Home
last modified time | relevance | path

Searched full:secret (Results 1 – 25 of 163) sorted by relevance

1234567

/Linux-v5.15/include/crypto/
Dcurve25519.h29 const u8 secret[CURVE25519_KEY_SIZE]);
35 const u8 secret[CURVE25519_KEY_SIZE], in curve25519()
39 curve25519_arch(mypublic, secret, basepoint); in curve25519()
41 curve25519_generic(mypublic, secret, basepoint); in curve25519()
48 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public()
50 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public()
55 curve25519_base_arch(pub, secret); in curve25519_generate_public()
57 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public()
61 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret()
63 secret[0] &= 248; in curve25519_clamp_secret()
[all …]
Dkpp.h50 * store the secret private key along with parameters.
56 * @compute_shared_secret: Function compute the shared secret as defined by
257 * struct kpp_secret - small header for packing secret buffer
259 * @type: define type of secret. Each kpp type will define its own
260 * @len: specify the len of the secret, include the header, that
325 * Function invokes the specific kpp operation for computing the shared secret
/Linux-v5.15/fs/crypto/
Dkeyring.c28 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument
30 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
31 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
84 seq_puts(m, ": secret removed"); in fscrypt_key_describe()
330 * Allocate a new fscrypt_master_key which contains the given secret, set it as
334 static int add_new_master_key(struct fscrypt_master_key_secret *secret, in add_new_master_key() argument
349 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key()
351 refcount_set(&mk->mk_refcount, 1); /* secret is present */ in add_new_master_key()
393 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument
428 /* Re-add the secret if needed. */ in add_existing_master_key()
[all …]
Dfscrypt_private.h406 * fscrypt_master_key_secret - secret key material of an in-use master key
434 * The secret key material. After FS_IOC_REMOVE_ENCRYPTION_KEY is
439 * FS_IOC_ADD_ENCRYPTION_KEY can add the secret again.
500 is_master_key_secret_present(const struct fscrypt_master_key_secret *secret) in is_master_key_secret_present() argument
505 * take the key semaphore and thus 'secret' can change concurrently in is_master_key_secret_present()
507 * secret *was* present at the time of check, so READ_ONCE() suffices. in is_master_key_secret_present()
509 return READ_ONCE(secret->size) != 0; in is_master_key_secret_present()
/Linux-v5.15/crypto/
Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
60 struct kpp_secret secret; in crypto_ecdh_decode_key() local
65 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
66 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
69 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key()
73 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
71 struct kpp_secret secret; in crypto_dh_decode_key() local
76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key()
77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key()
84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
Dcurve25519-generic.c12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
15 curve25519_generate_secret(secret); in curve25519_set_secret()
18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
Decc.h101 * crypto_ecdh_shared_secret() - Compute a shared secret
107 * @secret: buffer for storing the calculated shared secret
112 * Returns 0 if the shared secret was generated successfully, a negative value
117 u64 *secret);
/Linux-v5.15/arch/arm/crypto/
Dcurve25519-glue.c23 const u8 secret[CURVE25519_KEY_SIZE],
43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch()
52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
55 curve25519_generate_secret(secret); in curve25519_set_secret()
58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
/Linux-v5.15/net/ceph/
Dauth_x.c57 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument
67 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt()
77 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument
84 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt()
97 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument
105 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt()
161 struct ceph_crypto_key *secret, in process_one_ticket() argument
197 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket()
271 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
286 ret = process_one_ticket(ac, secret, p, end); in ceph_x_proc_ticket_reply()
[all …]
Dauth_x.h41 struct ceph_crypto_key secret; member
