| /fs/verity/ |
| A D | signature.c | 54 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument 95 signature, sig_size, fsverity_keyring, in fsverity_verify_signature() 116 signature, in fsverity_verify_signature()
|
| A D | Kconfig | 22 against a known good value, e.g. from a digital signature). 32 bool "FS Verity builtin signature support" 41 alternatives (such as userspace signature verification, and
|
| A D | fsverity_private.h | 143 const u8 *signature, size_t sig_size); 149 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
|
| A D | read_metadata.c | 110 desc_size = offsetof(struct fsverity_descriptor, signature); in fsverity_read_descriptor() 138 res = fsverity_read_buffer(buf, offset, length, desc->signature, in fsverity_read_signature()
|
| A D | Makefile | 11 obj-$(CONFIG_FS_VERITY_BUILTIN_SIGNATURES) += signature.o
|
| A D | enable.c | 187 size_t desc_size = struct_size(desc, signature, arg->sig_size); in enable_verity() 210 copy_from_user(desc->signature, u64_to_user_ptr(arg->sig_ptr), in enable_verity()
|
| A D | open.c | 204 err = fsverity_verify_signature(vi, desc->signature, in fsverity_create_info()
|
| /fs/hfsplus/ |
| A D | wrapper.c | 168 switch (sbi->s_vhdr->signature) { in hfsplus_read_wrapper() 200 if (sbi->s_backup_vhdr->signature != sbi->s_vhdr->signature) { in hfsplus_read_wrapper()
|
| A D | hfsplus_raw.h | 105 __be16 signature; member
|
| /fs/smb/client/ |
| A D | cifsencrypt.c | 58 struct TCP_Server_Info *server, char *signature, in __cifs_calc_signature() argument 98 rc = crypto_shash_final(shash, signature); in __cifs_calc_signature() 113 struct TCP_Server_Info *server, char *signature) in cifs_calc_signature() argument 117 if (!rqst->rq_iov || !signature || !server) in cifs_calc_signature() 137 return __cifs_calc_signature(rqst, server, signature, server->secmech.md5); in cifs_calc_signature()
|
| A D | cifsproto.h | 636 struct TCP_Server_Info *server, char *signature,
|
| A D | cifspdu.h | 2694 char signature[4]; /* XSym */ /* not null terminated */ member
|
| /fs/ecryptfs/ |
| A D | keystore.c | 179 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); in write_tag_64_packet() 285 write_tag_66_packet(char *signature, u8 cipher_code, in write_tag_66_packet() argument 324 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); in write_tag_66_packet() 1107 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1110 (*sig) = auth_tok->token.private_key.signature; in ecryptfs_get_auth_tok_sig() 1297 ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, in parse_tag_1_packet() 1821 ecryptfs_to_hex(new_auth_tok->token.password.signature, in ecryptfs_parse_packet_set() 1823 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set() 1974 rc = write_tag_66_packet(auth_tok->token.private_key.signature, in pki_encrypt_session_key() 2033 ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature, in write_tag_1_packet() [all …]
|
| A D | debug.c | 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
| /fs/ocfs2/ |
| A D | ocfs1_fs_compat.h | 33 /*08*/ __u8 signature[OCFS1_MAX_VOL_SIGNATURE_LEN]; member
|
| A D | super.c | 762 if (memcmp(hdr->signature, OCFS1_VOLUME_SIGNATURE, in ocfs2_sb_probe() 765 hdr->signature); in ocfs2_sb_probe()
|
| /fs/isofs/ |
| A D | rock.h | 93 __u8 signature[2]; member
|
| /fs/exfat/ |
| A D | exfat_raw.h | 110 __le16 signature; member
|
| A D | super.c | 437 if (le16_to_cpu((p_boot->signature)) != BOOT_SIGNATURE) { in exfat_read_boot_sector()
|
| /fs/pstore/ |
| A D | Kconfig | 124 filled hex representation of the 32-bit "NT disk signature", and PP
|
| /fs/smb/server/ |
| A D | smb2pdu.c | 8820 char signature[SMB2_HMACSHA256_SIZE]; in smb2_check_sign_req() local 8843 signature)) in smb2_check_sign_req() 8846 if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { in smb2_check_sign_req() 8862 char signature[SMB2_HMACSHA256_SIZE]; in smb2_set_sign_rsp() local 8878 signature)) in smb2_set_sign_rsp() 8879 memcpy(hdr->Signature, signature, SMB2_SIGNATURE_SIZE); in smb2_set_sign_rsp() 8895 char signature[SMB2_CMACAES_SIZE]; in smb3_check_sign_req() local 8934 if (memcmp(signature, signature_req, SMB2_SIGNATURE_SIZE)) { in smb3_check_sign_req() 8952 char signature[SMB2_CMACAES_SIZE]; in smb3_set_sign_rsp() local 8984 signature)) in smb3_set_sign_rsp() [all …]
|
| /fs/btrfs/ |
| A D | send.c | 5131 TLV_PUT(sctx, BTRFS_SEND_A_VERITY_SIG_DATA, desc->signature, in send_verity()
|