(v->salt_size, GFP_KERNE
[all...]
H A Ddm-verity.h44 u8 *salt; /* salt: its size is salt_size */
46 unsigned int salt_size; member in struct:dm_verity
/linux-master/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_hw.c258 int ck_size, key_ctx_size, kctx_mackey_size, salt_size; local
278 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE;
291 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE;
327 memcpy(kctx->salt, salt, salt_size);
/linux-master/net/tls/
H A Dtls.h315 tls_bigint_increment(ctx->iv + prot->salt_size,
344 ctx->tx.iv + prot->salt_size, iv_size);
H A Dtls_sw.c558 prot->iv_size + prot->salt_size);
1544 prot->iv_size + prot->salt_size);
1547 &dctx->iv[iv_offset] + prot->salt_size,
1551 memcpy(&dctx->iv[iv_offset], tls_ctx->rx.iv, prot->salt_size);
2682 prot->salt_size = cipher_desc->salt;
/linux-master/include/net/
H A Dtls.h211 u16 salt_size; member in struct:tls_prot_info
/linux-master/drivers/net/phy/
H A Dnxp-c45-tja11xx-macsec.c494 u32 salt_size = MACSEC_SALT_LEN / 4; local
507 for (i = 0; i < salt_size; i++) {
/linux-master/fs/btrfs/
H A Dsend.c5178 le8_to_cpu(desc->salt_size));

Completed in 415 milliseconds