/linux-4.1.27/net/core/ |
H A D | secure_seq.c | 46 u32 secret[MD5_MESSAGE_BYTES / 4]; secure_tcpv6_sequence_number() local 53 secret[i] = net_secret[i] + (__force u32)daddr[i]; secure_tcpv6_sequence_number() 54 secret[4] = net_secret[4] + secure_tcpv6_sequence_number() 57 secret[i] = net_secret[i]; secure_tcpv6_sequence_number() 59 md5_transform(hash, secret); secure_tcpv6_sequence_number() 68 u32 secret[MD5_MESSAGE_BYTES / 4]; secure_ipv6_port_ephemeral() local 75 secret[i] = net_secret[i] + (__force u32) daddr[i]; secure_ipv6_port_ephemeral() 76 secret[4] = net_secret[4] + (__force u32)dport; secure_ipv6_port_ephemeral() 78 secret[i] = net_secret[i]; secure_ipv6_port_ephemeral() 80 md5_transform(hash, secret); secure_ipv6_port_ephemeral() 149 u32 secret[MD5_MESSAGE_BYTES / 4]; secure_dccpv6_sequence_number() local 157 secret[i] = net_secret[i] + daddr[i]; secure_dccpv6_sequence_number() 158 secret[4] = net_secret[4] + secure_dccpv6_sequence_number() 161 secret[i] = net_secret[i]; secure_dccpv6_sequence_number() 163 md5_transform(hash, secret); secure_dccpv6_sequence_number()
|
/linux-4.1.27/net/ceph/ |
H A D | crypto.h | 8 * cryptographic secret 30 int ceph_decrypt(struct ceph_crypto_key *secret, 33 int ceph_encrypt(struct ceph_crypto_key *secret, 36 int ceph_decrypt2(struct ceph_crypto_key *secret, 40 int ceph_encrypt2(struct ceph_crypto_key *secret,
|
H A D | auth_x.h | 38 struct ceph_crypto_key secret; member in struct:ceph_x_info
|
H A D | crypto.c | 427 int ceph_decrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, ceph_decrypt() argument 430 switch (secret->type) { ceph_decrypt() 439 return ceph_aes_decrypt(secret->key, secret->len, dst, ceph_decrypt() 447 int ceph_decrypt2(struct ceph_crypto_key *secret, ceph_decrypt2() argument 454 switch (secret->type) { ceph_decrypt2() 471 return ceph_aes_decrypt2(secret->key, secret->len, ceph_decrypt2() 480 int ceph_encrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, ceph_encrypt() argument 483 switch (secret->type) { ceph_encrypt() 492 return ceph_aes_encrypt(secret->key, secret->len, dst, ceph_encrypt() 500 int ceph_encrypt2(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, ceph_encrypt2() argument 504 switch (secret->type) { ceph_encrypt2() 514 return ceph_aes_encrypt2(secret->key, secret->len, dst, dst_len, ceph_encrypt2()
|
H A D | auth_x.c | 47 static int ceph_x_encrypt(struct ceph_crypto_key *secret, ceph_x_encrypt() argument 57 ret = ceph_encrypt2(secret, obuf + sizeof(u32), &len, ceph_x_encrypt() 65 static int ceph_x_decrypt(struct ceph_crypto_key *secret, ceph_x_decrypt() argument 84 ret = ceph_decrypt2(secret, &head, &head_len, *obuf, &olen, *p, len); ceph_x_decrypt() 138 struct ceph_crypto_key *secret, process_one_ticket() 177 dlen = ceph_x_decrypt(secret, p, end, &dbuf, 0); process_one_ticket() 255 struct ceph_crypto_key *secret, ceph_x_proc_ticket_reply() 271 ret = process_one_ticket(ac, secret, &p, end); ceph_x_proc_ticket_reply() 445 ret = ceph_x_encrypt(&xi->secret, &tmp, sizeof(tmp), ceph_x_build_request() 522 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, ceph_x_handle_reply() 590 dout("ceph_x_update_authorizer service %u secret %llu < %llu\n", ceph_x_update_authorizer() 648 ceph_crypto_key_destroy(&xi->secret); ceph_x_destroy() 758 pr_err("no secret set (for auth_x protocol)\n"); ceph_x_init() 762 ret = ceph_crypto_key_clone(&xi->secret, ac->key); ceph_x_init() 137 process_one_ticket(struct ceph_auth_client *ac, struct ceph_crypto_key *secret, void **p, void *end) process_one_ticket() argument 254 ceph_x_proc_ticket_reply(struct ceph_auth_client *ac, struct ceph_crypto_key *secret, void *buf, void *end) ceph_x_proc_ticket_reply() argument
