/linux-4.1.27/net/core/ |
D | secure_seq.c | 46 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_tcpv6_sequence_number() local 53 secret[i] = net_secret[i] + (__force u32)daddr[i]; in secure_tcpv6_sequence_number() 54 secret[4] = net_secret[4] + in secure_tcpv6_sequence_number() 57 secret[i] = net_secret[i]; in secure_tcpv6_sequence_number() 59 md5_transform(hash, secret); in secure_tcpv6_sequence_number() 68 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_ipv6_port_ephemeral() local 75 secret[i] = net_secret[i] + (__force u32) daddr[i]; in secure_ipv6_port_ephemeral() 76 secret[4] = net_secret[4] + (__force u32)dport; in secure_ipv6_port_ephemeral() 78 secret[i] = net_secret[i]; in secure_ipv6_port_ephemeral() 80 md5_transform(hash, secret); in secure_ipv6_port_ephemeral() [all …]
|
/linux-4.1.27/net/ceph/ |
D | crypto.c | 427 int ceph_decrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_decrypt() argument 430 switch (secret->type) { in ceph_decrypt() 439 return ceph_aes_decrypt(secret->key, secret->len, dst, in ceph_decrypt() 447 int ceph_decrypt2(struct ceph_crypto_key *secret, in ceph_decrypt2() argument 454 switch (secret->type) { in ceph_decrypt2() 471 return ceph_aes_decrypt2(secret->key, secret->len, in ceph_decrypt2() 480 int ceph_encrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt() argument 483 switch (secret->type) { in ceph_encrypt() 492 return ceph_aes_encrypt(secret->key, secret->len, dst, in ceph_encrypt() 500 int ceph_encrypt2(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt2() argument [all …]
|
D | crypto.h | 30 int ceph_decrypt(struct ceph_crypto_key *secret, 33 int ceph_encrypt(struct ceph_crypto_key *secret, 36 int ceph_decrypt2(struct ceph_crypto_key *secret, 40 int ceph_encrypt2(struct ceph_crypto_key *secret,
|
D | auth_x.c | 47 static int ceph_x_encrypt(struct ceph_crypto_key *secret, in ceph_x_encrypt() argument 57 ret = ceph_encrypt2(secret, obuf + sizeof(u32), &len, in ceph_x_encrypt() 65 static int ceph_x_decrypt(struct ceph_crypto_key *secret, in ceph_x_decrypt() argument 84 ret = ceph_decrypt2(secret, &head, &head_len, *obuf, &olen, *p, len); in ceph_x_decrypt() 138 struct ceph_crypto_key *secret, in process_one_ticket() argument 177 dlen = ceph_x_decrypt(secret, p, end, &dbuf, 0); in process_one_ticket() 255 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument 271 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply() 445 ret = ceph_x_encrypt(&xi->secret, &tmp, sizeof(tmp), in ceph_x_build_request() 522 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, in ceph_x_handle_reply() [all …]
|
D | auth_x.h | 38 struct ceph_crypto_key secret; member
|
/linux-4.1.27/net/sctp/ |
D | auth.c | 262 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 270 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 271 if (!secret) in sctp_auth_asoc_set_secret() 275 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 279 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 282 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 284 return secret; in sctp_auth_asoc_set_secret() 299 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 344 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 350 return secret; in sctp_auth_asoc_create_secret() [all …]
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | falcon.c | 88 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in _nvkm_falcon_init() 92 falcon->secret = (caps & 0x00000030) >> 4; in _nvkm_falcon_init() 100 nv_debug(falcon, "secret level: %d\n", falcon->secret); in _nvkm_falcon_init() 105 if (falcon->secret && falcon->version < 4) { in _nvkm_falcon_init()
|
/linux-4.1.27/security/keys/ |
D | trusted.h | 29 unsigned char secret[SHA1_DIGEST_SIZE]; member 79 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
D | trusted.c | 421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap() 489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal() 510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
|
/linux-4.1.27/Documentation/security/ |
D | keys-ecryptfs.txt | 65 into the '/secret' directory: 68 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
|
/linux-4.1.27/net/bluetooth/ |
D | ecc.h | 54 u8 secret[32]);
|
D | ecc.c | 799 u8 secret[32]) in ecdh_shared_secret() 813 ecc_native2bytes(product.x, secret); in ecdh_shared_secret()
|
/linux-4.1.27/drivers/gpu/drm/nouveau/include/nvkm/engine/ |