Dcrypto.h12 * cryptographic secret
/Linux-v5.15/net/bluetooth/
Decdh_helper.c56 * secret: memory where the ecdh computed shared secret will be saved.
61 u8 secret[32]) in compute_ecdh_secret()
85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret()
96 pr_err("alg: ecdh: compute shared secret failed. err %d\n", in compute_ecdh_secret()
101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret()
102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
/Linux-v5.15/security/keys/
Ddh.c137 * The src pointer is defined as Z || other info where Z is the shared secret
241 uint8_t *secret; in __keyctl_dh_compute() local
306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute()
307 if (!secret) { in __keyctl_dh_compute()
311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute()
321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute()
377 * Concatenate SP800-56A otherinfo past DH shared secret -- the in __keyctl_dh_compute()
378 * input to the KDF is (DH shared secret || otherinfo) in __keyctl_dh_compute()
402 kfree_sensitive(secret); in __keyctl_dh_compute()
/Linux-v5.15/net/sctp/
Dauth.c258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
267 if (!secret) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
280 return secret; in sctp_auth_asoc_set_secret()
295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
346 return secret; in sctp_auth_asoc_create_secret()
[all …]
/Linux-v5.15/include/keys/
Dtrusted_tpm.h23 unsigned char secret[SHA1_DIGEST_SIZE]; member
69 pr_info("secret:\n"); in dump_sess()
71 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
/Linux-v5.15/Documentation/security/keys/
Decryptfs.rst70 into the '/secret' directory::
73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
/Linux-v5.15/net/ipv6/
Dseg6.c99 char *secret; in seg6_genl_sethmac() local
141 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac()
149 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac()
242 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
/Linux-v5.15/drivers/net/wireguard/
Dnoise.c314 u8 secret[BLAKE2S_HASH_SIZE]; in kdf() local
324 /* Extract entropy from data into secret */ in kdf()
325 blake2s256_hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
330 /* Expand first key: key = secret, data = 0x1 */ in kdf()
332 blake2s256_hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
338 /* Expand second key: key = secret, data = first-key || 0x2 */ in kdf()
340 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf()
347 /* Expand third key: key = secret, data = second-key || 0x3 */ in kdf()
349 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf()
355 memzero_explicit(secret, BLAKE2S_HASH_SIZE); in kdf()
Dcookie.c24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init()
100 get_random_bytes(checker->secret, NOISE_HASH_LEN); in make_cookie()
106 blake2s_init_key(&state, COOKIE_LEN, checker->secret, NOISE_HASH_LEN); in make_cookie()
/Linux-v5.15/drivers/gpu/drm/nouveau/nvkm/engine/
Dfalcon.c141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit()
145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit()
153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit()
171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
/Linux-v5.15/Documentation/process/
Dmaintainer-pgp-guide.rst187 is what you will have. You can verify by running ``gpg --list-secret-keys``,
263 $ gpg --export-secret-key [fpr] | paperkey -o /tmp/key-backup.txt
377 Now, if you issue the ``--list-secret-keys`` command, it will show that
380 $ gpg --list-secret-keys
394 secret keys are still stored in the legacy ``secring.gpg`` file used by
522 Secret subkeys are available.
588 If you perform ``--list-secret-keys`` now, you will see a subtle
591 $ gpg --list-secret-keys
599 available on the smartcard. If you go back into your secret keys
638 $ gpg --list-secret-keys
[all …]
/Linux-v5.15/Documentation/admin-guide/hw-vuln/
Dspecial-register-buffer-data-sampling.rst65 EGETKEY instructions to overwrite secret special register data in the shared
66 staging buffer before the secret data can be accessed by another logical
71 register read is complete and the secret data in the shared staging buffer is
/Linux-v5.15/Documentation/security/
Dsiphash.rst13 SipHash takes a secret key filled with randomly generated numbers and either
75 key is kept secret, it is impossible for an attacker to guess the outputs of
101 u64 h = siphash(&combined, offsetofend(typeof(combined), dport), &secret);
/Linux-v5.15/drivers/gpu/drm/nouveau/nvkm/falcon/
Dbase.c31 if (secure && !falcon->secret) { in nvkm_falcon_load_imem()
151 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_oneinit()

1234567