|
H A D | ceph_common.c | 254 {Opt_secret, "secret=%s"}, 282 /* get secret from key store */ get_secret() 504 seq_puts(m, "secret=<hidden>,"); ceph_print_client_options()
|
/linux-4.1.27/include/crypto/ |
H A D | public_key.h | 63 MPI x; /* DSA secret exponent (if present) */ 68 MPI d; /* RSA secret encryption exponent (if present) */ 69 MPI p; /* RSA secret prime (if present) */ 70 MPI q; /* RSA secret prime (if present) */
|
/linux-4.1.27/arch/mips/include/asm/sn/sn0/ |
H A D | hub.h | 12 /* The secret password; used to release protection */
|
/linux-4.1.27/security/keys/ |
H A D | trusted.h | 29 unsigned char secret[SHA1_DIGEST_SIZE]; member in struct:osapsess 77 pr_info("trusted-key: secret:\n"); dump_sess() 79 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); dump_sess()
|
H A D | trusted.c | 421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, osap() 489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); tpm_seal() 510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, tpm_seal() 518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, tpm_seal() 556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, tpm_seal()
|
/linux-4.1.27/drivers/gpu/drm/nouveau/include/nvkm/engine/ |
H A D | falcon.h | 36 u8 secret; member in struct:nvkm_falcon
|
/linux-4.1.27/crypto/asymmetric_keys/ |
H A D | public_key.h | 24 u8 n_sec_mpi; /* Number of MPIs in secret key */
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/ |
H A D | falcon.c | 88 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; _nvkm_falcon_init() 92 falcon->secret = (caps & 0x00000030) >> 4; _nvkm_falcon_init() 100 nv_debug(falcon, "secret level: %d\n", falcon->secret); _nvkm_falcon_init() 105 if (falcon->secret && falcon->version < 4) { _nvkm_falcon_init()
|
/linux-4.1.27/arch/mips/lib/ |
H A D | strnlen_user.S | 25 * bytes. There's nothing secret there. On 64-bit accessing beyond
|
/linux-4.1.27/net/sctp/ |
H A D | auth.c | 262 struct sctp_auth_bytes *secret; sctp_auth_asoc_set_secret() local 270 secret = sctp_auth_create_key(auth_len, gfp); sctp_auth_asoc_set_secret() 271 if (!secret) sctp_auth_asoc_set_secret() 275 memcpy(secret->data, ep_key->key->data, ep_key->key->len); sctp_auth_asoc_set_secret() 279 memcpy(secret->data + offset, first_vector->data, first_vector->len); sctp_auth_asoc_set_secret() 282 memcpy(secret->data + offset, last_vector->data, last_vector->len); sctp_auth_asoc_set_secret() 284 return secret; sctp_auth_asoc_set_secret() 299 struct sctp_auth_bytes *secret = NULL; sctp_auth_asoc_create_secret() local 344 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, sctp_auth_asoc_create_secret() 350 return secret; sctp_auth_asoc_create_secret() 389 struct sctp_auth_bytes *secret; sctp_auth_asoc_init_active_key() local 401 * secret. sctp_auth_asoc_init_active_key() 407 secret = sctp_auth_asoc_create_secret(asoc, ep_key, gfp); sctp_auth_asoc_init_active_key() 408 if (!secret) sctp_auth_asoc_init_active_key() 412 asoc->asoc_shared_key = secret; sctp_auth_asoc_init_active_key()
|
H A D | endpointola.c | 146 /* Initialize the secret key used with cookie. */ sctp_endpoint_init()
|
H A D | socket.c | 3458 * This option will set a shared secret key which is used to build an 3529 * This set option will delete a shared secret key from use.