D | falcon.h | 36 u8 secret; member
|
/linux-4.1.27/firmware/emi26/ |
D | loader.HEX | 108 * or public access to this firmware which is a trade secret of Emagic,
|
D | firmware.HEX | 1249 * or public access to this firmware which is a trade secret of Emagic,
|
D | bitstream.HEX | 4376 * or public access to this firmware which is a trade secret of Emagic,
|
/linux-4.1.27/drivers/scsi/ |
D | iscsi_boot_sysfs.c | 93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET); 96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
|
/linux-4.1.27/Documentation/filesystems/ |
D | ecryptfs.txt | 72 development, since secret values will be written out to the system log
|
/linux-4.1.27/include/linux/ |
D | ipv6.h | 59 struct in6_addr secret; member
|
/linux-4.1.27/Documentation/usb/ |
D | authorization.txt | 88 verification stuff with PKI, so you don't depend on a shared secret,
|
/linux-4.1.27/net/ipv6/ |
D | addrconf.c | 2917 struct in6_addr secret; in ipv6_generate_stable_address() member 2924 struct in6_addr secret; in ipv6_generate_stable_address() local 2931 secret = idev->cnf.stable_secret.secret; in ipv6_generate_stable_address() 2933 secret = net->ipv6.devconf_dflt->stable_secret.secret; in ipv6_generate_stable_address() 2946 data.secret = secret; in ipv6_generate_stable_address() 5260 struct ipv6_stable_secret *secret = ctl->data; in addrconf_sysctl_stable_secret() local 5271 if (!write && !secret->initialized) { in addrconf_sysctl_stable_secret() 5276 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); in addrconf_sysctl_stable_secret() 5291 secret->initialized = true; in addrconf_sysctl_stable_secret() 5292 secret->secret = addr; in addrconf_sysctl_stable_secret()
|
/linux-4.1.27/net/bridge/ |
D | br_multicast.c | 62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); in __br_ip4_hash() 71 mdb->secret) & (mdb->max - 1); in __br_ip6_hash() 326 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); in br_mdb_rehash() 328 mdb->secret = old->secret; in br_mdb_rehash()
|
D | br_private.h | 136 u32 secret; member
|
/linux-4.1.27/Documentation/networking/ |
D | rxrpc.txt | 273 secret keys corresponding to the security types it permits. When a secure 274 connection is being set up, the kernel looks up the appropriate secret key 408 Similar to above but specifies a keyring of server secret keys to use (key 469 given the server's secret key as the instantiation data (see the example 475 socket then looks the server secret keys up in this keyring when secure 577 secret keys in it:
|
D | ip-sysctl.txt | 1563 This IPv6 address will be used as a secret to generate IPv6 1565 ones. All addresses generated after setting this secret will 1568 secret for the namespace, the interface specific ones can 1571 It is recommended to generate this secret during installation 1574 By default the stable secret is unset.
|
/linux-4.1.27/drivers/scsi/qla4xxx/ |
D | ql4_mbx.c | 1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1809 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
|
D | ql4_os.c | 756 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list() 2854 chap_tbl.secret, in qla4xxx_session_get_param() 2861 (char *)chap_tbl.secret, in qla4xxx_session_get_param() 3848 chap_tbl.secret, in qla4xxx_copy_fwddb_param() 3854 (char *)chap_tbl.secret, in qla4xxx_copy_fwddb_param() 6027 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap() 8031 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param() 8042 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param() 8044 rc = sprintf(buf, "%s\n", chap_tbl.secret); in qla4xxx_sysfs_ddb_get_param() 8278 chap_tbl.secret, in qla4xxx_sysfs_ddb_set_param()
|
D | ql4_fw.h | 819 uint8_t secret[MAX_CHAP_SECRET_LEN]; member
|
/linux-4.1.27/Documentation/input/ |
D | input.txt | 151 Corp. considers the protocol a trade secret and won't disclose a word
|
/linux-4.1.27/drivers/block/drbd/ |
D | drbd_receiver.c | 4902 char secret[SHARED_SECRET_MAX]; /* 64 byte */ in drbd_do_auth() local 4914 memcpy(secret, nc->shared_secret, key_len); in drbd_do_auth() 4920 rv = crypto_hash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); in drbd_do_auth()
|
/linux-4.1.27/firmware/ |
D | WHENCE | 187 * or public access to this firmware which is a trade secret of Emagic,
|
/linux-4.1.27/Documentation/sound/oss/ |
D | README.OSS | 627 then booting Linux using loadlin. CS4232C.EXE loads a secret firmware
|