Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 32 of 32) sorted by relevance

/linux-4.4.14/net/core/
Dsecure_seq.c46 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_tcpv6_sequence_number() local
53 secret[i] = net_secret[i] + (__force u32)daddr[i]; in secure_tcpv6_sequence_number()
54 secret[4] = net_secret[4] + in secure_tcpv6_sequence_number()
57 secret[i] = net_secret[i]; in secure_tcpv6_sequence_number()
59 md5_transform(hash, secret); in secure_tcpv6_sequence_number()
68 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_ipv6_port_ephemeral() local
75 secret[i] = net_secret[i] + (__force u32) daddr[i]; in secure_ipv6_port_ephemeral()
76 secret[4] = net_secret[4] + (__force u32)dport; in secure_ipv6_port_ephemeral()
78 secret[i] = net_secret[i]; in secure_ipv6_port_ephemeral()
80 md5_transform(hash, secret); in secure_ipv6_port_ephemeral()
[all …]
/linux-4.4.14/net/ceph/
Dcrypto.c423 int ceph_decrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_decrypt() argument
426 switch (secret->type) { in ceph_decrypt()
435 return ceph_aes_decrypt(secret->key, secret->len, dst, in ceph_decrypt()
443 int ceph_decrypt2(struct ceph_crypto_key *secret, in ceph_decrypt2() argument
450 switch (secret->type) { in ceph_decrypt2()
467 return ceph_aes_decrypt2(secret->key, secret->len, in ceph_decrypt2()
476 int ceph_encrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt() argument
479 switch (secret->type) { in ceph_encrypt()
488 return ceph_aes_encrypt(secret->key, secret->len, dst, in ceph_encrypt()
496 int ceph_encrypt2(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt2() argument
[all …]
Dcrypto.h32 int ceph_decrypt(struct ceph_crypto_key *secret,
35 int ceph_encrypt(struct ceph_crypto_key *secret,
38 int ceph_decrypt2(struct ceph_crypto_key *secret,
42 int ceph_encrypt2(struct ceph_crypto_key *secret,
Dauth_x.c48 static int ceph_x_encrypt(struct ceph_crypto_key *secret, in ceph_x_encrypt() argument
58 ret = ceph_encrypt2(secret, obuf + sizeof(u32), &len, in ceph_x_encrypt()
66 static int ceph_x_decrypt(struct ceph_crypto_key *secret, in ceph_x_decrypt() argument
85 ret = ceph_decrypt2(secret, &head, &head_len, *obuf, &olen, *p, len); in ceph_x_decrypt()
139 struct ceph_crypto_key *secret, in process_one_ticket() argument
178 dlen = ceph_x_decrypt(secret, p, end, &dbuf, 0); in process_one_ticket()
256 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
272 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply()
454 ret = ceph_x_encrypt(&xi->secret, &tmp, sizeof(tmp), in ceph_x_build_request()
531 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, in ceph_x_handle_reply()
[all …]
Dauth_x.h38 struct ceph_crypto_key secret; member
/linux-4.4.14/net/sctp/
Dauth.c262 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
270 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
271 if (!secret) in sctp_auth_asoc_set_secret()
275 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
279 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
282 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
284 return secret; in sctp_auth_asoc_set_secret()
299 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
344 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
350 return secret; in sctp_auth_asoc_create_secret()
[all …]
/linux-4.4.14/security/keys/
Dtrusted.h28 unsigned char secret[SHA1_DIGEST_SIZE]; member
68 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
Dtrusted.c421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap()
489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal()
510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal()
518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal()
556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
/linux-4.4.14/Documentation/security/
Dkeys-ecryptfs.txt65 into the '/secret' directory:
68 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
/linux-4.4.14/net/bluetooth/
Decc.h54 u8 secret[32]);
Decc.c799 u8 secret[32]) in ecdh_shared_secret()
813 ecc_native2bytes(product.x, secret); in ecdh_shared_secret()
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/
Dfalcon.c138 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit()
142 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit()
150 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit()
