/linux-master/include/uapi/linux/ |
H A D | fsverity.h | 23 __u32 salt_size; member in struct:fsverity_enable_arg 51 __u8 salt_size; /* size of salt in bytes; 0 if none */ member in struct:fsverity_descriptor
|
/linux-master/fs/verity/ |
H A D | hash_algs.c | 106 * @salt_size: salt size in bytes, possibly 0 112 const u8 *salt, size_t salt_size) 122 if (salt_size == 0) 136 padded_salt_size = round_up(salt_size, alg->block_size); 142 memcpy(padded_salt, salt, salt_size); 111 fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg, const u8 *salt, size_t salt_size) argument
|
H A D | enable.c | 203 if (arg->salt_size && 205 arg->salt_size)) { 209 desc->salt_size = arg->salt_size; 226 desc->salt, desc->salt_size); 337 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt))
|
H A D | fsverity_private.h | 84 const u8 *salt, size_t salt_size); 118 const u8 *salt, size_t salt_size);
|
H A D | open.c | 22 * @salt_size: size of salt, possibly 0 33 const u8 *salt, size_t salt_size) 51 salt_size); 194 desc->salt, desc->salt_size); 300 if (desc->salt_size > sizeof(desc->salt)) { 301 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size); 29 fsverity_init_merkle_tree_params(struct merkle_tree_params *params, const struct inode *inode, unsigned int hash_algorithm, unsigned int log_blocksize, const u8 *salt, size_t salt_size) argument
|
/linux-master/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.h | 53 u32 salt_size; member in struct:chcr_ktls_info
|
H A D | chcr_ktls.c | 87 tx_info->salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; 158 memcpy(kctx->salt, salt, tx_info->salt_size); 1417 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); 1418 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); 1419 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) =
|
/linux-master/drivers/md/ |
H A D | dm-verity-target.c | 157 if (likely(v->salt_size && (v->version >= 1))) 158 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); 168 if (unlikely(v->salt_size && (!v->version))) { 169 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); 895 if (!v->salt_size) 898 for (x = 0; x < v->salt_size; x++) 956 if (!v->salt_size) 959 for (x = 0; x < v->salt_size; x++) 1401 v->salt_size = strlen(argv[9]) / 2; 1402 v->salt = kmalloc(v->salt_size, GFP_KERNE [all...] |
H A D | dm-verity.h | 44 u8 *salt; /* salt: its size is salt_size */ 46 unsigned int salt_size; member in struct:dm_verity
|
/linux-master/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 258 int ck_size, key_ctx_size, kctx_mackey_size, salt_size; local 278 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; 291 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; 327 memcpy(kctx->salt, salt, salt_size);
|
/linux-master/net/tls/ |
H A D | tls.h | 315 tls_bigint_increment(ctx->iv + prot->salt_size, 344 ctx->tx.iv + prot->salt_size, iv_size);
|
H A D | tls_sw.c | 558 prot->iv_size + prot->salt_size); 1544 prot->iv_size + prot->salt_size); 1547 &dctx->iv[iv_offset] + prot->salt_size, 1551 memcpy(&dctx->iv[iv_offset], tls_ctx->rx.iv, prot->salt_size); 2682 prot->salt_size = cipher_desc->salt;
|
/linux-master/include/net/ |
H A D | tls.h | 211 u16 salt_size; member in struct:tls_prot_info
|
/linux-master/drivers/net/phy/ |
H A D | nxp-c45-tja11xx-macsec.c | 494 u32 salt_size = MACSEC_SALT_LEN / 4; local 507 for (i = 0; i < salt_size; i++) {
|
/linux-master/fs/btrfs/ |
H A D | send.c | 5178 le8_to_cpu(desc->salt_size));
|