Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 57) sorted by relevance

123

/kernel/linux/linux-5.10/include/crypto/
Dcurve25519.h29 const u8 secret[CURVE25519_KEY_SIZE]);
33 const u8 secret[CURVE25519_KEY_SIZE], in curve25519()
37 curve25519_arch(mypublic, secret, basepoint); in curve25519()
39 curve25519_generic(mypublic, secret, basepoint); in curve25519()
46 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public()
48 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public()
53 curve25519_base_arch(pub, secret); in curve25519_generate_public()
55 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public()
59 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret()
61 secret[0] &= 248; in curve25519_clamp_secret()
[all …]
/kernel/linux/linux-5.10/crypto/
Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
61 struct kpp_secret secret; in crypto_ecdh_decode_key() local
66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
70 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key()
75 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
71 struct kpp_secret secret; in crypto_dh_decode_key() local
76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key()
77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key()
84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
Dcurve25519-generic.c12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
15 curve25519_generate_secret(secret); in curve25519_set_secret()
18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
Dtestmgr.h164 const unsigned char *secret; member
1244 .secret =
1353 .secret =
1465 .secret = (u8[32]){ 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d,
1483 .secret = (u8[32]){ 0x5d, 0xab, 0x08, 0x7e, 0x62, 0x4a, 0x8a, 0x4b,
1501 .secret = (u8[32]){ 1 },
1516 .secret = (u8[32]){ 1 },
1531 .secret = (u8[32]){ 0xa5, 0x46, 0xe3, 0x6b, 0xf0, 0x52, 0x7c, 0x9d,
1549 .secret = (u8[32]){ 0xff, 0xff, 0xff, 0xff, 0x0a, 0xff, 0xff, 0xff,
1567 .secret = (u8[32]){ 0x8e, 0x0a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
[all …]
/kernel/linux/linux-5.10/fs/crypto/
Dkeyring.c41 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument
43 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
44 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
413 struct fscrypt_master_key_secret *secret, in add_new_master_key() argument
441 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key()
458 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument
485 move_master_key_secret(&mk->mk_secret, secret); in add_existing_master_key()
492 struct fscrypt_master_key_secret *secret, in do_add_master_key() argument
506 err = add_new_master_key(sb, secret, mk_spec); in do_add_master_key()
513 err = add_existing_master_key(mk, secret); in do_add_master_key()
[all …]
/kernel/linux/linux-5.10/arch/arm/crypto/
Dcurve25519-glue.c23 const u8 secret[CURVE25519_KEY_SIZE],
43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch()
52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
55 curve25519_generate_secret(secret); in curve25519_set_secret()
58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
/kernel/linux/linux-5.10/net/sctp/
Dauth.c258 struct sctp_auth_bytes *secret; in sctp_auth_asoc_set_secret() local
266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
267 if (!secret) in sctp_auth_asoc_set_secret()
271 memcpy(secret->data, ep_key->key->data, ep_key->key->len); in sctp_auth_asoc_set_secret()
275 memcpy(secret->data + offset, first_vector->data, first_vector->len); in sctp_auth_asoc_set_secret()
278 memcpy(secret->data + offset, last_vector->data, last_vector->len); in sctp_auth_asoc_set_secret()
280 return secret; in sctp_auth_asoc_set_secret()
295 struct sctp_auth_bytes *secret = NULL; in sctp_auth_asoc_create_secret() local
340 secret = sctp_auth_asoc_set_secret(ep_key, first_vector, last_vector, in sctp_auth_asoc_create_secret()
346 return secret; in sctp_auth_asoc_create_secret()
[all …]
/kernel/linux/linux-5.10/arch/x86/crypto/
Dcurve25519-x86_64.c1384 const u8 secret[CURVE25519_KEY_SIZE], in curve25519_arch()
1388 curve25519_ever64(mypublic, secret, basepoint); in curve25519_arch()
1390 curve25519_generic(mypublic, secret, basepoint); in curve25519_arch()
1395 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
1398 curve25519_ever64_base(pub, secret); in curve25519_base_arch()
1400 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_base_arch()
1407 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