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 139 /* Copy rest of the WEP key (the secret part) */ prism2_wep_encrypt() 194 /* Copy rest of the WEP key (the secret part) */ prism2_wep_decrypt()
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 142 /* Copy rest of the WEP key (the secret part) */ prism2_wep_encrypt() 198 /* Copy rest of the WEP key (the secret part) */ prism2_wep_decrypt()
|
/linux-4.1.27/net/wireless/ |
H A D | lib80211_crypt_wep.c | 153 /* Copy rest of the WEP key (the secret part) */ lib80211_wep_encrypt() 202 /* Copy rest of the WEP key (the secret part) */ lib80211_wep_decrypt()
|
/linux-4.1.27/fs/ext3/ |
H A D | hash.c | 129 * The seed is an 4 longword (32 bits) "secret" which can be used to
|
/linux-4.1.27/fs/ext4/ |
H A D | hash.c | 130 * The seed is an 4 longword (32 bits) "secret" which can be used to
|
/linux-4.1.27/include/linux/ceph/ |
H A D | auth.h | 89 const struct ceph_crypto_key *key; /* our secret key */
|
/linux-4.1.27/crypto/ |
H A D | ansi_cprng.c | 120 * Next xor I with our secret vector V _get_more_prng_bytes() 152 * and encrypt that to obtain a new secret vector V _get_more_prng_bytes()
|
/linux-4.1.27/net/mac80211/ |
H A D | wep.c | 181 /* Copy rest of the WEP key (the secret part) */ ieee80211_wep_encrypt() 256 /* Copy rest of the WEP key (the secret part) */ ieee80211_wep_decrypt()
|
/linux-4.1.27/drivers/net/ethernet/myricom/myri10ge/ |
H A D | myri10ge_mcp.h | 260 /* get the offset of the secret key */ 262 /* tell nic that the secret key's been updated */
|
/linux-4.1.27/drivers/scsi/ |
H A D | iscsi_boot_sysfs.c | 93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET); 96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
|
/linux-4.1.27/drivers/media/i2c/soc_camera/ |
H A D | mt9t112.c | 600 /* secret register by aptina */ mt9t112_init_setting() 607 /* secret register by aptina */ mt9t112_init_setting() 614 /* secret register by aptina */ mt9t112_init_setting() 621 /* secret register by aptina */ mt9t112_init_setting()
|
/linux-4.1.27/net/ipv6/ |
H A D | syncookies.c | 76 * and overwrite the digest with the secret cookie_hash()
|
H A D | addrconf.c | 2917 struct in6_addr secret; ipv6_generate_stable_address() member in struct:__anon14125::__anon14126 2924 struct in6_addr secret; ipv6_generate_stable_address() local 2931 secret = idev->cnf.stable_secret.secret; ipv6_generate_stable_address() 2933 secret = net->ipv6.devconf_dflt->stable_secret.secret; ipv6_generate_stable_address() 2946 data.secret = secret; ipv6_generate_stable_address() 5260 struct ipv6_stable_secret *secret = ctl->data; addrconf_sysctl_stable_secret() local 5271 if (!write && !secret->initialized) { addrconf_sysctl_stable_secret() 5276 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); addrconf_sysctl_stable_secret() 5291 secret->initialized = true; addrconf_sysctl_stable_secret() 5292 secret->secret = addr; addrconf_sysctl_stable_secret()
|
H A D | reassembly.c | 618 /* secret interval has been deprecated */
|
/linux-4.1.27/include/linux/ |
H A D | ipv6.h | 59 struct in6_addr secret; member in struct:ipv6_devconf::ipv6_stable_secret
