/Linux-v5.15/include/crypto/ |
D | curve25519.h | 29 const u8 secret[CURVE25519_KEY_SIZE]); 35 const u8 secret[CURVE25519_KEY_SIZE], in curve25519() 39 curve25519_arch(mypublic, secret, basepoint); in curve25519() 41 curve25519_generic(mypublic, secret, basepoint); in curve25519() 48 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public() 50 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 55 curve25519_base_arch(pub, secret); in curve25519_generate_public() 57 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public() 61 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret() 63 secret[0] &= 248; in curve25519_clamp_secret() [all …]
|
/Linux-v5.15/crypto/ |
D | ecdh_helper.c | 37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local 48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key() 60 struct kpp_secret secret; in crypto_ecdh_decode_key() local 65 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key() 66 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key() 69 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key() 73 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
D | dh_helper.c | 44 struct kpp_secret secret = { in crypto_dh_encode_key() local 52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key() 71 struct kpp_secret secret; in crypto_dh_decode_key() local 76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key() 77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key() 84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
|
D | curve25519-generic.c | 12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 15 curve25519_generate_secret(secret); in curve25519_set_secret() 18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
|
D | testmgr.h | 164 const unsigned char *secret; member 1244 .secret = 1353 .secret = 1465 .secret = (u8[32]){ 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 1483 .secret = (u8[32]){ 0x5d, 0xab, 0x08, 0x7e, 0x62, 0x4a, 0x8a, 0x4b, 1501 .secret = (u8[32]){ 1 }, 1516 .secret = (u8[32]){ 1 }, 1531 .secret = (u8[32]){ 0xa5, 0x46, 0xe3, 0x6b, 0xf0, 0x52, 0x7c, 0x9d, 1549 .secret = (u8[32]){ 0xff, 0xff, 0xff, 0xff, 0x0a, 0xff, 0xff, 0xff, 1567 .secret = (u8[32]){ 0x8e, 0x0a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, [all …]
|
D | ecc.h | 117 u64 *secret);
|
/Linux-v5.15/fs/crypto/ |
D | keyring.c | 28 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument 30 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret() 31 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret() 334 static int add_new_master_key(struct fscrypt_master_key_secret *secret, in add_new_master_key() argument 349 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key() 393 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument 430 move_master_key_secret(&mk->mk_secret, secret); in add_existing_master_key() 435 struct fscrypt_master_key_secret *secret, in do_add_master_key() argument 453 err = add_new_master_key(secret, mk_spec, sb->s_master_keys); in do_add_master_key() 460 err = add_existing_master_key(key->payload.data[0], secret); in do_add_master_key() [all …]
|
/Linux-v5.15/arch/arm/crypto/ |
D | curve25519-glue.c | 23 const u8 secret[CURVE25519_KEY_SIZE], 43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch() 45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch() 52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 55 curve25519_generate_secret(secret); in curve25519_set_secret() 58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local 85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
|
/Linux-v5.15/net/sctp/ |
D | auth.c | 258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 267 if (!secret) in sctp_auth_asoc_set_secret() 271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 280 return secret; in sctp_auth_asoc_set_secret() 295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 346 return secret; in sctp_auth_asoc_create_secret() [all …]
|
/Linux-v5.15/arch/x86/crypto/ |
D | curve25519-x86_64.c | 1384 const u8 secret[CURVE25519_KEY_SIZE], in curve25519_arch() 1388 curve25519_ever64(mypublic, secret, basepoint); in curve25519_arch() 1390 curve25519_generic(mypublic, secret, basepoint); in curve25519_arch() 1395 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch() 1398 curve25519_ever64_base(pub, secret); in curve25519_base_arch() 1400 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_base_arch() 1407 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local 1410 curve25519_generate_secret(secret); in curve25519_set_secret() 1413 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret() 1422 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_generate_public_key() local [all …]
|
/Linux-v5.15/net/ceph/ |
D | auth_x.c | 57 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument 67 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt() 77 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument 84 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt() 97 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument 105 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt() 161 struct ceph_crypto_key *secret, in process_one_ticket() argument 197 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket() 271 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument 286 ret = process_one_ticket(ac, secret, p, end); in ceph_x_proc_ticket_reply() [all …]
|
D | auth_x.h | 41 struct ceph_crypto_key secret; member
|
/Linux-v5.15/net/bluetooth/ |
D | ecdh_helper.c | 61 u8 secret[32]) in compute_ecdh_secret() 85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret() 101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret() 102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
|
D | ecdh_helper.h | 27 u8 secret[32]);
|
/Linux-v5.15/security/keys/ |
D | dh.c | 241 uint8_t *secret; in __keyctl_dh_compute() local 306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute() 307 if (!secret) { in __keyctl_dh_compute() 311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute() 321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute() 402 kfree_sensitive(secret); in __keyctl_dh_compute()
|
/Linux-v5.15/net/ipv6/ |
D | seg6.c | 99 char *secret; in seg6_genl_sethmac() local 141 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac() 149 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac() 242 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
|
/Linux-v5.15/include/keys/ |
D | trusted_tpm.h | 23 unsigned char secret[SHA1_DIGEST_SIZE]; member 71 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
/Linux-v5.15/Documentation/security/keys/ |
D | ecryptfs.rst | 70 into the '/secret' directory:: 73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
|
/Linux-v5.15/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | falcon.c | 141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit() 145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit() 153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit() 171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
|
/Linux-v5.15/drivers/net/wireguard/ |
D | cookie.c | 24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init() 100 get_random_bytes(checker->secret, NOISE_HASH_LEN); in make_cookie() 106 blake2s_init_key(&state, COOKIE_LEN, checker->secret, NOISE_HASH_LEN); in make_cookie()
|
D | noise.c | 314 u8 secret[BLAKE2S_HASH_SIZE]; in kdf() local 325 blake2s256_hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf() 332 blake2s256_hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf() 340 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf() 349 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf() 355 memzero_explicit(secret, BLAKE2S_HASH_SIZE); in kdf()
|
D | cookie.h | 15 u8 secret[NOISE_HASH_LEN]; member
|
/Linux-v5.15/drivers/gpu/drm/nouveau/nvkm/falcon/ |
D | base.c | 31 if (secure && !falcon->secret) { in nvkm_falcon_load_imem() 151 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_oneinit()
|
/Linux-v5.15/include/net/ |
D | seg6_hmac.h | 30 char secret[SEG6_HMAC_SECRET_LEN]; member
|
/Linux-v5.15/Documentation/admin-guide/hw-vuln/ |
D | special-register-buffer-data-sampling.rst | 65 EGETKEY instructions to overwrite secret special register data in the shared 66 staging buffer before the secret data can be accessed by another logical 71 register read is complete and the secret data in the shared staging buffer is
|