Searched refs:secret (Results 1 - 66 of 66) sorted by relevance

/linux-4.1.27/net/core/
H A Dsecure_seq.c46 u32 secret[MD5_MESSAGE_BYTES / 4]; secure_tcpv6_sequence_number() local
53 secret[i] = net_secret[i] + (__force u32)daddr[i]; secure_tcpv6_sequence_number()
54 secret[4] = net_secret[4] + secure_tcpv6_sequence_number()
57 secret[i] = net_secret[i]; secure_tcpv6_sequence_number()
59 md5_transform(hash, secret); secure_tcpv6_sequence_number()
68 u32 secret[MD5_MESSAGE_BYTES / 4]; secure_ipv6_port_ephemeral() local
75 secret[i] = net_secret[i] + (__force u32) daddr[i]; secure_ipv6_port_ephemeral()
76 secret[4] = net_secret[4] + (__force u32)dport; secure_ipv6_port_ephemeral()
78 secret[i] = net_secret[i]; secure_ipv6_port_ephemeral()
80 md5_transform(hash, secret); secure_ipv6_port_ephemeral()
149 u32 secret[MD5_MESSAGE_BYTES / 4]; secure_dccpv6_sequence_number() local
157 secret[i] = net_secret[i] + daddr[i]; secure_dccpv6_sequence_number()
158 secret[4] = net_secret[4] + secure_dccpv6_sequence_number()
161 secret[i] = net_secret[i]; secure_dccpv6_sequence_number()
163 md5_transform(hash, secret); secure_dccpv6_sequence_number()
/linux-4.1.27/net/ceph/
H A Dcrypto.h8 * cryptographic secret
30 int ceph_decrypt(struct ceph_crypto_key *secret,
33 int ceph_encrypt(struct ceph_crypto_key *secret,
36 int ceph_decrypt2(struct ceph_crypto_key *secret,
40 int ceph_encrypt2(struct ceph_crypto_key *secret,
H A Dauth_x.h38 struct ceph_crypto_key secret; member in struct:ceph_x_info
H A Dcrypto.c427 int ceph_decrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, ceph_decrypt() argument
430 switch (secret->type) { ceph_decrypt()
439 return ceph_aes_decrypt(secret->key, secret->len, dst, ceph_decrypt()
447 int ceph_decrypt2(struct ceph_crypto_key *secret, ceph_decrypt2() argument
454 switch (secret->type) { ceph_decrypt2()
471 return ceph_aes_decrypt2(secret->key, secret->len, ceph_decrypt2()
480 int ceph_encrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, ceph_encrypt() argument
483 switch (secret->type) { ceph_encrypt()
492 return ceph_aes_encrypt(secret->key, secret->len, dst, ceph_encrypt()
500 int ceph_encrypt2(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, ceph_encrypt2() argument
504 switch (secret->type) { ceph_encrypt2()
514 return ceph_aes_encrypt2(secret->key, secret->len, dst, dst_len, ceph_encrypt2()
H A Dauth_x.c47 static int ceph_x_encrypt(struct ceph_crypto_key *secret, ceph_x_encrypt() argument
57 ret = ceph_encrypt2(secret, obuf + sizeof(u32), &len, ceph_x_encrypt()
65 static int ceph_x_decrypt(struct ceph_crypto_key *secret, ceph_x_decrypt() argument
84 ret = ceph_decrypt2(secret, &head, &head_len, *obuf, &olen, *p, len); ceph_x_decrypt()
138 struct ceph_crypto_key *secret, process_one_ticket()
177 dlen = ceph_x_decrypt(secret, p, end, &dbuf, 0); process_one_ticket()
255 struct ceph_crypto_key *secret, ceph_x_proc_ticket_reply()
271 ret = process_one_ticket(ac, secret, &p, end); ceph_x_proc_ticket_reply()
445 ret = ceph_x_encrypt(&xi->secret, &tmp, sizeof(tmp), ceph_x_build_request()
522 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, ceph_x_handle_reply()
590 dout("ceph_x_update_authorizer service %u secret %llu < %llu\n", ceph_x_update_authorizer()
648 ceph_crypto_key_destroy(&xi->secret); ceph_x_destroy()
758 pr_err("no secret set (for auth_x protocol)\n"); ceph_x_init()
762 ret = ceph_crypto_key_clone(&xi->secret, ac->key); ceph_x_init()
