Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 46) sorted by relevance

12

/Linux-v5.4/crypto/
Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
61 struct kpp_secret secret; in crypto_ecdh_decode_key() local
66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
72 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
71 struct kpp_secret secret; in crypto_dh_decode_key() local
76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key()
77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key()
84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
Decc.h131 u64 *secret);
/Linux-v5.4/fs/crypto/
Dkeyring.c27 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument
29 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
30 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
321 static int add_new_master_key(struct fscrypt_master_key_secret *secret, in add_new_master_key() argument
336 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key()
381 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument
419 move_master_key_secret(&mk->mk_secret, secret); in add_existing_master_key()
426 struct fscrypt_master_key_secret *secret, in add_master_key() argument
444 err = add_new_master_key(secret, mk_spec, sb->s_master_keys); in add_master_key()
451 err = add_existing_master_key(key->payload.data[0], secret); in add_master_key()
[all …]
Dfscrypt_private.h395 is_master_key_secret_present(const struct fscrypt_master_key_secret *secret) in is_master_key_secret_present() argument
404 return READ_ONCE(secret->size) != 0; in is_master_key_secret_present()
/Linux-v5.4/net/sctp/
Dauth.c258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
267 if (!secret) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
280 return secret; in sctp_auth_asoc_set_secret()
295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
346 return secret; in sctp_auth_asoc_create_secret()
[all …]
/Linux-v5.4/net/bluetooth/
Decdh_helper.c61 u8 secret[32]) in compute_ecdh_secret()
85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret()
101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret()
102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
Decdh_helper.h27 u8 secret[32]);
/Linux-v5.4/security/keys/
Ddh.c241 uint8_t *secret; in __keyctl_dh_compute() local
306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute()
307 if (!secret) { in __keyctl_dh_compute()
311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute()
321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute()
402 kzfree(secret); in __keyctl_dh_compute()
Dtrusted.c426 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap()
498 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal()
519 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal()
527 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal()
565 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
/Linux-v5.4/net/ceph/
Dauth_x.c54 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument
64 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt()
74 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument
81 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt()
94 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument
102 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt()
158 struct ceph_crypto_key *secret, in process_one_ticket() argument
194 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket()
267 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
283 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply()
[all …]
Dauth_x.h41 struct ceph_crypto_key secret; member
/Linux-v5.4/net/ipv6/
Dseg6.c89 char *secret; in seg6_genl_sethmac() local
134 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac()
142 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac()
235 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
/Linux-v5.4/Documentation/security/keys/
Decryptfs.rst70 into the '/secret' directory::
73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
/Linux-v5.4/include/keys/
Dtrusted.h29 unsigned char secret[SHA1_DIGEST_SIZE]; member
81 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
/Linux-v5.4/drivers/gpu/drm/nouveau/nvkm/engine/
Dfalcon.c141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit()
145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit()
153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit()
171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
/Linux-v5.4/drivers/gpu/drm/nouveau/nvkm/falcon/
Dbase.c30 if (secure && !falcon->secret) { in nvkm_falcon_load_imem()
185 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_ctor()
/Linux-v5.4/include/net/
Dseg6_hmac.h30 char secret[SEG6_HMAC_SECRET_LEN]; member
/Linux-v5.4/Documentation/security/
Dsiphash.rst13 SipHash takes a secret key filled with randomly generated numbers and either
75 key is kept secret, it is impossible for an attacker to guess the outputs of
101 u64 h = siphash(&combined, offsetofend(typeof(combined), dport), &secret);
/Linux-v5.4/Documentation/virt/kvm/
Damd-memory-encryption.rst221 The KVM_SEV_LAUNCH_SECRET command can be used by the hypervisor to inject secret
234 … __u64 guest_uaddr; /* the guest memory region where the secret should be injected */
237 __u64 trans_uaddr; /* the hypervisor memory region which contains the secret */
/Linux-v5.4/drivers/gpu/drm/nouveau/include/nvkm/engine/
Dfalcon.h29 u8 secret; member
/Linux-v5.4/Documentation/process/
Dmaintainer-pgp-guide.rst187 is what you will have. You can verify by running ``gpg --list-secret-keys``,
263 $ gpg --export-secret-key [fpr] | paperkey -o /tmp/key-backup.txt
377 Now, if you issue the ``--list-secret-keys`` command, it will show that
380 $ gpg --list-secret-keys
394 secret keys are still stored in the legacy ``secring.gpg`` file used by
588 If you perform ``--list-secret-keys`` now, you will see a subtle
591 $ gpg --list-secret-keys
599 available on the smartcard. If you go back into your secret keys
638 $ gpg --list-secret-keys
714 If you only have one secret key in your keyring, then you don't really
[all …]
/Linux-v5.4/Documentation/filesystems/
Decryptfs.txt72 development, since secret values will be written out to the system log
/Linux-v5.4/drivers/scsi/
Discsi_boot_sysfs.c85 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET);
88 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
/Linux-v5.4/Documentation/
Dspeculation.txt16 observed to extract secret information.

12