Home
last modified time | relevance | path

Searched full:secret (Results 1 – 25 of 409) sorted by relevance

12345678910>>...17

/OK3568_Linux_fs/kernel/include/crypto/
H A Dcurve25519.h29 const u8 secret[CURVE25519_KEY_SIZE]);
33 const u8 secret[CURVE25519_KEY_SIZE], in curve25519()
37 curve25519_arch(mypublic, secret, basepoint); in curve25519()
39 curve25519_generic(mypublic, secret, basepoint); in curve25519()
46 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_generate_public()
48 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public()
53 curve25519_base_arch(pub, secret); in curve25519_generate_public()
55 curve25519_generic(pub, secret, curve25519_base_point); in curve25519_generate_public()
59 static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE]) in curve25519_clamp_secret()
61 secret[0] &= 248; in curve25519_clamp_secret()
[all …]
/OK3568_Linux_fs/kernel/fs/crypto/
H A Dkeyring.c41 static void wipe_master_key_secret(struct fscrypt_master_key_secret *secret) in wipe_master_key_secret() argument
43 fscrypt_destroy_hkdf(&secret->hkdf); in wipe_master_key_secret()
44 memzero_explicit(secret, sizeof(*secret)); in wipe_master_key_secret()
59 * The master key secret and any embedded subkeys should have already in fscrypt_free_master_key()
409 * Allocate a new fscrypt_master_key, transfer the given secret over to it, and
413 struct fscrypt_master_key_secret *secret, in add_new_master_key() argument
441 move_master_key_secret(&mk->mk_secret, secret); in add_new_master_key()
458 struct fscrypt_master_key_secret *secret) in add_existing_master_key() argument
481 /* Re-add the secret if needed. */ in add_existing_master_key()
485 move_master_key_secret(&mk->mk_secret, secret); in add_existing_master_key()
[all …]
/OK3568_Linux_fs/kernel/crypto/
H A Decdh_helper.c37 struct kpp_secret secret = { in crypto_ecdh_encode_key() local
48 ptr = ecdh_pack_data(ptr, &secret, sizeof(secret)); in crypto_ecdh_encode_key()
61 struct kpp_secret secret; in crypto_ecdh_decode_key() local
66 ptr = ecdh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_ecdh_decode_key()
67 if (secret.type != CRYPTO_KPP_SECRET_TYPE_ECDH) in crypto_ecdh_decode_key()
70 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key()
75 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
H A Ddh_helper.c44 struct kpp_secret secret = { in crypto_dh_encode_key() local
52 ptr = dh_pack_data(ptr, end, &secret, sizeof(secret)); in crypto_dh_encode_key()
71 struct kpp_secret secret; in crypto_dh_decode_key() local
76 ptr = dh_unpack_data(&secret, ptr, sizeof(secret)); in crypto_dh_decode_key()
77 if (secret.type != CRYPTO_KPP_SECRET_TYPE_DH) in crypto_dh_decode_key()
84 if (secret.len != crypto_dh_key_len(params)) in crypto_dh_decode_key()
H A Dcurve25519-generic.c12 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
15 curve25519_generate_secret(secret); in curve25519_set_secret()
18 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
27 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
45 curve25519_generic(buf, secret, bp); in curve25519_compute_value()
/OK3568_Linux_fs/kernel/arch/arm/crypto/
H A Dcurve25519-glue.c23 const u8 secret[CURVE25519_KEY_SIZE],
43 const u8 secret[CURVE25519_KEY_SIZE]) in curve25519_base_arch()
45 return curve25519_arch(pub, secret, curve25519_base_point); in curve25519_base_arch()
52 u8 *secret = kpp_tfm_ctx(tfm); in curve25519_set_secret() local
55 curve25519_generate_secret(secret); in curve25519_set_secret()
58 memcpy(secret, buf, CURVE25519_KEY_SIZE); in curve25519_set_secret()
67 const u8 *secret = kpp_tfm_ctx(tfm); in curve25519_compute_value() local
85 curve25519_arch(buf, secret, bp); in curve25519_compute_value()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-perl/recipes-perl/libauthen/libauthen-radius-perl/
H A Dtest.pl-adjust-for-ptest.patch41 +$secret = "testing123";
47 -print "Enter shared-secret of your Radius server: "; chomp ($secret = <STDIN>);
51 +print "shared-secret of your Radius server: $secret\n";
57 $r = new Authen::Radius(Host => $host, Secret => $secret, Debug => 1);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Decjpake.h29 * strong shared secret from a (potentially low entropy) pre-shared
92 mbedtls_mpi s; /**< Pre-shared secret (passphrase) */
120 * \param secret The pre-shared secret (passphrase). This must be
123 * \param len The length of the pre-shared secret \p secret.