137 process_one_ticket(struct ceph_auth_client *ac, struct ceph_crypto_key *secret, void **p, void *end) process_one_ticket() argument
254 ceph_x_proc_ticket_reply(struct ceph_auth_client *ac, struct ceph_crypto_key *secret, void *buf, void *end) ceph_x_proc_ticket_reply() argument
H A Dceph_common.c254 {Opt_secret, "secret=%s"},
282 /* get secret from key store */ get_secret()
504 seq_puts(m, "secret=<hidden>,"); ceph_print_client_options()
/linux-4.1.27/include/crypto/
H A Dpublic_key.h63 MPI x; /* DSA secret exponent (if present) */
68 MPI d; /* RSA secret encryption exponent (if present) */
69 MPI p; /* RSA secret prime (if present) */
70 MPI q; /* RSA secret prime (if present) */
/linux-4.1.27/arch/mips/include/asm/sn/sn0/
H A Dhub.h12 /* The secret password; used to release protection */
/linux-4.1.27/security/keys/
H A Dtrusted.h29 unsigned char secret[SHA1_DIGEST_SIZE]; member in struct:osapsess
77 pr_info("trusted-key: secret:\n"); dump_sess()
79 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); dump_sess()
H A Dtrusted.c421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, osap()
489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); tpm_seal()
510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, tpm_seal()
518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, tpm_seal()
556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, tpm_seal()
/linux-4.1.27/drivers/gpu/drm/nouveau/include/nvkm/engine/
H A Dfalcon.h36 u8 secret; member in struct:nvkm_falcon
/linux-4.1.27/crypto/asymmetric_keys/
H A Dpublic_key.h24 u8 n_sec_mpi; /* Number of MPIs in secret key */
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/
H A Dfalcon.c88 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; _nvkm_falcon_init()
92 falcon->secret = (caps & 0x00000030) >> 4; _nvkm_falcon_init()
100 nv_debug(falcon, "secret level: %d\n", falcon->secret); _nvkm_falcon_init()
105 if (falcon->secret && falcon->version < 4) { _nvkm_falcon_init()
/linux-4.1.27/arch/mips/lib/
H A Dstrnlen_user.S25 * bytes. There's nothing secret there. On 64-bit accessing beyond
/linux-4.1.27/net/sctp/
H A Dauth.c262 struct sctp_auth_bytes *secret; sctp_auth_asoc_set_secret() local
270 secret = sctp_auth_create_key(auth_len, gfp); sctp_auth_asoc_set_secret()
271 if (!secret) sctp_auth_asoc_set_secret()
275 memcpy(secret->data, ep_key->key->data, ep_key->key->len); sctp_auth_asoc_set_secret()
279 memcpy(secret->data + offset, first_vector->data, first_vector->len); sctp_auth_asoc_set_secret()
282 memcpy(secret->data + offset, last_vector->data, last_vector->len); sctp_auth_asoc_set_secret()
284 return secret; sctp_auth_asoc_set_secret()
299 struct sctp_auth_bytes *secret = NULL; sctp_auth_asoc_create_secret() local
344 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, sctp_auth_asoc_create_secret()
350 return secret; sctp_auth_asoc_create_secret()
389 struct sctp_auth_bytes *secret; sctp_auth_asoc_init_active_key() local
401 * secret. sctp_auth_asoc_init_active_key()
407 secret = sctp_auth_asoc_create_secret(asoc, ep_key, gfp); sctp_auth_asoc_init_active_key()
408 if (!secret) sctp_auth_asoc_init_active_key()
412 asoc->asoc_shared_key = secret; sctp_auth_asoc_init_active_key()
H A Dendpointola.c146 /* Initialize the secret key used with cookie. */ sctp_endpoint_init()
H A Dsocket.c3458 * This option will set a shared secret key which is used to build an
3529 * This set option will delete a shared secret key from use.
