/fs/incfs/ |
D | verity.c | 71 struct mem_range signature = { in incfs_end_enable_verity() local 95 error = incfs_write_verity_signature_to_backing_file(bfc, signature, in incfs_end_enable_verity() 113 .size = signature.len, in incfs_end_enable_verity() 413 struct incfs_df_signature *signature = NULL; in incfs_add_signature_record() local 473 signature = kzalloc(sizeof(*signature), GFP_NOFS); in incfs_add_signature_record() 474 if (!signature) { in incfs_add_signature_record() 478 *signature = (struct incfs_df_signature) { in incfs_add_signature_record() 484 df->df_signature = signature; in incfs_add_signature_record() 485 signature = NULL; in incfs_add_signature_record() 495 kfree(signature); in incfs_add_signature_record() [all …]
|
D | integrity.c | 92 static int incfs_parse_signature(struct mem_range signature, in incfs_parse_signature() argument 95 u8 *p = signature.data; in incfs_parse_signature() 96 u8 *top = signature.data + signature.len; in incfs_parse_signature() 99 if (signature.len > INCFS_MAX_SIGNATURE_SIZE) in incfs_parse_signature() 130 struct mtree *incfs_alloc_mtree(struct mem_range signature, in incfs_alloc_mtree() argument 146 error = incfs_parse_signature(signature, &si); in incfs_alloc_mtree()
|
D | data_mgmt.c | 1549 struct incfs_df_signature *signature = in process_file_signature_md() local 1550 kzalloc(sizeof(*signature), GFP_NOFS); in process_file_signature_md() 1554 if (!signature) in process_file_signature_md() 1563 signature->hash_offset = le64_to_cpu(sg->sg_hash_tree_offset); in process_file_signature_md() 1564 signature->hash_size = le32_to_cpu(sg->sg_hash_tree_size); in process_file_signature_md() 1565 signature->sig_offset = le64_to_cpu(sg->sg_sig_offset); in process_file_signature_md() 1566 signature->sig_size = le32_to_cpu(sg->sg_sig_size); in process_file_signature_md() 1568 buf = kzalloc(signature->sig_size, GFP_NOFS); in process_file_signature_md() 1575 signature->sig_size, signature->sig_offset); in process_file_signature_md() 1581 if (read != signature->sig_size) { in process_file_signature_md() [all …]
|
D | format.c | 371 struct backing_file_context *bfc, struct mem_range signature, in incfs_write_verity_signature_to_backing_file() argument 379 if (signature.data == NULL || signature.len == 0) in incfs_write_verity_signature_to_backing_file() 390 .vs_size = cpu_to_le32(signature.len), in incfs_write_verity_signature_to_backing_file() 394 result = write_to_bf(bfc, signature.data, signature.len, pos); in incfs_write_verity_signature_to_backing_file() 702 &handler->md_buffer.signature, handler); in incfs_read_next_metadata_record()
|
D | format.h | 333 struct incfs_file_signature signature; member 388 struct backing_file_context *bfc, struct mem_range signature,
|
D | integrity.h | 43 struct mtree *incfs_alloc_mtree(struct mem_range signature,
|
/fs/verity/ |
D | Kconfig | 28 against a known good value, e.g. from a digital signature). 38 bool "FS Verity builtin signature support" 47 alternatives (such as userspace signature verification, and
|
D | signature.c | 49 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument 90 signature, sig_size, fsverity_keyring, in fsverity_verify_signature()
|
D | fsverity_private.h | 132 const u8 *signature, size_t sig_size); 138 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
|
D | read_metadata.c | 109 desc_size = offsetof(struct fsverity_descriptor, signature); in fsverity_read_descriptor() 137 res = fsverity_read_buffer(buf, offset, length, desc->signature, in fsverity_read_signature()
|
D | Makefile | 13 obj-$(CONFIG_FS_VERITY_BUILTIN_SIGNATURES) += signature.o
|
D | enable.c | 190 size_t desc_size = struct_size(desc, signature, arg->sig_size); in enable_verity() 213 copy_from_user(desc->signature, u64_to_user_ptr(arg->sig_ptr), in enable_verity()
|
D | open.c | 211 err = fsverity_verify_signature(vi, desc->signature, in fsverity_create_info()
|
/fs/hfsplus/ |
D | wrapper.c | 193 switch (sbi->s_vhdr->signature) { in hfsplus_read_wrapper() 225 if (sbi->s_backup_vhdr->signature != sbi->s_vhdr->signature) { in hfsplus_read_wrapper()
|
D | hfsplus_raw.h | 105 __be16 signature; member
|
/fs/ecryptfs/ |
D | keystore.c | 144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, in write_tag_64_packet() argument 179 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); in write_tag_64_packet() 285 write_tag_66_packet(char *signature, u8 cipher_code, in write_tag_66_packet() argument 324 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); in write_tag_66_packet() 1107 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1110 (*sig) = auth_tok->token.private_key.signature; in ecryptfs_get_auth_tok_sig() 1297 ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, in parse_tag_1_packet() 1821 ecryptfs_to_hex(new_auth_tok->token.password.signature, in ecryptfs_parse_packet_set() 1823 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set() 1974 rc = write_tag_66_packet(auth_tok->token.private_key.signature, in pki_encrypt_session_key() [all …]
|
D | debug.c | 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
/fs/smb/client/ |
D | cifsencrypt.c | 172 struct TCP_Server_Info *server, char *signature, in __cifs_calc_signature() argument 212 rc = crypto_shash_final(shash, signature); in __cifs_calc_signature() 227 struct TCP_Server_Info *server, char *signature) in cifs_calc_signature() argument 231 if (!rqst->rq_iov || !signature || !server) in cifs_calc_signature() 251 return __cifs_calc_signature(rqst, server, signature, server->secmech.md5); in cifs_calc_signature()
|
D | cifsproto.h | 620 struct TCP_Server_Info *server, char *signature,
|
/fs/ocfs2/ |
D | ocfs1_fs_compat.h | 33 /*08*/ __u8 signature[OCFS1_MAX_VOL_SIGNATURE_LEN]; member
|
/fs/isofs/ |
D | rock.h | 97 __u8 signature[2]; member
|
/fs/exfat/ |
D | exfat_raw.h | 109 __le16 signature; member
|
D | super.c | 429 if (le16_to_cpu((p_boot->signature)) != BOOT_SIGNATURE) { in exfat_read_boot_sector()
|
/fs/smb/server/ |
D | smb2pdu.c | 8660 char signature[SMB2_HMACSHA256_SIZE]; in smb2_check_sign_req() local 8683 signature)) in smb2_check_sign_req() 8686 if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { in smb2_check_sign_req() 8702 char signature[SMB2_HMACSHA256_SIZE]; in smb2_set_sign_rsp() local 8718 signature)) in smb2_set_sign_rsp() 8719 memcpy(hdr->Signature, signature, SMB2_SIGNATURE_SIZE); in smb2_set_sign_rsp() 8735 char signature[SMB2_CMACAES_SIZE]; in smb3_check_sign_req() local 8771 if (ksmbd_sign_smb3_pdu(conn, signing_key, iov, 1, signature)) in smb3_check_sign_req() 8774 if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { in smb3_check_sign_req() 8792 char signature[SMB2_CMACAES_SIZE]; in smb3_set_sign_rsp() local [all …]
|
/fs/pstore/ |
D | Kconfig | 124 filled hex representation of the 32-bit "NT disk signature", and PP
|