1410 curve25519_generate_secret(secret); in curve25519_set_secret()
1413 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
1422 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_generate_public_key() local
[all …]
/kernel/linux/linux-5.10/net/bluetooth/
Decdh_helper.c61 u8 secret[32]) in compute_ecdh_secret()
85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret()
101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret()
102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
Decdh_helper.h27 u8 secret[32]);
/kernel/linux/linux-5.10/security/keys/
Ddh.c241 uint8_t *secret; in __keyctl_dh_compute() local
306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute()
307 if (!secret) { in __keyctl_dh_compute()
311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute()
321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute()
402 kfree_sensitive(secret); in __keyctl_dh_compute()
/kernel/linux/linux-5.10/net/ceph/
Dauth_x.c54 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument
64 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt()
74 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument
81 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt()
94 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument
102 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt()
158 struct ceph_crypto_key *secret, in process_one_ticket() argument
194 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket()
267 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
283 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply()
[all …]
Dauth_x.h41 struct ceph_crypto_key secret; member
/kernel/linux/linux-5.10/net/ipv6/
Dseg6.c99 char *secret; in seg6_genl_sethmac() local
149 secret = (char *)nla_data(info->attrs[SEG6_ATTR_SECRET]); in seg6_genl_sethmac()
157 memcpy(hinfo->secret, secret, slen); in seg6_genl_sethmac()
250 nla_put(msg, SEG6_ATTR_SECRET, hinfo->slen, hinfo->secret) || in __seg6_hmac_fill_info()
/kernel/linux/linux-5.10/include/keys/
Dtrusted_tpm.h21 unsigned char secret[SHA1_DIGEST_SIZE]; member
80 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
/kernel/linux/linux-5.10/Documentation/security/keys/
Decryptfs.rst70 into the '/secret' directory::
73 ecryptfs_cipher=aes,ecryptfs_key_bytes=32 /secret /secret
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/engine/
Dfalcon.c141 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; in nvkm_falcon_oneinit()
145 falcon->secret = (caps & 0x00000030) >> 4; in nvkm_falcon_oneinit()
153 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); in nvkm_falcon_oneinit()
171 if (falcon->secret && falcon->version < 4) { in nvkm_falcon_init()
/kernel/linux/common_modules/tzdriver/core/
Dsmc_smp.c694 const struct smc_cmd_ret *secret, unsigned long ops) in set_smc_send_arg() argument
696 if (secret->exit == SMC_EXIT_PREEMPTED) { in set_smc_send_arg()
698 in_param->x3 = secret->ta; in set_smc_send_arg()
699 in_param->x4 = secret->target; in set_smc_send_arg()
703 in_param->x4 = secret->target; in set_smc_send_arg()
755 struct smc_cmd_ret *secret, bool need_kill) in smp_smc_send() argument
767 set_smc_send_arg(&in_param, secret, ops); in smp_smc_send()
775 secret->exit = out_param.exit_reason; in smp_smc_send()
776 secret->ta = out_param.ta; in smp_smc_send()
777 secret->target = out_param.target; in smp_smc_send()
[all …]
/kernel/linux/linux-5.10/drivers/net/wireguard/
Dcookie.c24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init()
100 get_random_bytes(checker->secret, NOISE_HASH_LEN); in make_cookie()
106 blake2s_init_key(&state, COOKIE_LEN, checker->secret, NOISE_HASH_LEN); in make_cookie()
Dnoise.c349 u8 secret[BLAKE2S_HASH_SIZE]; in kdf() local
360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
388 memzero_explicit(secret, BLAKE2S_HASH_SIZE); in kdf()
Dcookie.h15 u8 secret[NOISE_HASH_LEN]; member
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/falcon/
Dbase.c31 if (secure && !falcon->secret) { in nvkm_falcon_load_imem()
157 falcon->secret = (reg >> 4) & 0x3; in nvkm_falcon_oneinit()
/kernel/linux/linux-5.10/include/net/
Dseg6_hmac.h30 char secret[SEG6_HMAC_SECRET_LEN]; member
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspecial-register-buffer-data-sampling.rst64 EGETKEY instructions to overwrite secret special register data in the shared
65 staging buffer before the secret data can be accessed by another logical
70 register read is complete and the secret data in the shared staging buffer is

123