Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 57) sorted by relevance

123

/linux/include/crypto/
A Dcurve25519.h29 const u8 secret[CURVE25519_KEY_SIZE]);
35 const u8 secret[CURVE25519_KEY_SIZE], in curve25519()
39 curve25519_arch(mypublic, secret, basepoint); in curve25519()
41 curve25519_generic(mypublic, secret, basepoint); in curve25519()
48 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public()
55 curve25519_base_arch(pub, secret); in curve25519_generate_public()
57 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public()
63 secret[0] &= 248; in curve25519_clamp_secret()
64 secret[31] = (secret[31] & 127) | 64; in curve25519_clamp_secret()
69 get_random_bytes_wait(secret, CURVE25519_KEY_SIZE); in curve25519_generate_secret()
[all …]
/linux/fs/crypto/
A Dkeyring.c30 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
31 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
482 err = fscrypt_init_hkdf(&secret->hkdf, secret->raw, in add_master_key()
483 secret->size); in add_master_key()
491 memzero_explicit(secret->raw, secret->size); in add_master_key()
596 memcpy(secret->raw, payload->raw, secret->size); in get_keyring_key()
657 memset(&secret, 0, sizeof(secret)); in fscrypt_ioctl_add_key()
668 secret.size = arg.raw_size; in fscrypt_ioctl_add_key()
670 if (copy_from_user(secret.raw, uarg->raw, secret.size)) in fscrypt_ioctl_add_key()
686 wipe_master_key_secret(&secret); in fscrypt_ioctl_add_key()
[all …]
/linux/crypto/
A Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
60 struct kpp_secret secret; in crypto_ecdh_decode_key() local
65 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
66 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
69 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key()
73 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
A Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
71 struct kpp_secret secret; in crypto_dh_decode_key() local
76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key()
77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key()
84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
A Dcurve25519-generic.c12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
15 curve25519_generate_secret(secret); in curve25519_set_secret()
18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
A Dtestmgr.h164 const unsigned char *secret; member
1244 .secret =
1353 .secret =
1465 .secret = (u8[32]){ 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d,
1483 .secret = (u8[32]){ 0x5d, 0xab, 0x08, 0x7e, 0x62, 0x4a, 0x8a, 0x4b,
1501 .secret = (u8[32]){ 1 },
1516 .secret = (u8[32]){ 1 },
2690 .secret =
2730 .secret =
2772 .secret =
[all …]
/linux/arch/arm/crypto/
A Dcurve25519-glue.c23 const u8 secret[CURVE25519_KEY_SIZE],
43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch()
52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
55 curve25519_generate_secret(secret); in curve25519_set_secret()
58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
/linux/net/sctp/
A Dauth.c258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
267 if (!secret) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
280 return secret; in sctp_auth_asoc_set_secret()
295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
346 return secret; in sctp_auth_asoc_create_secret()
385 struct sctp_auth_bytes *secret; in sctp_auth_asoc_init_active_key() local
403 secret = sctp_auth_asoc_create_secret(asoc, ep_key, gfp); in sctp_auth_asoc_init_active_key()
404 if (!secret) in sctp_auth_asoc_init_active_key()
[all …]
/linux/arch/x86/crypto/
A Dcurve25519-x86_64.c1384 const u8 secret[CURVE25519_KEY_SIZE], in curve25519_arch()
1388 curve25519_ever64(mypublic, secret, basepoint); in curve25519_arch()
1395 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
1398 curve25519_ever64_base(pub, secret); in curve25519_base_arch()
1407 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
1410 curve25519_generate_secret(secret); in curve25519_set_secret()
1413 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
1422 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_generate_public_key() local
1429 curve25519_base_arch(buf, secret); in curve25519_generate_public_key()
1444 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_shared_secret() local
[all …]
/linux/net/ceph/
A Dauth_x.c57 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument
105 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt()
161 struct ceph_crypto_key *secret, in process_one_ticket() argument
197 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket()
271 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
286 ret = process_one_ticket(ac, secret, p, end); in ceph_x_proc_ticket_reply()
612 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, p, end); in handle_auth_session_key()
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
853 ret = ceph_x_decrypt(secret, p, end); in decrypt_authorizer_reply()
919 ceph_crypto_key_destroy(&xi->secret); in ceph_x_destroy()
[all …]
A Dauth_x.h41 struct ceph_crypto_key secret; member
/linux/net/bluetooth/
A Decdh_helper.c61 u8 secret[32]) in compute_ecdh_secret()
85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret()
101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret()
102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
A Decdh_helper.h27 u8 secret[32]);
/linux/security/keys/
A Ddh.c241 uint8_t *secret; in __keyctl_dh_compute() local
306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute()
307 if (!secret) { in __keyctl_dh_compute()
311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute()
321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute()
402 kfree_sensitive(secret); in __keyctl_dh_compute()
/linux/net/ipv6/
A Dseg6.c158 char *secret; in seg6_genl_sethmac() local
200 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac()
208 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac()
301 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
/linux/include/keys/
A Dtrusted_tpm.h23 unsigned char secret[SHA1_DIGEST_SIZE]; member
71 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
/linux/Documentation/security/keys/
A Decryptfs.rst70 into the '/secret' directory::
73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
/linux/drivers/gpu/drm/nouveau/nvkm/engine/
A Dfalcon.c141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit()
145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit()
153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit()
171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
/linux/drivers/net/wireguard/
A Dcookie.c24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init()
100 get_random_bytes(checker->secret, NOISE_HASH_LEN); in make_cookie()
106 blake2s_init_key(&state, COOKIE_LEN, checker->secret, NOISE_HASH_LEN); in make_cookie()
A Dnoise.c314 u8 secret[BLAKE2S_HASH_SIZE]; in kdf() local
325 blake2s256_hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
332 blake2s256_hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
340 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf()
349 blake2s256_hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, in kdf()
355 memzero_explicit(secret, BLAKE2S_HASH_SIZE); in kdf()
A Dcookie.h15 u8 secret[NOISE_HASH_LEN]; member
/linux/drivers/gpu/drm/nouveau/nvkm/falcon/
A Dbase.c31 if (secure && !falcon->secret) { in nvkm_falcon_load_imem()
151 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_oneinit()
/linux/Documentation/admin-guide/hw-vuln/
A Dspecial-register-buffer-data-sampling.rst65 EGETKEY instructions to overwrite secret special register data in the shared
66 staging buffer before the secret data can be accessed by another logical
71 register read is complete and the secret data in the shared staging buffer is
/linux/include/net/
A Dseg6_hmac.h30 char secret[SEG6_HMAC_SECRET_LEN]; member
/linux/Documentation/security/
A Dsiphash.rst13 SipHash takes a secret key filled with randomly generated numbers and either
75 key is kept secret, it is impossible for an attacker to guess the outputs of
101 u64 h = siphash(&combined, offsetofend(typeof(combined), dport), &secret);

Completed in 68 milliseconds

123