/Linux-v5.10/include/crypto/ |
D | curve25519.h | 29 const u8 secret[CURVE25519_KEY_SIZE]); 33 const u8 secret[CURVE25519_KEY_SIZE], in curve25519() 37 curve25519_arch(mypublic, secret, basepoint); in curve25519() 39 curve25519_generic(mypublic, secret, basepoint); in curve25519() 46 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public() 48 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 53 curve25519_base_arch(pub, secret); in curve25519_generate_public() 55 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public() 59 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() 61 secret[0] &= 248; in curve25519_clamp_secret() [all …]
|
D | kpp.h | 50 * store the secret private key along with parameters. 56 * @compute_shared_secret: Function compute the shared secret as defined by 255 * struct kpp_secret - small header for packing secret buffer 257 * @type: define type of secret. Each kpp type will define its own 258 * @len: specify the len of the secret, include the header, that 323 * Function invokes the specific kpp operation for computing the shared secret
|
/Linux-v5.10/fs/crypto/ |
D | keyring.c | 28 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument 30 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret() 31 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret() 84 seq_puts(m, ": secret removed"); in fscrypt_key_describe() 330 * Allocate a new fscrypt_master_key which contains the given secret, set it as 334 static int add_new_master_key(struct fscrypt_master_key_secret *secret, in add_new_master_key() argument 349 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key() 352 refcount_set(&mk->mk_refcount, 1); /* secret is present */ in add_new_master_key() 394 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument 429 /* Re-add the secret if needed. */ in add_existing_master_key() [all …]
|
D | fscrypt_private.h | 404 * fscrypt_master_key_secret - secret key material of an in-use master key 432 * The secret key material. After FS_IOC_REMOVE_ENCRYPTION_KEY is 437 * FS_IOC_ADD_ENCRYPTION_KEY can add the secret again. 505 is_master_key_secret_present(const struct fscrypt_master_key_secret *secret) in is_master_key_secret_present() argument 510 * take ->mk_secret_sem and thus 'secret' can change concurrently which in is_master_key_secret_present() 511 * would be a data race. But they only need to know whether the secret in is_master_key_secret_present() 514 return READ_ONCE(secret->size) != 0; in is_master_key_secret_present()
|
/Linux-v5.10/crypto/ |
D | ecdh_helper.c | 37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local 48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key() 61 struct kpp_secret secret; in crypto_ecdh_decode_key() local 66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key() 67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key() 72 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
D | dh_helper.c | 44 struct kpp_secret secret = { in crypto_dh_encode_key() local 52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key() 71 struct kpp_secret secret; in crypto_dh_decode_key() local 76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key() 77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key() 84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
|
D | curve25519-generic.c | 12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 15 curve25519_generate_secret(secret); in curve25519_set_secret() 18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
|
D | ecc.h | 115 * crypto_ecdh_shared_secret() - Compute a shared secret 121 * @secret: buffer for storing the calculated shared secret 126 * Returns 0 if the shared secret was generated successfully, a negative value 131 u64 *secret);
|
/Linux-v5.10/arch/arm/crypto/ |
D | curve25519-glue.c | 23 const u8 secret[CURVE25519_KEY_SIZE], 43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch() 45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch() 52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 55 curve25519_generate_secret(secret); in curve25519_set_secret() 58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
|
/Linux-v5.10/net/bluetooth/ |
D | ecdh_helper.c | 56 * secret: memory where the ecdh computed shared secret will be saved. 61 u8 secret[32]) in compute_ecdh_secret() 85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret() 96 pr_err("alg: ecdh: compute shared secret failed. err %d\n", in compute_ecdh_secret() 101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret() 102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
|
/Linux-v5.10/security/keys/ |
D | dh.c | 137 * The src pointer is defined as Z || other info where Z is the shared secret 241 uint8_t *secret; in __keyctl_dh_compute() local 306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute() 307 if (!secret) { in __keyctl_dh_compute() 311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute() 321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute() 377 * Concatenate SP800-56A otherinfo past DH shared secret -- the in __keyctl_dh_compute() 378 * input to the KDF is (DH shared secret || otherinfo) in __keyctl_dh_compute() 402 kfree_sensitive(secret); in __keyctl_dh_compute()
