/Linux-v4.19/crypto/ |
D | ecdh_helper.c | 41 struct kpp_secret secret = { in crypto_ecdh_encode_key() local 52 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key() 65 struct kpp_secret secret; in crypto_ecdh_decode_key() local 70 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key() 71 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key() 76 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
D | dh_helper.c | 48 struct kpp_secret secret = { in crypto_dh_encode_key() local 56 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key() 75 struct kpp_secret secret; in crypto_dh_decode_key() local 80 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key() 81 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key() 88 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
|
D | ecc.h | 93 u64 *secret);
|
/Linux-v4.19/net/sctp/ |
D | auth.c | 273 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 281 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 282 if (!secret) in sctp_auth_asoc_set_secret() 286 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 290 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 293 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 295 return secret; in sctp_auth_asoc_set_secret() 310 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 355 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 361 return secret; in sctp_auth_asoc_create_secret() [all …]
|
/Linux-v4.19/net/bluetooth/ |
D | ecdh_helper.c | 61 u8 secret[32]) in compute_ecdh_secret() 85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret() 101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret() 102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
|
D | ecdh_helper.h | 27 u8 secret[32]);
|
/Linux-v4.19/security/keys/ |
D | dh.c | 246 uint8_t *secret; in __keyctl_dh_compute() local 311 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute() 312 if (!secret) { in __keyctl_dh_compute() 316 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute() 326 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute() 407 kzfree(secret); in __keyctl_dh_compute()
|
D | trusted.h | 29 unsigned char secret[SHA1_DIGEST_SIZE]; member 69 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
D | trusted.c | 421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap() 489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal() 510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
|
/Linux-v4.19/net/ceph/ |
D | auth_x.c | 54 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument 64 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt() 74 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument 81 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt() 94 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument 102 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt() 158 struct ceph_crypto_key *secret, in process_one_ticket() argument 194 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket() 267 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument 283 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply() [all …]
|
D | auth_x.h | 41 struct ceph_crypto_key secret; member
|
/Linux-v4.19/net/ipv6/ |
D | seg6.c | 94 char *secret; in seg6_genl_sethmac() local 139 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac() 147 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac() 242 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
|
D | addrconf.c | 3171 struct in6_addr secret; in ipv6_generate_stable_address() member 3178 struct in6_addr secret; in ipv6_generate_stable_address() local 3185 secret = idev->cnf.stable_secret.secret; in ipv6_generate_stable_address() 3187 secret = net->ipv6.devconf_dflt->stable_secret.secret; in ipv6_generate_stable_address() 3200 data.secret = secret; in ipv6_generate_stable_address() 3229 get_random_bytes(&s->secret, sizeof(s->secret)); in ipv6_gen_mode_random_init() 5962 struct ipv6_stable_secret *secret = ctl->data; in addrconf_sysctl_stable_secret() local 5973 if (!write && !secret->initialized) { in addrconf_sysctl_stable_secret() 5978 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); in addrconf_sysctl_stable_secret() 5993 secret->initialized = true; in addrconf_sysctl_stable_secret() [all …]
|
/Linux-v4.19/Documentation/security/keys/ |
D | ecryptfs.rst | 70 into the '/secret' directory:: 73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
|
/Linux-v4.19/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | falcon.c | 138 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit() 142 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit() 150 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit() 168 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
|
/Linux-v4.19/drivers/gpu/drm/nouveau/nvkm/falcon/ |
D | base.c | 30 if (secure && !falcon->secret) { in nvkm_falcon_load_imem() 185 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_ctor()
|
/Linux-v4.19/include/net/ |
D | seg6_hmac.h | 35 char secret[SEG6_HMAC_SECRET_LEN]; member
|
/Linux-v4.19/Documentation/ |
D | siphash.txt | 13 SipHash takes a secret key filled with randomly generated numbers and either 75 key is kept secret, it is impossible for an attacker to guess the outputs of 101 u64 h = siphash(&combined, offsetofend(typeof(combined), dport), &secret);
|
D | speculation.txt | 16 observed to extract secret information.
|
/Linux-v4.19/Documentation/virtual/kvm/ |
D | amd-memory-encryption.rst | 221 The KVM_SEV_LAUNCH_SECRET command can be used by the hypervisor to inject secret 234 … __u64 guest_uaddr; /* the guest memory region where the secret should be injected */ 237 __u64 trans_uaddr; /* the hypervisor memory region which contains the secret */
|
/Linux-v4.19/drivers/gpu/drm/nouveau/include/nvkm/engine/ |
D | falcon.h | 29 u8 secret; member
|
/Linux-v4.19/Documentation/process/ |
D | maintainer-pgp-guide.rst | 187 is what you will have. You can verify by running ``gpg --list-secret-keys``, 260 $ gpg --export-secret-key [fpr] | paperkey -o /tmp/key-backup.txt 374 Now, if you issue the ``--list-secret-keys`` command, it will show that 377 $ gpg --list-secret-keys 391 secret keys are still stored in the legacy ``secring.gpg`` file used by 585 If you perform ``--list-secret-keys`` now, you will see a subtle 588 $ gpg --list-secret-keys 596 available on the smartcard. If you go back into your secret keys 635 $ gpg --list-secret-keys 711 If you only have one secret key in your keyring, then you don't really [all …]
|
/Linux-v4.19/Documentation/filesystems/ |
D | ecryptfs.txt | 72 development, since secret values will be written out to the system log
|
/Linux-v4.19/drivers/scsi/ |
D | iscsi_boot_sysfs.c | 93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET); 96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
|
/Linux-v4.19/include/linux/ |
D | ipv6.h | 65 struct in6_addr secret; member
|