132 const unsigned char *secret,
229 * \brief Derive the shared secret
230 * (TLS: Pre-Master Secret).
234 * \param buf The buffer to write the derived secret to. This must
H A Ddes.h127 * \param key 8-byte secret key
141 * \param key 8-byte secret key
154 * \param key 8-byte secret key
168 * \param key 8-byte secret key
182 * \param key 8-byte secret key
196 * \param key 16-byte secret key
207 * \param key 16-byte secret key
218 * \param key 24-byte secret key
229 * \param key 24-byte secret key
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Decjpake.h29 * strong shared secret from a (potentially low entropy) pre-shared
92 mbedtls_mpi s; /**< Pre-shared secret (passphrase) */
120 * \param secret The pre-shared secret (passphrase). This must be
123 * \param len The length of the pre-shared secret \p secret.
132 const unsigned char *secret,
229 * \brief Derive the shared secret
230 * (TLS: Pre-Master Secret).
234 * \param buf The buffer to write the derived secret to. This must
H A Ddes.h127 * \param key 8-byte secret key
141 * \param key 8-byte secret key
154 * \param key 8-byte secret key
168 * \param key 8-byte secret key
182 * \param key 8-byte secret key
196 * \param key 16-byte secret key
207 * \param key 16-byte secret key
218 * \param key 24-byte secret key
229 * \param key 24-byte secret key
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Decjpake.h29 * strong shared secret from a (potentially low entropy) pre-shared
92 mbedtls_mpi s; /**< Pre-shared secret (passphrase) */
120 * \param secret The pre-shared secret (passphrase). This must be
123 * \param len The length of the pre-shared secret \p secret.
132 const unsigned char *secret,
229 * \brief Derive the shared secret
230 * (TLS: Pre-Master Secret).
234 * \param buf The buffer to write the derived secret to. This must
H A Ddes.h127 * \param key 8-byte secret key
141 * \param key 8-byte secret key
154 * \param key 8-byte secret key
168 * \param key 8-byte secret key
182 * \param key 8-byte secret key
196 * \param key 16-byte secret key
207 * \param key 16-byte secret key
218 * \param key 24-byte secret key
229 * \param key 24-byte secret key
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Decjpake.h29 * strong shared secret from a (potentially low entropy) pre-shared
92 mbedtls_mpi s; /**< Pre-shared secret (passphrase) */
120 * \param secret The pre-shared secret (passphrase). This must be
123 * \param len The length of the pre-shared secret \p secret.
132 const unsigned char *secret,
229 * \brief Derive the shared secret
230 * (TLS: Pre-Master Secret).
234 * \param buf The buffer to write the derived secret to. This must
H A Ddes.h127 * \param key 8-byte secret key
141 * \param key 8-byte secret key
154 * \param key 8-byte secret key
168 * \param key 8-byte secret key
182 * \param key 8-byte secret key
196 * \param key 16-byte secret key
207 * \param key 16-byte secret key
218 * \param key 24-byte secret key
229 * \param key 24-byte secret key
/OK3568_Linux_fs/buildroot/dl/rtmpdump/git/librtmp/
H A Ddh.h72 static int MDH_compute_key(uint8_t *secret, size_t len, MP_t pub, MDH *dh) in MDH_compute_key() argument
75 dhm_calc_secret(&dh->ctx, secret, &len); in MDH_compute_key()
143 static int MDH_compute_key(uint8_t *secret, size_t len, MP_t pub, MDH *dh) in MDH_compute_key() argument
158 nettle_mpz_get_str_256(len, secret, k); in MDH_compute_key()
162 /* return the length of the shared secret key like DH_compute_key */ in MDH_compute_key()
188 #define MDH_compute_key(secret, seclen, pub, dh) DH_compute_key(secret, pub, dh) argument
346 /* computes the shared secret key from the private MDH value and the
351 uint8_t *secret) in DHComputeSharedSecretKey() argument
357 if (!dh || !secret || nPubkeyLen >= INT_MAX) in DHComputeSharedSecretKey()
368 res = MDH_compute_key(secret, nPubkeyLen, pubkeyBn, dh); in DHComputeSharedSecretKey()
/OK3568_Linux_fs/kernel/net/bluetooth/
H A Decdh_helper.c56 * secret: memory where the ecdh computed shared secret will be saved.
