/linux-4.4.14/net/core/ |
D | secure_seq.c | 46 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_tcpv6_sequence_number() local 53 secret[i] = net_secret[i] + (__force u32)daddr[i]; in secure_tcpv6_sequence_number() 54 secret[4] = net_secret[4] + in secure_tcpv6_sequence_number() 57 secret[i] = net_secret[i]; in secure_tcpv6_sequence_number() 59 md5_transform(hash, secret); in secure_tcpv6_sequence_number() 68 u32 secret[MD5_MESSAGE_BYTES / 4]; in secure_ipv6_port_ephemeral() local 75 secret[i] = net_secret[i] + (__force u32) daddr[i]; in secure_ipv6_port_ephemeral() 76 secret[4] = net_secret[4] + (__force u32)dport; in secure_ipv6_port_ephemeral() 78 secret[i] = net_secret[i]; in secure_ipv6_port_ephemeral() 80 md5_transform(hash, secret); in secure_ipv6_port_ephemeral() [all …]
|
/linux-4.4.14/net/ceph/ |
D | crypto.c | 423 int ceph_decrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_decrypt() argument 426 switch (secret->type) { in ceph_decrypt() 435 return ceph_aes_decrypt(secret->key, secret->len, dst, in ceph_decrypt() 443 int ceph_decrypt2(struct ceph_crypto_key *secret, in ceph_decrypt2() argument 450 switch (secret->type) { in ceph_decrypt2() 467 return ceph_aes_decrypt2(secret->key, secret->len, in ceph_decrypt2() 476 int ceph_encrypt(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt() argument 479 switch (secret->type) { in ceph_encrypt() 488 return ceph_aes_encrypt(secret->key, secret->len, dst, in ceph_encrypt() 496 int ceph_encrypt2(struct ceph_crypto_key *secret, void *dst, size_t *dst_len, in ceph_encrypt2() argument [all …]
|
D | crypto.h | 32 int ceph_decrypt(struct ceph_crypto_key *secret, 35 int ceph_encrypt(struct ceph_crypto_key *secret, 38 int ceph_decrypt2(struct ceph_crypto_key *secret, 42 int ceph_encrypt2(struct ceph_crypto_key *secret,
|
D | auth_x.c | 48 static int ceph_x_encrypt(struct ceph_crypto_key *secret, in ceph_x_encrypt() argument 58 ret = ceph_encrypt2(secret, obuf + sizeof(u32), &len, in ceph_x_encrypt() 66 static int ceph_x_decrypt(struct ceph_crypto_key *secret, in ceph_x_decrypt() argument 85 ret = ceph_decrypt2(secret, &head, &head_len, *obuf, &olen, *p, len); in ceph_x_decrypt() 139 struct ceph_crypto_key *secret, in process_one_ticket() argument 178 dlen = ceph_x_decrypt(secret, p, end, &dbuf, 0); in process_one_ticket() 256 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument 272 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply() 454 ret = ceph_x_encrypt(&xi->secret, &tmp, sizeof(tmp), in ceph_x_build_request() 531 ret = ceph_x_proc_ticket_reply(ac, &xi->secret, in ceph_x_handle_reply() [all …]
|
D | auth_x.h | 38 struct ceph_crypto_key secret; member
|
/linux-4.4.14/net/sctp/ |
D | auth.c | 262 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local 270 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret() 271 if (!secret) in sctp_auth_asoc_set_secret() 275 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret() 279 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret() 282 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret() 284 return secret; in sctp_auth_asoc_set_secret() 299 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local 344 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret() 350 return secret; in sctp_auth_asoc_create_secret() [all …]
|
/linux-4.4.14/security/keys/ |
D | trusted.h | 28 unsigned char secret[SHA1_DIGEST_SIZE]; member 68 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
D | trusted.c | 421 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap() 489 memcpy(td->xorwork, sess.secret, SHA1_DIGEST_SIZE); in tpm_seal() 510 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 518 ret = TSS_authhmac(td->pubauth, sess.secret, SHA1_DIGEST_SIZE, in tpm_seal() 556 ret = TSS_checkhmac1(tb->data, ordinal, td->nonceodd, sess.secret, in tpm_seal()
|
/linux-4.4.14/Documentation/security/ |
D | keys-ecryptfs.txt | 65 into the '/secret' directory: 68 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
|
/linux-4.4.14/net/bluetooth/ |
D | ecc.h | 54 u8 secret[32]);
|
D | ecc.c | 799 u8 secret[32]) in ecdh_shared_secret() 813 ecc_native2bytes(product.x, secret); in ecdh_shared_secret()
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | falcon.c | 138 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit() 142 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit() 150 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit() 168 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