|
H A D | skbuff.h | 54 * this. Apparently with the secret goal to sell you new devices, when you
|
/linux-4.1.27/drivers/scsi/qla4xxx/ |
H A D | ql4_mbx.c | 1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); qla4xxx_get_chap() 1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); qla4xxx_set_chap() 1715 ql4_printk(KERN_ERR, ha, "No memory for username & secret\n"); qla4xxx_get_uni_chap_at_index() 1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); qla4xxx_get_uni_chap_at_index() 1757 * qla4xxx_get_chap_index - Get chap index given username and secret 1809 if (!strncmp(chap_table->secret, password, qla4xxx_get_chap_index()
|
H A D | ql4_os.c | 756 strlcpy(chap_rec->password, chap_table->secret, qla4xxx_get_chap_list() 2854 chap_tbl.secret, qla4xxx_session_get_param() 2861 (char *)chap_tbl.secret, qla4xxx_session_get_param() 3848 chap_tbl.secret, qla4xxx_copy_fwddb_param() 3854 (char *)chap_tbl.secret, qla4xxx_copy_fwddb_param() 6027 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); qla4xxx_get_bidi_chap() 8031 chap_tbl.secret, qla4xxx_sysfs_ddb_get_param() 8042 chap_tbl.secret, qla4xxx_sysfs_ddb_get_param() 8044 rc = sprintf(buf, "%s\n", chap_tbl.secret); qla4xxx_sysfs_ddb_get_param() 8278 chap_tbl.secret, nla_for_each_attr()
|
H A D | ql4_fw.h | 819 uint8_t secret[MAX_CHAP_SECRET_LEN]; member in struct:ql4_chap_table
|
/linux-4.1.27/net/bridge/ |
H A D | br_multicast.c | 62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); __br_ip4_hash() 71 mdb->secret) & (mdb->max - 1); __br_ip6_hash() 326 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); br_mdb_rehash() 328 mdb->secret = old->secret; br_mdb_rehash()
|
H A D | br_private.h | 136 u32 secret; member in struct:net_bridge_mdb_htable
|
/linux-4.1.27/drivers/mtd/maps/ |
H A D | pcmciamtd.c | 4 * Author: Simon Evans <spse@secret.org.uk> 64 MODULE_AUTHOR("Simon Evans <spse@secret.org.uk>");
|
/linux-4.1.27/drivers/usb/wusbcore/ |
H A D | cbaf.c | 36 * (connection context), with the CK being the secret, or connection 80 * handshake) challenge the device to demonstrate it has the CK secret
|
/linux-4.1.27/net/bluetooth/ |
H A D | ecc.c | 799 u8 secret[32]) ecdh_shared_secret() 813 ecc_native2bytes(product.x, secret); ecdh_shared_secret() 798 ecdh_shared_secret(const u8 public_key[64], const u8 private_key[32], u8 secret[32]) ecdh_shared_secret() argument
|
/linux-4.1.27/drivers/mtd/devices/ |
H A D | block2mtd.c | 4 * Copyright (C) 2001,2002 Simon Evans <spse@secret.org.uk>
|
/linux-4.1.27/drivers/media/usb/gspca/ |
H A D | konica.c | 9 * Copyright (C) 2002 Simon Evans <spse@secret.org.uk>
|
H A D | ov519.c | 933 * 44[7:0] "It's a secret" 940 * 40[7:0] "It's a secret" 947 * 41[7:0] "It's a secret" 954 * 42[7:0] "It's a secret" 961 * 43[7:0] "It's a secret" 968 * 45[7:0] "It's a secret" 975 * 48[7:0] "It's a secret" 982 * 49[7:0] "It's a secret" 989 * 4B[7:0] "It's a secret" 996 * 4D[7:0] "It's a secret" 1015 * 3D[7:0] "It's a secret" 1022 * 3E[7:0] "It's a secret"
|
/linux-4.1.27/drivers/misc/ |
H A D | cs5535-mfgpt.c | 248 * whether or not this secret MSR can be used to release individual timers.