168 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
/linux-4.4.14/drivers/gpu/drm/nouveau/include/nvkm/engine/
Dfalcon.h13 u8 secret; member
/linux-4.4.14/firmware/emi26/
Dloader.HEX108 * or public access to this firmware which is a trade secret of Emagic,
Dfirmware.HEX1249 * or public access to this firmware which is a trade secret of Emagic,
Dbitstream.HEX4376 * or public access to this firmware which is a trade secret of Emagic,
/linux-4.4.14/drivers/scsi/
Discsi_boot_sysfs.c93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET);
96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
/linux-4.4.14/Documentation/filesystems/
Decryptfs.txt72 development, since secret values will be written out to the system log
/linux-4.4.14/include/linux/
Dipv6.h60 struct in6_addr secret; member
/linux-4.4.14/net/ipv6/
Daddrconf.c2986 struct in6_addr secret; in ipv6_generate_stable_address() member
2993 struct in6_addr secret; in ipv6_generate_stable_address() local
3000 secret = idev->cnf.stable_secret.secret; in ipv6_generate_stable_address()
3002 secret = net->ipv6.devconf_dflt->stable_secret.secret; in ipv6_generate_stable_address()
3015 data.secret = secret; in ipv6_generate_stable_address()
5359 struct ipv6_stable_secret *secret = ctl->data; in addrconf_sysctl_stable_secret() local
5370 if (!write && !secret->initialized) { in addrconf_sysctl_stable_secret()
5375 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); in addrconf_sysctl_stable_secret()
5390 secret->initialized = true; in addrconf_sysctl_stable_secret()
5391 secret->secret = addr; in addrconf_sysctl_stable_secret()
/linux-4.4.14/net/bridge/
Dbr_multicast.c74 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); in __br_ip4_hash()
83 mdb->secret) & (mdb->max - 1); in __br_ip6_hash()
340 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); in br_mdb_rehash()
342 mdb->secret = old->secret; in br_mdb_rehash()
Dbr_private.h181 u32 secret; member
/linux-4.4.14/Documentation/usb/
Dauthorization.txt88 verification stuff with PKI, so you don't depend on a shared secret,
/linux-4.4.14/Documentation/networking/
Drxrpc.txt273 secret keys corresponding to the security types it permits. When a secure
274 connection is being set up, the kernel looks up the appropriate secret key
408 Similar to above but specifies a keyring of server secret keys to use (key
469 given the server's secret key as the instantiation data (see the example
475 socket then looks the server secret keys up in this keyring when secure
577 secret keys in it:
Dip-sysctl.txt1643 This IPv6 address will be used as a secret to generate IPv6
1645 ones. All addresses generated after setting this secret will
1648 secret for the namespace, the interface specific ones can
1651 It is recommended to generate this secret during installation
1654 By default the stable secret is unset.
/linux-4.4.14/drivers/scsi/qla4xxx/
Dql4_mbx.c1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1809 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
Dql4_os.c755 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list()
2853 chap_tbl.secret, in qla4xxx_session_get_param()
2860 (char *)chap_tbl.secret, in qla4xxx_session_get_param()
3847 chap_tbl.secret, in qla4xxx_copy_fwddb_param()
3853 (char *)chap_tbl.secret, in qla4xxx_copy_fwddb_param()
6026 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap()
8030 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param()
8041 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param()
8043 rc = sprintf(buf, "%s\n", chap_tbl.secret); in qla4xxx_sysfs_ddb_get_param()
8277 chap_tbl.secret, in qla4xxx_sysfs_ddb_set_param()
Dql4_fw.h819 uint8_t secret[MAX_CHAP_SECRET_LEN]; member
/linux-4.4.14/Documentation/input/
Dinput.txt151 Corp. considers the protocol a trade secret and won't disclose a word
/linux-4.4.14/drivers/block/drbd/
Ddrbd_receiver.c4903 char secret[SHARED_SECRET_MAX]; /* 64 byte */ in drbd_do_auth() local
4915 memcpy(secret, nc->shared_secret, key_len); in drbd_do_auth()
4921 rv = crypto_hash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); in drbd_do_auth()
/linux-4.4.14/firmware/
DWHENCE187 * or public access to this firmware which is a trade secret of Emagic,
/linux-4.4.14/Documentation/sound/oss/
DREADME.OSS627 then booting Linux using loadlin. CS4232C.EXE loads a secret firmware