Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 32 of 32) sorted by relevance

/linux-4.1.27/net/core/
Dsecure_seq.c46 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_tcpv6_sequence_number() local
53 secret[i] = net_secret[i] + (__force u32)daddr[i]; in secure_tcpv6_sequence_number()
54 secret[4] = net_secret[4] + in secure_tcpv6_sequence_number()
57 secret[i] = net_secret[i]; in secure_tcpv6_sequence_number()
59 md5_transform(hash, secret); in secure_tcpv6_sequence_number()
68 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_ipv6_port_ephemeral() local
75 secret[i] = net_secret[i] + (__force u32) daddr[i]; in secure_ipv6_port_ephemeral()
76 secret[4] = net_secret[4] + (__force u32)dport; in secure_ipv6_port_ephemeral()
78 secret[i] = net_secret[i]; in secure_ipv6_port_ephemeral()
80 md5_transform(hash, secret); in secure_ipv6_port_ephemeral()
[all …]
/linux-4.1.27/net/ceph/
Dcrypto.c427 int ceph_decrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_decrypt() argument
430 switch (secret->type) { in ceph_decrypt()
439 return ceph_aes_decrypt(secret->key, secret->len, dst, in ceph_decrypt()
447 int ceph_decrypt2(struct ceph_crypto_key *secret, in ceph_decrypt2() argument
454 switch (secret->type) { in ceph_decrypt2()
471 return ceph_aes_decrypt2(secret->key, secret->len, in ceph_decrypt2()
480 int ceph_encrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt() argument
483 switch (secret->type) { in ceph_encrypt()
492 return ceph_aes_encrypt(secret->key, secret->len, dst, in ceph_encrypt()
500 int ceph_encrypt2(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt2() argument
[all …]
Dcrypto.h30 int ceph_decrypt(struct ceph_crypto_key *secret,
33 int ceph_encrypt(struct ceph_crypto_key *secret,
36 int ceph_decrypt2(struct ceph_crypto_key *secret,
40 int ceph_encrypt2(struct ceph_crypto_key *secret,
Dauth_x.c47 static int ceph_x_encrypt(struct ceph_crypto_key *secret, in ceph_x_encrypt() argument
57 ret = ceph_encrypt2(secret, obuf + sizeof(u32), &len, in ceph_x_encrypt()
65 static int ceph_x_decrypt(struct ceph_crypto_key *secret, in ceph_x_decrypt() argument
84 ret = ceph_decrypt2(secret, &head, &head_len, *obuf, &olen, *p, len); in ceph_x_decrypt()
138 struct ceph_crypto_key *secret, in process_one_ticket() argument
177 dlen = ceph_x_decrypt(secret, p, end, &dbuf, 0); in process_one_ticket()
255 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
271 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply()
445 ret = ceph_x_encrypt(&xi->secret, &tmp, sizeof(tmp), in ceph_x_build_request()
522 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, in ceph_x_handle_reply()
[all …]
Dauth_x.h38 struct ceph_crypto_key secret; member
/linux-4.1.27/net/sctp/
Dauth.c262 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
270 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
271 if (!secret) in sctp_auth_asoc_set_secret()
275 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
279 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
282 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
284 return secret; in sctp_auth_asoc_set_secret()
299 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
344 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
350 return secret; in sctp_auth_asoc_create_secret()
[all …]
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/
Dfalcon.c88 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in _nvkm_falcon_init()
92 falcon->secret = (caps & 0x00000030) >> 4; in _nvkm_falcon_init()
100 nv_debug(falcon, "secret level: %d\n", falcon->secret); in _nvkm_falcon_init()
105 if (falcon->secret && falcon->version < 4) { in _nvkm_falcon_init()
/linux-4.1.27/security/keys/
Dtrusted.h29 unsigned char secret[SHA1_DIGEST_SIZE]; member
79 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
Dtrusted.c421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap()
489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal()
510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal()
518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal()
556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
/linux-4.1.27/Documentation/security/
Dkeys-ecryptfs.txt65 into the '/secret' directory:
68 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
/linux-4.1.27/net/bluetooth/
Decc.h54 u8 secret[32]);
Decc.c799 u8 secret[32]) in ecdh_shared_secret()