|
/Linux-v5.10/net/ceph/ |
D | auth_x.c | 54 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument 64 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt() 74 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument 81 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt() 94 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument 102 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt() 158 struct ceph_crypto_key *secret, in process_one_ticket() argument 194 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket() 267 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument 283 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply() [all …]
|
D | auth_x.h | 41 struct ceph_crypto_key secret; member
|
/Linux-v5.10/net/sctp/ |
D | auth.c | 258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 267 if (!secret) in sctp_auth_asoc_set_secret() 271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 280 return secret; in sctp_auth_asoc_set_secret() 295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 346 return secret; in sctp_auth_asoc_create_secret() [all …]
|
/Linux-v5.10/Documentation/security/keys/ |
D | ecryptfs.rst | 70 into the '/secret' directory:: 73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
|
/Linux-v5.10/include/keys/ |
D | trusted_tpm.h | 21 unsigned char secret[SHA1_DIGEST_SIZE]; member 78 pr_info("trusted-key: secret:\n"); in dump_sess() 80 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
/Linux-v5.10/net/ipv6/ |
D | seg6.c | 99 char *secret; in seg6_genl_sethmac() local 144 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac() 152 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac() 245 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
|
/Linux-v5.10/drivers/net/wireguard/ |
D | noise.c | 314 u8 secret[BLAKE2S_HASH_SIZE]; in kdf() local 324 /* Extract entropy from data into secret */ in kdf() 325 blake2s256_hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf() 330 /* Expand first key: key = secret, data = 0x1 */ in kdf() 332 blake2s256_hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf() 338 /* Expand second key: key = secret, data = first-key || 0x2 */ in kdf() 340 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf() 347 /* Expand third key: key = secret, data = second-key || 0x3 */ in kdf() 349 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf() 355 memzero_explicit(secret, BLAKE2S_HASH_SIZE); in kdf()
|
D | cookie.c | 24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init() 100 get_random_bytes(checker->secret, NOISE_HASH_LEN); in make_cookie() 106 blake2s_init_key(&state, COOKIE_LEN, checker->secret, NOISE_HASH_LEN); in make_cookie()
|
/Linux-v5.10/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | falcon.c | 141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit() 145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit() 153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit() 171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
|
/Linux-v5.10/Documentation/process/ |
D | maintainer-pgp-guide.rst | 187 is what you will have. You can verify by running ``gpg --list-secret-keys``, 263 $ gpg --export-secret-key [fpr] | paperkey -o /tmp/key-backup.txt 377 Now, if you issue the ``--list-secret-keys`` command, it will show that 380 $ gpg --list-secret-keys 394 secret keys are still stored in the legacy ``secring.gpg`` file used by 522 Secret subkeys are available. 588 If you perform ``--list-secret-keys`` now, you will see a subtle 591 $ gpg --list-secret-keys 599 available on the smartcard. If you go back into your secret keys 638 $ gpg --list-secret-keys [all …]
|
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | special-register-buffer-data-sampling.rst | 64 EGETKEY instructions to overwrite secret special register data in the shared 65 staging buffer before the secret data can be accessed by another logical 70 register read is complete and the secret data in the shared staging buffer is
|
/Linux-v5.10/Documentation/security/ |
D | siphash.rst | 13 SipHash takes a secret key filled with randomly generated numbers and either 75 key is kept secret, it is impossible for an attacker to guess the outputs of 101 u64 h = siphash(&combined, offsetofend(typeof(combined), dport), &secret);
|
/Linux-v5.10/Documentation/virt/kvm/ |
D | amd-memory-encryption.rst | 246 The KVM_SEV_LAUNCH_SECRET command can be used by the hypervisor to inject secret 259 … __u64 guest_uaddr; /* the guest memory region where the secret should be injected */ 262 __u64 trans_uaddr; /* the hypervisor memory region which contains the secret */
|
/Linux-v5.10/drivers/gpu/drm/nouveau/nvkm/falcon/ |
D | base.c | 31 if (secure && !falcon->secret) { in nvkm_falcon_load_imem() 153 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_oneinit()
|