61 u8 secret[32]) in compute_ecdh_secret()
85 sg_init_one(&dst, secret, 32); in compute_ecdh_secret()
96 pr_err("alg: ecdh: compute shared secret failed. err %d\n", in compute_ecdh_secret()
101 swap_digits((u64 *)secret, (u64 *)tmp, 4); in compute_ecdh_secret()
102 memcpy(secret, tmp, 32); in compute_ecdh_secret()
/OK3568_Linux_fs/kernel/security/keys/
H A Ddh.c137 * The src pointer is defined as Z || other info where Z is the shared secret
241 uint8_t *secret; in __keyctl_dh_compute() local
306 secret = kmalloc(secretlen, GFP_KERNEL); in __keyctl_dh_compute()
307 if (!secret) { in __keyctl_dh_compute()
311 ret = crypto_dh_encode_key(secret, secretlen, &dh_inputs); in __keyctl_dh_compute()
321 ret = crypto_kpp_set_secret(tfm, secret, secretlen); in __keyctl_dh_compute()
377 * Concatenate SP800-56A otherinfo past DH shared secret -- the in __keyctl_dh_compute()
378 * input to the KDF is (DH shared secret || otherinfo) in __keyctl_dh_compute()
402 kfree_sensitive(secret); in __keyctl_dh_compute()
/OK3568_Linux_fs/kernel/net/ceph/
H A Dauth_x.c54 static int ceph_x_encrypt(struct ceph_crypto_key *secret, void *buf, in ceph_x_encrypt() argument
64 ret = ceph_crypt(secret, true, buf + sizeof(u32), buf_len - sizeof(u32), in ceph_x_encrypt()
74 static int __ceph_x_decrypt(struct ceph_crypto_key *secret, void *p, in __ceph_x_decrypt() argument
81 ret = ceph_crypt(secret, false, p, ciphertext_len, ciphertext_len, in __ceph_x_decrypt()
94 static int ceph_x_decrypt(struct ceph_crypto_key *secret, void **p, void *end) in ceph_x_decrypt() argument
102 ret = __ceph_x_decrypt(secret, *p, ciphertext_len); in ceph_x_decrypt()
158 struct ceph_crypto_key *secret, in process_one_ticket() argument
194 ret = ceph_x_decrypt(secret, p, end); in process_one_ticket()
267 struct ceph_crypto_key *secret, in ceph_x_proc_ticket_reply() argument
283 ret = process_one_ticket(ac, secret, &p, end); in ceph_x_proc_ticket_reply()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
36 const uint8_t *secret, size_t secret_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
45 const EVP_MD *digest, const uint8_t *secret,
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
36 const uint8_t *secret, size_t secret_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
45 const EVP_MD *digest, const uint8_t *secret,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
36 const uint8_t *secret, size_t secret_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
45 const EVP_MD *digest, const uint8_t *secret,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
36 const uint8_t *secret, size_t secret_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
45 const EVP_MD *digest, const uint8_t *secret,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
36 const uint8_t *secret, size_t secret_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
45 const EVP_MD *digest, const uint8_t *secret,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dhkdf.h29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
36 const uint8_t *secret, size_t secret_len,
41 // keying material |secret| and salt |salt| using |digest|, and outputs
45 const EVP_MD *digest, const uint8_t *secret,

12345678910>>...17