Home
last modified time | relevance | path

Searched refs:salt_size (Results 1 – 13 of 13) sorted by relevance

/Linux-v5.10/fs/verity/
Dopen.c32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument
49 salt_size); in fsverity_init_merkle_tree_params()
82 (int)salt_size, salt); in fsverity_init_merkle_tree_params()
172 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info()
173 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size); in fsverity_create_info()
192 desc->salt, desc->salt_size); in fsverity_create_info()
Denable.c218 if (arg->salt_size && in enable_verity()
220 arg->salt_size)) { in enable_verity()
224 desc->salt_size = arg->salt_size; in enable_verity()
241 desc->salt, desc->salt_size); in enable_verity()
359 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
Dfsverity_private.h88 __u8 salt_size; /* size of salt in bytes; 0 if none */ member
127 const u8 *salt, size_t salt_size);
152 const u8 *salt, size_t salt_size);
Dhash_algs.c157 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument
167 if (salt_size == 0) in fsverity_prepare_hash_state()
184 padded_salt_size = round_up(salt_size, alg->block_size); in fsverity_prepare_hash_state()
190 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
/Linux-v5.10/drivers/md/
Ddm-verity-target.c146 if (likely(v->salt_size && (v->version >= 1))) in verity_hash_init()
147 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init()
157 if (unlikely(v->salt_size && (!v->version))) { in verity_hash_final()
158 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final()
722 if (!v->salt_size) in verity_status()
725 for (x = 0; x < v->salt_size; x++) in verity_status()
1119 v->salt_size = strlen(argv[9]) / 2; in verity_ctr()
1120 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr()
1126 if (strlen(argv[9]) != v->salt_size * 2 || in verity_ctr()
1127 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
Ddm-verity.h44 unsigned salt_size; member
/Linux-v5.10/include/uapi/linux/
Dfsverity.h23 __u32 salt_size; member
/Linux-v5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/
Dchtls_hw.c217 int ck_size, key_ctx_size, kctx_mackey_size, salt_size; in chtls_key_info() local
237 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chtls_key_info()
250 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in chtls_key_info()
286 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
/Linux-v5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
Dchcr_ktls.h53 u32 salt_size; member
Dchcr_ktls.c86 tx_info->salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chcr_ktls_save_keys()
161 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys()
1414 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short()
1415 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short()
1416 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short()
/Linux-v5.10/net/tls/
Dtls_sw.c506 prot->iv_size + prot->salt_size); in tls_do_encryption()
1468 iv + iv_offset + prot->salt_size, in decrypt_internal()
1478 memcpy(iv + iv_offset, tls_ctx->rx.iv, prot->salt_size); in decrypt_internal()
2304 u16 nonce_size, tag_size, iv_size, rec_seq_size, salt_size; in tls_set_sw_offload() local
2373 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in tls_set_sw_offload()
2390 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in tls_set_sw_offload()
2407 salt_size = TLS_CIPHER_AES_CCM_128_SALT_SIZE; in tls_set_sw_offload()
2439 prot->salt_size = salt_size; in tls_set_sw_offload()
2440 cctx->iv = kmalloc(iv_size + salt_size, GFP_KERNEL); in tls_set_sw_offload()
2447 memcpy(cctx->iv, salt, salt_size); in tls_set_sw_offload()
[all …]
/Linux-v5.10/include/net/
Dtls.h230 u16 salt_size; member
/Linux-v5.10/Documentation/filesystems/
Dfsverity.rst94 __u32 salt_size;
114 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is
336 __u8 salt_size; /* size of salt in bytes; 0 if none */