Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 28) sorted by relevance

12

/fs/incfs/
Dverity.c71 struct mem_range signature = { in incfs_end_enable_verity() local
95 error = incfs_write_verity_signature_to_backing_file(bfc, signature, in incfs_end_enable_verity()
113 .size = signature.len, in incfs_end_enable_verity()
413 struct incfs_df_signature *signature = NULL; in incfs_add_signature_record() local
473 signature = kzalloc(sizeof(*signature), GFP_NOFS); in incfs_add_signature_record()
474 if (!signature) { in incfs_add_signature_record()
478 *signature = (struct incfs_df_signature) { in incfs_add_signature_record()
484 df->df_signature = signature; in incfs_add_signature_record()
485 signature = NULL; in incfs_add_signature_record()
495 kfree(signature); in incfs_add_signature_record()
[all …]
Dintegrity.c92 static int incfs_parse_signature(struct mem_range signature, in incfs_parse_signature() argument
95 u8 *p = signature.data; in incfs_parse_signature()
96 u8 *top = signature.data + signature.len; in incfs_parse_signature()
99 if (signature.len > INCFS_MAX_SIGNATURE_SIZE) in incfs_parse_signature()
130 struct mtree *incfs_alloc_mtree(struct mem_range signature, in incfs_alloc_mtree() argument
146 error = incfs_parse_signature(signature, &si); in incfs_alloc_mtree()
Ddata_mgmt.c1549 struct incfs_df_signature *signature = in process_file_signature_md() local
1550 kzalloc(sizeof(*signature), GFP_NOFS); in process_file_signature_md()
1554 if (!signature) in process_file_signature_md()
1563 signature->hash_offset = le64_to_cpu(sg->sg_hash_tree_offset); in process_file_signature_md()
1564 signature->hash_size = le32_to_cpu(sg->sg_hash_tree_size); in process_file_signature_md()
1565 signature->sig_offset = le64_to_cpu(sg->sg_sig_offset); in process_file_signature_md()
1566 signature->sig_size = le32_to_cpu(sg->sg_sig_size); in process_file_signature_md()
1568 buf = kzalloc(signature->sig_size, GFP_NOFS); in process_file_signature_md()
1575 signature->sig_size, signature->sig_offset); in process_file_signature_md()
1581 if (read != signature->sig_size) { in process_file_signature_md()
[all …]
Dformat.c371 struct backing_file_context *bfc, struct mem_range signature, in incfs_write_verity_signature_to_backing_file() argument
379 if (signature.data == NULL || signature.len == 0) in incfs_write_verity_signature_to_backing_file()
390 .vs_size = cpu_to_le32(signature.len), in incfs_write_verity_signature_to_backing_file()
394 result = write_to_bf(bfc, signature.data, signature.len, pos); in incfs_write_verity_signature_to_backing_file()
702 &handler->md_buffer.signature, handler); in incfs_read_next_metadata_record()
Dformat.h333 struct incfs_file_signature signature; member
388 struct backing_file_context *bfc, struct mem_range signature,
Dintegrity.h43 struct mtree *incfs_alloc_mtree(struct mem_range signature,
/fs/verity/
DKconfig28 against a known good value, e.g. from a digital signature).
38 bool "FS Verity builtin signature support"
47 alternatives (such as userspace signature verification, and
Dsignature.c49 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
90 signature, sig_size, fsverity_keyring, in fsverity_verify_signature()
Dfsverity_private.h132 const u8 *signature, size_t sig_size);
138 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
Dread_metadata.c109 desc_size = offsetof(struct fsverity_descriptor, signature); in fsverity_read_descriptor()
137 res = fsverity_read_buffer(buf, offset, length, desc->signature, in fsverity_read_signature()
DMakefile13 obj-$(CONFIG_FS_VERITY_BUILTIN_SIGNATURES) += signature.o
Denable.c190 size_t desc_size = struct_size(desc, signature, arg->sig_size); in enable_verity()
213 copy_from_user(desc->signature, u64_to_user_ptr(arg->sig_ptr), in enable_verity()
Dopen.c211 err = fsverity_verify_signature(vi, desc->signature, in fsverity_create_info()
/fs/hfsplus/
Dwrapper.c193 switch (sbi->s_vhdr->signature) { in hfsplus_read_wrapper()
225 if (sbi->s_backup_vhdr->signature != sbi->s_vhdr->signature) { in hfsplus_read_wrapper()
Dhfsplus_raw.h105 __be16 signature; member
/fs/ecryptfs/
Dkeystore.c144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, in write_tag_64_packet() argument
179 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); in write_tag_64_packet()
285 write_tag_66_packet(char *signature, u8 cipher_code, in write_tag_66_packet() argument
324 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); in write_tag_66_packet()
1107 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1110 (*sig) = auth_tok->token.private_key.signature; in ecryptfs_get_auth_tok_sig()
1297 ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, in parse_tag_1_packet()
1821 ecryptfs_to_hex(new_auth_tok->token.password.signature, in ecryptfs_parse_packet_set()
1823 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set()
1974 rc = write_tag_66_packet(auth_tok->token.private_key.signature, in pki_encrypt_session_key()
[all …]
Ddebug.c37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
/fs/smb/client/
Dcifsencrypt.c172 struct TCP_Server_Info *server, char *signature, in __cifs_calc_signature() argument
212 rc = crypto_shash_final(shash, signature); in __cifs_calc_signature()
227 struct TCP_Server_Info *server, char *signature) in cifs_calc_signature() argument
231 if (!rqst->rq_iov || !signature || !server) in cifs_calc_signature()
251 return __cifs_calc_signature(rqst, server, signature, server->secmech.md5); in cifs_calc_signature()
Dcifsproto.h620 struct TCP_Server_Info *server, char *signature,
/fs/ocfs2/
Docfs1_fs_compat.h33 /*08*/ __u8 signature[OCFS1_MAX_VOL_SIGNATURE_LEN]; member
/fs/isofs/
Drock.h97 __u8 signature[2]; member
/fs/exfat/
Dexfat_raw.h109 __le16 signature; member
Dsuper.c429 if (le16_to_cpu((p_boot->signature)) != BOOT_SIGNATURE) { in exfat_read_boot_sector()
/fs/smb/server/
Dsmb2pdu.c8660 char signature[SMB2_HMACSHA256_SIZE]; in smb2_check_sign_req() local
8683 signature)) in smb2_check_sign_req()
8686 if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { in smb2_check_sign_req()
8702 char signature[SMB2_HMACSHA256_SIZE]; in smb2_set_sign_rsp() local
8718 signature)) in smb2_set_sign_rsp()
8719 memcpy(hdr->Signature, signature, SMB2_SIGNATURE_SIZE); in smb2_set_sign_rsp()
8735 char signature[SMB2_CMACAES_SIZE]; in smb3_check_sign_req() local
8771 if (ksmbd_sign_smb3_pdu(conn, signing_key, iov, 1, signature)) in smb3_check_sign_req()
8774 if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { in smb3_check_sign_req()
8792 char signature[SMB2_CMACAES_SIZE]; in smb3_set_sign_rsp() local
[all …]
/fs/pstore/
DKconfig124 filled hex representation of the 32-bit "NT disk signature", and PP

12