|
/linux-4.4.14/drivers/gpu/drm/nouveau/include/nvkm/engine/ |
D | falcon.h | 13 u8 secret; member
|
/linux-4.4.14/firmware/emi26/ |
D | loader.HEX | 108 * or public access to this firmware which is a trade secret of Emagic,
|
D | firmware.HEX | 1249 * or public access to this firmware which is a trade secret of Emagic,
|
D | bitstream.HEX | 4376 * or public access to this firmware which is a trade secret of Emagic,
|
/linux-4.4.14/drivers/scsi/ |
D | iscsi_boot_sysfs.c | 93 iscsi_boot_rd_attr(tgt_chap_secret, chap-secret, ISCSI_BOOT_TGT_CHAP_SECRET); 96 iscsi_boot_rd_attr(tgt_chap_rev_secret, rev-chap-name-secret,
|
/linux-4.4.14/Documentation/filesystems/ |
D | ecryptfs.txt | 72 development, since secret values will be written out to the system log
|
/linux-4.4.14/include/linux/ |
D | ipv6.h | 60 struct in6_addr secret; member
|
/linux-4.4.14/net/ipv6/ |
D | addrconf.c | 2986 struct in6_addr secret; in ipv6_generate_stable_address() member 2993 struct in6_addr secret; in ipv6_generate_stable_address() local 3000 secret = idev->cnf.stable_secret.secret; in ipv6_generate_stable_address() 3002 secret = net->ipv6.devconf_dflt->stable_secret.secret; in ipv6_generate_stable_address() 3015 data.secret = secret; in ipv6_generate_stable_address() 5359 struct ipv6_stable_secret *secret = ctl->data; in addrconf_sysctl_stable_secret() local 5370 if (!write && !secret->initialized) { in addrconf_sysctl_stable_secret() 5375 err = snprintf(str, sizeof(str), "%pI6", &secret->secret); in addrconf_sysctl_stable_secret() 5390 secret->initialized = true; in addrconf_sysctl_stable_secret() 5391 secret->secret = addr; in addrconf_sysctl_stable_secret()
|
/linux-4.4.14/net/bridge/ |
D | br_multicast.c | 74 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); in __br_ip4_hash() 83 mdb->secret) & (mdb->max - 1); in __br_ip6_hash() 340 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); in br_mdb_rehash() 342 mdb->secret = old->secret; in br_mdb_rehash()
|
D | br_private.h | 181 u32 secret; member
|
/linux-4.4.14/Documentation/usb/ |
D | authorization.txt | 88 verification stuff with PKI, so you don't depend on a shared secret,
|
/linux-4.4.14/Documentation/networking/ |
D | rxrpc.txt | 273 secret keys corresponding to the security types it permits. When a secure 274 connection is being set up, the kernel looks up the appropriate secret key 408 Similar to above but specifies a keyring of server secret keys to use (key 469 given the server's secret key as the instantiation data (see the example 475 socket then looks the server secret keys up in this keyring when secure 577 secret keys in it:
|
D | ip-sysctl.txt | 1643 This IPv6 address will be used as a secret to generate IPv6 1645 ones. All addresses generated after setting this secret will 1648 secret for the namespace, the interface specific ones can 1651 It is recommended to generate this secret during installation 1654 By default the stable secret is unset.
|
/linux-4.4.14/drivers/scsi/qla4xxx/ |
D | ql4_mbx.c | 1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1809 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
|
D | ql4_os.c | 755 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list() 2853 chap_tbl.secret, in qla4xxx_session_get_param() 2860 (char *)chap_tbl.secret, in qla4xxx_session_get_param() 3847 chap_tbl.secret, in qla4xxx_copy_fwddb_param() 3853 (char *)chap_tbl.secret, in qla4xxx_copy_fwddb_param() 6026 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap() 8030 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param() 8041 chap_tbl.secret, in qla4xxx_sysfs_ddb_get_param() 8043 rc = sprintf(buf, "%s\n", chap_tbl.secret); in qla4xxx_sysfs_ddb_get_param() 8277 chap_tbl.secret, in qla4xxx_sysfs_ddb_set_param()
|
D | ql4_fw.h | 819 uint8_t secret[MAX_CHAP_SECRET_LEN]; member
|
/linux-4.4.14/Documentation/input/ |
D | input.txt | 151 Corp. considers the protocol a trade secret and won't disclose a word
|
/linux-4.4.14/drivers/block/drbd/ |
D | drbd_receiver.c | 4903 char secret[SHARED_SECRET_MAX]; /* 64 byte */ in drbd_do_auth() local 4915 memcpy(secret, nc->shared_secret, key_len); in drbd_do_auth() 4921 rv = crypto_hash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); in drbd_do_auth()
|
/linux-4.4.14/firmware/ |
D | WHENCE | 187 * or public access to this firmware which is a trade secret of Emagic,
|
/linux-4.4.14/Documentation/sound/oss/ |
D | README.OSS | 627 then booting Linux using loadlin. CS4232C.EXE loads a secret firmware
|