/linux-4.1.27/drivers/staging/rtl8192e/
H A Drtllib_crypt_wep.c139 /* Copy rest of the WEP key (the secret part) */ prism2_wep_encrypt()
194 /* Copy rest of the WEP key (the secret part) */ prism2_wep_decrypt()
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_crypt_wep.c142 /* Copy rest of the WEP key (the secret part) */ prism2_wep_encrypt()
198 /* Copy rest of the WEP key (the secret part) */ prism2_wep_decrypt()
/linux-4.1.27/net/wireless/
H A Dlib80211_crypt_wep.c153 /* Copy rest of the WEP key (the secret part) */ lib80211_wep_encrypt()
202 /* Copy rest of the WEP key (the secret part) */ lib80211_wep_decrypt()
/linux-4.1.27/fs/ext3/
H A Dhash.c129 * The seed is an 4 longword (32 bits) "secret" which can be used to
/linux-4.1.27/fs/ext4/
H A Dhash.c130 * The seed is an 4 longword (32 bits) "secret" which can be used to
/linux-4.1.27/include/linux/ceph/
H A Dauth.h89 const struct ceph_crypto_key *key; /* our secret key */
/linux-4.1.27/crypto/
H A Dansi_cprng.c120 * Next xor I with our secret vector V _get_more_prng_bytes()
152 * and encrypt that to obtain a new secret vector V _get_more_prng_bytes()
/linux-4.1.27/net/mac80211/
H A Dwep.c181 /* Copy rest of the WEP key (the secret part) */ ieee80211_wep_encrypt()
256 /* Copy rest of the WEP key (the secret part) */ ieee80211_wep_decrypt()
/linux-4.1.27/drivers/net/ethernet/myricom/myri10ge/
H A Dmyri10ge_mcp.h260 /* get the offset of the secret key */
262 /* tell nic that the secret key's been updated */
/linux-4.1.27/drivers/scsi/
H A Discsi_boot_sysfs.c93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET);
96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
/linux-4.1.27/drivers/media/i2c/soc_camera/
H A Dmt9t112.c600 /* secret register by aptina */ mt9t112_init_setting()
607 /* secret register by aptina */ mt9t112_init_setting()
614 /* secret register by aptina */ mt9t112_init_setting()
621 /* secret register by aptina */ mt9t112_init_setting()
/linux-4.1.27/net/ipv6/
H A Dsyncookies.c76 * and overwrite the digest with the secret cookie_hash()
H A Daddrconf.c2917 struct in6_addr secret; ipv6_generate_stable_address() member in struct:__anon14125::__anon14126
2924 struct in6_addr secret; ipv6_generate_stable_address() local
2931 secret = idev->cnf.stable_secret.secret; ipv6_generate_stable_address()
2933 secret = net->ipv6.devconf_dflt->stable_secret.secret; ipv6_generate_stable_address()
2946 data.secret = secret; ipv6_generate_stable_address()
5260 struct ipv6_stable_secret *secret = ctl->data; addrconf_sysctl_stable_secret() local
5271 if (!write && !secret->initialized) { addrconf_sysctl_stable_secret()
5276 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); addrconf_sysctl_stable_secret()
5291 secret->initialized = true; addrconf_sysctl_stable_secret()
5292 secret->secret = addr; addrconf_sysctl_stable_secret()
H A Dreassembly.c618 /* secret interval has been deprecated */
/linux-4.1.27/include/linux/
H A Dipv6.h59 struct in6_addr secret; member in struct:ipv6_devconf::ipv6_stable_secret
H A Dskbuff.h54 * this. Apparently with the secret goal to sell you new devices, when you
/linux-4.1.27/drivers/scsi/qla4xxx/
H A Dql4_mbx.c1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); qla4xxx_get_chap()
1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); qla4xxx_set_chap()
1715 ql4_printk(KERN_ERR, ha, "No memory for username & secret\n"); qla4xxx_get_uni_chap_at_index()
1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); qla4xxx_get_uni_chap_at_index()
1757 * qla4xxx_get_chap_index - Get chap index given username and secret
1809 if (!strncmp(chap_table->secret, password, qla4xxx_get_chap_index()
H A Dql4_os.c756 strlcpy(chap_rec->password, chap_table->secret, qla4xxx_get_chap_list()
2854 chap_tbl.secret, qla4xxx_session_get_param()
2861 (char *)chap_tbl.secret, qla4xxx_session_get_param()
3848 chap_tbl.secret, qla4xxx_copy_fwddb_param()
3854 (char *)chap_tbl.secret, qla4xxx_copy_fwddb_param()
6027 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); qla4xxx_get_bidi_chap()
8031 chap_tbl.secret, qla4xxx_sysfs_ddb_get_param()
8042 chap_tbl.secret, qla4xxx_sysfs_ddb_get_param()
8044 rc = sprintf(buf, "%s\n", chap_tbl.secret); qla4xxx_sysfs_ddb_get_param()
8278 chap_tbl.secret, nla_for_each_attr()
H A Dql4_fw.h819 uint8_t secret[MAX_CHAP_SECRET_LEN]; member in struct:ql4_chap_table
/linux-4.1.27/net/bridge/
H A Dbr_multicast.c62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); __br_ip4_hash()
71 mdb->secret) & (mdb->max - 1); __br_ip6_hash()
326 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); br_mdb_rehash()
328 mdb->secret = old->secret; br_mdb_rehash()
H A Dbr_private.h136 u32 secret; member in struct:net_bridge_mdb_htable
/linux-4.1.27/drivers/mtd/maps/
H A Dpcmciamtd.c4 * Author: Simon Evans <spse@secret.org.uk>
64 MODULE_AUTHOR("Simon Evans <spse@secret.org.uk>");
/linux-4.1.27/drivers/usb/wusbcore/
H A Dcbaf.c36 * (connection context), with the CK being the secret, or connection
80 * handshake) challenge the device to demonstrate it has the CK secret
/linux-4.1.27/net/bluetooth/
H A Decc.c799 u8 secret[32]) ecdh_shared_secret()
813 ecc_native2bytes(product.x, secret); ecdh_shared_secret()
798 ecdh_shared_secret(const u8 public_key[64], const u8 private_key[32], u8 secret[32]) ecdh_shared_secret() argument
/linux-4.1.27/drivers/mtd/devices/
H A Dblock2mtd.c4 * Copyright (C) 2001,2002 Simon Evans <spse@secret.org.uk>
/linux-4.1.27/drivers/media/usb/gspca/
H A Dkonica.c9 * Copyright (C) 2002 Simon Evans <spse@secret.org.uk>
H A Dov519.c933 * 44[7:0] "It's a secret"
940 * 40[7:0] "It's a secret"
947 * 41[7:0] "It's a secret"
954 * 42[7:0] "It's a secret"
961 * 43[7:0] "It's a secret"
968 * 45[7:0] "It's a secret"
975 * 48[7:0] "It's a secret"
982 * 49[7:0] "It's a secret"
989 * 4B[7:0] "It's a secret"
996 * 4D[7:0] "It's a secret"
1015 * 3D[7:0] "It's a secret"
1022 * 3E[7:0] "It's a secret"
/linux-4.1.27/drivers/misc/
H A Dcs5535-mfgpt.c248 * whether or not this secret MSR can be used to release individual timers.