813 ecc_native2bytes(product.x, secret); in ecdh_shared_secret()
/linux-4.1.27/drivers/gpu/drm/nouveau/include/nvkm/engine/
Dfalcon.h36 u8 secret; member
/linux-4.1.27/firmware/emi26/
Dloader.HEX108 * or public access to this firmware which is a trade secret of Emagic,
Dfirmware.HEX1249 * or public access to this firmware which is a trade secret of Emagic,
Dbitstream.HEX4376 * or public access to this firmware which is a trade secret of Emagic,
/linux-4.1.27/drivers/scsi/
Discsi_boot_sysfs.c93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET);
96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
/linux-4.1.27/Documentation/filesystems/
Decryptfs.txt72 development, since secret values will be written out to the system log
/linux-4.1.27/include/linux/
Dipv6.h59 struct in6_addr secret; member
/linux-4.1.27/Documentation/usb/
Dauthorization.txt88 verification stuff with PKI, so you don't depend on a shared secret,
/linux-4.1.27/net/ipv6/
Daddrconf.c2917 struct in6_addr secret; in ipv6_generate_stable_address() member
2924 struct in6_addr secret; in ipv6_generate_stable_address() local
2931 secret = idev->cnf.stable_secret.secret; in ipv6_generate_stable_address()
2933 secret = net->ipv6.devconf_dflt->stable_secret.secret; in ipv6_generate_stable_address()
2946 data.secret = secret; in ipv6_generate_stable_address()
5260 struct ipv6_stable_secret *secret = ctl->data; in addrconf_sysctl_stable_secret() local
5271 if (!write && !secret->initialized) { in addrconf_sysctl_stable_secret()
5276 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); in addrconf_sysctl_stable_secret()
5291 secret->initialized = true; in addrconf_sysctl_stable_secret()
5292 secret->secret = addr; in addrconf_sysctl_stable_secret()
/linux-4.1.27/net/bridge/
Dbr_multicast.c62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); in __br_ip4_hash()
71 mdb->secret) & (mdb->max - 1); in __br_ip6_hash()
326 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); in br_mdb_rehash()
328 mdb->secret = old->secret; in br_mdb_rehash()
Dbr_private.h136 u32 secret; member
/linux-4.1.27/Documentation/networking/
Drxrpc.txt273 secret keys corresponding to the security types it permits. When a secure
274 connection is being set up, the kernel looks up the appropriate secret key
408 Similar to above but specifies a keyring of server secret keys to use (key
469 given the server's secret key as the instantiation data (see the example
475 socket then looks the server secret keys up in this keyring when secure
577 secret keys in it:
Dip-sysctl.txt1563 This IPv6 address will be used as a secret to generate IPv6
1565 ones. All addresses generated after setting this secret will
1568 secret for the namespace, the interface specific ones can
1571 It is recommended to generate this secret during installation
1574 By default the stable secret is unset.
/linux-4.1.27/drivers/scsi/qla4xxx/
Dql4_mbx.c1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1809 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
Dql4_os.c756 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list()
2854 chap_tbl.secret, in qla4xxx_session_get_param()
2861 (char *)chap_tbl.secret, in qla4xxx_session_get_param()
3848 chap_tbl.secret, in qla4xxx_copy_fwddb_param()
3854 (char *)chap_tbl.secret, in qla4xxx_copy_fwddb_param()
6027 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap()
8031 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param()
8042 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param()
8044 rc = sprintf(buf, "%s\n", chap_tbl.secret); in qla4xxx_sysfs_ddb_get_param()
8278 chap_tbl.secret, in qla4xxx_sysfs_ddb_set_param()
Dql4_fw.h819 uint8_t secret[MAX_CHAP_SECRET_LEN]; member
/linux-4.1.27/Documentation/input/
Dinput.txt151 Corp. considers the protocol a trade secret and won't disclose a word
/linux-4.1.27/drivers/block/drbd/
Ddrbd_receiver.c4902 char secret[SHARED_SECRET_MAX]; /* 64 byte */ in drbd_do_auth() local
4914 memcpy(secret, nc->shared_secret, key_len); in drbd_do_auth()
4920 rv = crypto_hash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); in drbd_do_auth()
/linux-4.1.27/firmware/
DWHENCE187 * or public access to this firmware which is a trade secret of Emagic,
/linux-4.1.27/Documentation/sound/oss/
DREADME.OSS627 then booting Linux using loadlin. CS4232C.EXE loads a secret firmware