/Linux-v5.4/crypto/ |
D | ecdh_helper.c | 37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local 48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key() 61 struct kpp_secret secret; in crypto_ecdh_decode_key() local 66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key() 67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key() 72 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
D | dh_helper.c | 44 struct kpp_secret secret = { in crypto_dh_encode_key() local 52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key() 71 struct kpp_secret secret; in crypto_dh_decode_key() local 76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key() 77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key() 84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
|
D | ecc.h | 131 u64 *secret);
|
/Linux-v5.4/fs/crypto/ |
D | keyring.c | 27 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument 29 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret() 30 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret() 321 static int add_new_master_key(struct fscrypt_master_key_secret *secret, in add_new_master_key() argument 336 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key() 381 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument 419 move_master_key_secret(&mk->mk_secret, secret); in add_existing_master_key() 426 struct fscrypt_master_key_secret *secret, in add_master_key() argument 444 err = add_new_master_key(secret, mk_spec, sb->s_master_keys); in add_master_key() 451 err = add_existing_master_key(key->payload.data[0], secret); in add_master_key() [all …]
|
D | fscrypt_private.h | 395 is_master_key_secret_present(const struct fscrypt_master_key_secret *secret) in is_master_key_secret_present() argument 404 return READ_ONCE(secret->size) != 0; in is_master_key_secret_present()
|
/Linux-v5.4/net/sctp/ |
D | auth.c | 258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 267 if (!secret) in sctp_auth_asoc_set_secret() 271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 280 return secret; in sctp_auth_asoc_set_secret() 295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 346 return secret; in sctp_auth_asoc_create_secret() [all …]
|
/Linux-v5.4/net/bluetooth/ |
D | ecdh_helper.c | 61 u8 secret[32]) in compute_ecdh_secret() 85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret() 101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret() 102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
|
D | ecdh_helper.h | 27 u8 secret[32]);
|
/Linux-v5.4/security/keys/ |
D | dh.c | 241 uint8_t *secret; in __keyctl_dh_compute() local 306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute() 307 if (!secret) { in __keyctl_dh_compute() 311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute() 321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute() 402 kzfree(secret); in __keyctl_dh_compute()
|
D | trusted.c | 426 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap() 498 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal() 519 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 527 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 565 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
|
/Linux-v5.4/net/ceph/ |
D | auth_x.c | 54 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument 64 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt() 74 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument 81 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt() 94 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument 102 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt() 158 struct ceph_crypto_key *secret, in process_one_ticket() argument 194 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket() 267 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument 283 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply() [all …]
|
D | auth_x.h | 41 struct ceph_crypto_key secret; member
|
/Linux-v5.4/net/ipv6/ |
D | seg6.c | 89 char *secret; in seg6_genl_sethmac() local 134 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac() 142 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac() 235 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
|
/Linux-v5.4/Documentation/security/keys/ |
D | ecryptfs.rst | 70 into the '/secret' directory:: 73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
|
/Linux-v5.4/include/keys/ |
D | trusted.h | 29 unsigned char secret[SHA1_DIGEST_SIZE]; member 81 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
/Linux-v5.4/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | falcon.c | 141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit() 145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit() 153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit() 171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
|
/Linux-v5.4/drivers/gpu/drm/nouveau/nvkm/falcon/ |
D | base.c | 30 if (secure && !falcon->secret) { in nvkm_falcon_load_imem() 185 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_ctor()
|
/Linux-v5.4/include/net/ |
D | seg6_hmac.h | 30 char secret[SEG6_HMAC_SECRET_LEN]; member
|
/Linux-v5.4/Documentation/security/ |
D | siphash.rst | 13 SipHash takes a secret key filled with randomly generated numbers and either 75 key is kept secret, it is impossible for an attacker to guess the outputs of 101 u64 h = siphash(&combined, offsetofend(typeof(combined), dport), &secret);
|
/Linux-v5.4/Documentation/virt/kvm/ |
D | amd-memory-encryption.rst | 221 The KVM_SEV_LAUNCH_SECRET command can be used by the hypervisor to inject secret 234 … __u64 guest_uaddr; /* the guest memory region where the secret should be injected */ 237 __u64 trans_uaddr; /* the hypervisor memory region which contains the secret */
|
/Linux-v5.4/drivers/gpu/drm/nouveau/include/nvkm/engine/ |
D | falcon.h | 29 u8 secret; member
|
/Linux-v5.4/Documentation/process/ |
D | maintainer-pgp-guide.rst | 187 is what you will have. You can verify by running ``gpg --list-secret-keys``, 263 $ gpg --export-secret-key [fpr] | paperkey -o /tmp/key-backup.txt 377 Now, if you issue the ``--list-secret-keys`` command, it will show that 380 $ gpg --list-secret-keys 394 secret keys are still stored in the legacy ``secring.gpg`` file used by 588 If you perform ``--list-secret-keys`` now, you will see a subtle 591 $ gpg --list-secret-keys 599 available on the smartcard. If you go back into your secret keys 638 $ gpg --list-secret-keys 714 If you only have one secret key in your keyring, then you don't really [all …]
|
/Linux-v5.4/Documentation/filesystems/ |
D | ecryptfs.txt | 72 development, since secret values will be written out to the system log
|
/Linux-v5.4/drivers/scsi/ |
D | iscsi_boot_sysfs.c | 85 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET); 88 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
|
/Linux-v5.4/Documentation/ |
D | speculation.txt | 16 observed to extract secret information.
|