|
/linux-4.1.27/net/ipv4/ |
H A D | inet_fragment.c | 31 /* don't rebuild inetfrag table with new secret more often than this */
|
H A D | ip_fragment.c | 733 /* secret interval has been deprecated */
|
H A D | sysctl_net_ipv4.c | 234 /* Generate a dummy secret but don't publish it. This proc_tcp_fastopen_key()
|
/linux-4.1.27/drivers/edac/ |
H A D | i82875p_edac.c | 287 * http://www.x86-secret.com/articles/tweak/pat/patsecrets-2.htm i82875p_setup_overfl_dev()
|
/linux-4.1.27/net/ieee802154/6lowpan/ |
H A D | reassembly.c | 423 /* secret interval has been deprecated */
|
/linux-4.1.27/drivers/net/hyperv/ |
H A D | hyperv_net.h | 110 /* The size of the hash secret key */ 113 /* The offset of the secret key from the beginning of this structure */
|
/linux-4.1.27/net/rxrpc/ |
H A D | ar-key.c | 821 * Preparse a server secret key. 823 * The data should be the 8-byte secret key.
|
/linux-4.1.27/drivers/net/usb/ |
H A D | catc.c | 11 * Old chipset support added by Simon Evans <spse@secret.org.uk> 2002
|
/linux-4.1.27/drivers/media/pci/dm1105/ |
H A D | dm1105.c | 98 /* Odd-even secret key select */
|
/linux-4.1.27/drivers/video/fbdev/matrox/ |
H A D | matroxfb_DAC1064.c | 305 handles it, please reveal this secret to me... */ DAC1064_global_init()
|
/linux-4.1.27/include/uapi/linux/ |
H A D | sctp.h | 682 * This option will set a shared secret key which is used to build an
|
/linux-4.1.27/sound/pci/hda/ |
H A D | patch_via.c | 873 * This isn't listed from the raw info, but the chip has a secret connection.
|
/linux-4.1.27/include/net/sctp/ |
H A D | structs.h | 1213 /* Secret Key: A secret key used by this endpoint to compute 1828 * The current generated assocaition shared key (secret)
|
/linux-4.1.27/drivers/usb/storage/ |
H A D | sddr09.c | 1071 * signifying that the secret command to read an 128-bit ID is available.
|
/linux-4.1.27/drivers/block/drbd/ |
H A D | drbd_receiver.c | 4902 char secret[SHARED_SECRET_MAX]; /* 64 byte */ drbd_do_auth() local 4914 memcpy(secret, nc->shared_secret, key_len); drbd_do_auth() 4920 rv = crypto_hash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); drbd_do_auth()
|
/linux-4.1.27/drivers/net/irda/ |
H A D | irda-usb.c | 727 * that we don't use. Here is the little secret...
|
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/ |
H A D | sec.c | 1619 /* note we don't clear the ares where old data live, not secret */ _sptlrpc_enlarge_msg_inplace()
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | keystore.c | 1864 * authentication token that has the secret component(s) ecryptfs_parse_packet_set()
|
/linux-4.1.27/drivers/pci/ |
H A D | quirks.c | 2198 * http://www.x86-secret.com/articles/tweak/pat/patsecrets-2.htm
|
/linux-4.1.27/drivers/scsi/lpfc/ |
H A D | lpfc_attr.c | 2158 * The "key" is not secret - it is a hardcoded string shown lpfc_soft_wwn_enable_store()
|
/linux-4.1.27/drivers/usb/core/ |
H A D | hub.c | 2045 * drivers/usb/wusbcore/devconnect.c. When we do the initial secret
|