/linux-4.1.27/net/ipv4/
H A Dinet_fragment.c31 /* don't rebuild inetfrag table with new secret more often than this */
H A Dip_fragment.c733 /* secret interval has been deprecated */
H A Dsysctl_net_ipv4.c234 /* Generate a dummy secret but don't publish it. This proc_tcp_fastopen_key()
/linux-4.1.27/drivers/edac/
H A Di82875p_edac.c287 * http://www.x86-secret.com/articles/tweak/pat/patsecrets-2.htm i82875p_setup_overfl_dev()
/linux-4.1.27/net/ieee802154/6lowpan/
H A Dreassembly.c423 /* secret interval has been deprecated */
/linux-4.1.27/drivers/net/hyperv/
H A Dhyperv_net.h110 /* The size of the hash secret key */
113 /* The offset of the secret key from the beginning of this structure */
/linux-4.1.27/net/rxrpc/
H A Dar-key.c821 * Preparse a server secret key.
823 * The data should be the 8-byte secret key.
/linux-4.1.27/drivers/net/usb/
H A Dcatc.c11 * Old chipset support added by Simon Evans <spse@secret.org.uk> 2002
/linux-4.1.27/drivers/media/pci/dm1105/
H A Ddm1105.c98 /* Odd-even secret key select */
/linux-4.1.27/drivers/video/fbdev/matrox/
H A Dmatroxfb_DAC1064.c305 handles it, please reveal this secret to me... */ DAC1064_global_init()
/linux-4.1.27/include/uapi/linux/
H A Dsctp.h682 * This option will set a shared secret key which is used to build an
/linux-4.1.27/sound/pci/hda/
H A Dpatch_via.c873 * This isn't listed from the raw info, but the chip has a secret connection.
/linux-4.1.27/include/net/sctp/
H A Dstructs.h1213 /* Secret Key: A secret key used by this endpoint to compute
1828 * The current generated assocaition shared key (secret)
/linux-4.1.27/drivers/usb/storage/
H A Dsddr09.c1071 * signifying that the secret command to read an 128-bit ID is available.
/linux-4.1.27/drivers/block/drbd/
H A Ddrbd_receiver.c4902 char secret[SHARED_SECRET_MAX]; /* 64 byte */ drbd_do_auth() local
4914 memcpy(secret, nc->shared_secret, key_len); drbd_do_auth()
4920 rv = crypto_hash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); drbd_do_auth()
/linux-4.1.27/drivers/net/irda/
H A Dirda-usb.c727 * that we don't use. Here is the little secret...
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/
H A Dsec.c1619 /* note we don't clear the ares where old data live, not secret */ _sptlrpc_enlarge_msg_inplace()
/linux-4.1.27/fs/ecryptfs/
H A Dkeystore.c1864 * authentication token that has the secret component(s) ecryptfs_parse_packet_set()
/linux-4.1.27/drivers/pci/
H A Dquirks.c2198 * http://www.x86-secret.com/articles/tweak/pat/patsecrets-2.htm
/linux-4.1.27/drivers/scsi/lpfc/
H A Dlpfc_attr.c2158 * The "key" is not secret - it is a hardcoded string shown lpfc_soft_wwn_enable_store()
/linux-4.1.27/drivers/usb/core/
H A Dhub.c2045 * drivers/usb/wusbcore/devconnect.c. When we do the initial secret

Completed in 2670 milliseconds