| /Linux-v5.10/fs/verity/ |
| D | open.c | 32 const u8 *salt, size_t salt_size) in fsverity_init_merkle_tree_params() argument 49 salt_size); in fsverity_init_merkle_tree_params() 82 (int)salt_size, salt); in fsverity_init_merkle_tree_params() 172 if (desc->salt_size > sizeof(desc->salt)) { in fsverity_create_info() 173 fsverity_err(inode, "Invalid salt_size: %u", desc->salt_size); in fsverity_create_info() 192 desc->salt, desc->salt_size); in fsverity_create_info()
|
| D | enable.c | 218 if (arg->salt_size && in enable_verity() 220 arg->salt_size)) { in enable_verity() 224 desc->salt_size = arg->salt_size; in enable_verity() 241 desc->salt, desc->salt_size); in enable_verity() 359 if (arg.salt_size > sizeof_field(struct fsverity_descriptor, salt)) in fsverity_ioctl_enable()
|
| D | fsverity_private.h | 88 __u8 salt_size; /* size of salt in bytes; 0 if none */ member 127 const u8 *salt, size_t salt_size); 152 const u8 *salt, size_t salt_size);
|
| D | hash_algs.c | 157 const u8 *salt, size_t salt_size) in fsverity_prepare_hash_state() argument 167 if (salt_size == 0) in fsverity_prepare_hash_state() 184 padded_salt_size = round_up(salt_size, alg->block_size); in fsverity_prepare_hash_state() 190 memcpy(padded_salt, salt, salt_size); in fsverity_prepare_hash_state()
|
| /Linux-v5.10/drivers/md/ |
| D | dm-verity-target.c | 146 if (likely(v->salt_size && (v->version >= 1))) in verity_hash_init() 147 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_init() 157 if (unlikely(v->salt_size && (!v->version))) { in verity_hash_final() 158 r = verity_hash_update(v, req, v->salt, v->salt_size, wait); in verity_hash_final() 722 if (!v->salt_size) in verity_status() 725 for (x = 0; x < v->salt_size; x++) in verity_status() 1119 v->salt_size = strlen(argv[9]) / 2; in verity_ctr() 1120 v->salt = kmalloc(v->salt_size, GFP_KERNEL); in verity_ctr() 1126 if (strlen(argv[9]) != v->salt_size * 2 || in verity_ctr() 1127 hex2bin(v->salt, argv[9], v->salt_size)) { in verity_ctr()
|
| D | dm-verity.h | 44 unsigned salt_size; member
|
| /Linux-v5.10/include/uapi/linux/ |
| D | fsverity.h | 23 __u32 salt_size; member
|
| /Linux-v5.10/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
| D | chtls_hw.c | 217 int ck_size, key_ctx_size, kctx_mackey_size, salt_size; in chtls_key_info() local 237 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chtls_key_info() 250 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in chtls_key_info() 286 memcpy(kctx->salt, salt, salt_size); in chtls_key_info()
|
| /Linux-v5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| D | chcr_ktls.h | 53 u32 salt_size; member
|
| D | chcr_ktls.c | 86 tx_info->salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in chcr_ktls_save_keys() 161 memcpy(kctx->salt, salt, tx_info->salt_size); in chcr_ktls_save_keys() 1414 memcpy(pos, tx_info->key_ctx.salt, tx_info->salt_size); in chcr_ktls_xmit_wr_short() 1415 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short() 1416 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short()
|
| /Linux-v5.10/net/tls/ |
| D | tls_sw.c | 506 prot->iv_size + prot->salt_size); in tls_do_encryption() 1468 iv + iv_offset + prot->salt_size, in decrypt_internal() 1478 memcpy(iv + iv_offset, tls_ctx->rx.iv, prot->salt_size); in decrypt_internal() 2304 u16 nonce_size, tag_size, iv_size, rec_seq_size, salt_size; in tls_set_sw_offload() local 2373 salt_size = TLS_CIPHER_AES_GCM_128_SALT_SIZE; in tls_set_sw_offload() 2390 salt_size = TLS_CIPHER_AES_GCM_256_SALT_SIZE; in tls_set_sw_offload() 2407 salt_size = TLS_CIPHER_AES_CCM_128_SALT_SIZE; in tls_set_sw_offload() 2439 prot->salt_size = salt_size; in tls_set_sw_offload() 2440 cctx->iv = kmalloc(iv_size + salt_size, GFP_KERNEL); in tls_set_sw_offload() 2447 memcpy(cctx->iv, salt, salt_size); in tls_set_sw_offload() [all …]
|
| /Linux-v5.10/include/net/ |
| D | tls.h | 230 u16 salt_size; member
|
| /Linux-v5.10/Documentation/filesystems/ |
| D | fsverity.rst | 94 __u32 salt_size; 114 - ``salt_size`` is the size of the salt in bytes, or 0 if no salt is 336 __u8 salt_size; /* size of salt in bytes; 0 if none */
|