/linux-4.1.27/net/mac80211/ |
H A D | aes_gmac.h | 16 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
|
H A D | aes_gmac.c | 24 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, ieee80211_aes_gmac() argument 45 memcpy(iv, nonce, GMAC_NONCE_LEN); ieee80211_aes_gmac()
|
H A D | wpa.c | 1111 u8 nonce[12]; ieee80211_crypto_aes_gmac_encrypt() local 1139 memcpy(nonce, hdr->addr2, ETH_ALEN); ieee80211_crypto_aes_gmac_encrypt() 1140 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); ieee80211_crypto_aes_gmac_encrypt() 1143 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, ieee80211_crypto_aes_gmac_encrypt() 1157 u8 aad[20], mic[16], ipn[6], nonce[12]; ieee80211_crypto_aes_gmac_decrypt() local 1185 memcpy(nonce, hdr->addr2, ETH_ALEN); ieee80211_crypto_aes_gmac_decrypt() 1186 memcpy(nonce + ETH_ALEN, ipn, 6); ieee80211_crypto_aes_gmac_decrypt() 1188 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, ieee80211_crypto_aes_gmac_decrypt()
|
/linux-4.1.27/net/ceph/ |
H A D | auth_x.h | 32 u64 nonce; member in struct:ceph_x_authorizer
|
H A D | auth_x_protocol.h | 71 __le64 nonce; member in struct:ceph_x_authorize_b
|
H A D | auth_x.c | 337 get_random_bytes(&au->nonce, sizeof(au->nonce)); ceph_x_build_authorizer() 339 msg_b.nonce = cpu_to_le64(au->nonce); ceph_x_build_authorizer() 346 dout(" built authorizer nonce %llx len %d\n", au->nonce, ceph_x_build_authorizer() 613 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) ceph_x_verify_authorizer_reply() 617 dout("verify_authorizer_reply nonce %llx got %llx ret %d\n", ceph_x_verify_authorizer_reply() 618 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); ceph_x_verify_authorizer_reply()
|
H A D | messenger.c | 1994 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { process_banner() 1997 (int)le32_to_cpu(con->peer_addr.nonce), process_banner() 1999 (int)le32_to_cpu(con->actual_peer_addr.nonce)); process_banner() 2972 /* select a random nonce */ ceph_messenger_init() 2974 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); ceph_messenger_init()
|
H A D | mon_client.c | 769 monc->monmap->mon_inst[i].addr.nonce = 0; build_initial_monmap()
|
/linux-4.1.27/net/dccp/ |
H A D | ackvec.h | 64 * @av_buf_nonce: ECN nonce sums, each covering subsequent segments of up to 124 * @nonce: whether @vec had an ECN nonce of 0 or 1 132 nonce:1; member in struct:dccp_ackvec_parsed 136 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
H A D | ackvec.c | 350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) dccp_ackvec_parsed_add() argument 358 new->nonce = nonce; dccp_ackvec_parsed_add()
|
H A D | options.c | 408 u8 i, nonce = 0; dccp_insert_option_ackvec() local 447 nonce ^= av->av_buf_nonce[i]; dccp_insert_option_ackvec() 471 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) dccp_insert_option_ackvec()
|
/linux-4.1.27/drivers/crypto/nx/ |
H A D | nx-aes-gcm.c | 79 char *nonce = nx_ctx->priv.gcm.nonce; gcm4106_aes_nx_set_key() local 91 memcpy(nonce, in_key + key_len, 4); gcm4106_aes_nx_set_key() 461 char *nonce = nx_ctx->priv.gcm.nonce; gcm4106_aes_nx_encrypt() local 463 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); gcm4106_aes_nx_encrypt() 474 char *nonce = nx_ctx->priv.gcm.nonce; gcm4106_aes_nx_decrypt() local 476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); gcm4106_aes_nx_decrypt()
|
H A D | nx.h | 102 u8 nonce[NX_GCM4106_NONCE_LEN]; member in struct:nx_gcm_priv 116 u8 nonce[NX_CCM4309_NONCE_LEN]; member in struct:nx_ccm_priv 124 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:nx_ctr_priv
|
H A D | nx-aes-ctr.c | 75 memcpy(nx_ctx->priv.ctr.nonce, ctr3686_aes_nx_set_key() 136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); ctr3686_aes_nx_crypt()
|
H A D | nx-aes-ccm.c | 76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); ccm4309_aes_nx_set_key() 502 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); ccm4309_aes_nx_encrypt() 534 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); ccm4309_aes_nx_decrypt()
|
/linux-4.1.27/fs/ext4/ |
H A D | crypto_policy.c | 74 BUILD_BUG_ON(sizeof(ctx.nonce) != EXT4_KEY_DERIVATION_NONCE_SIZE); ext4_create_encryption_context_from_policy() 75 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); ext4_create_encryption_context_from_policy() 190 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); ext4_inherit_context()
|
H A D | ext4_crypto.h | 46 * 16 bytes: Encryption Key derivation nonce 54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE]; member in struct:ext4_encryption_context
|
H A D | crypto_key.c | 151 res = ext4_derive_key_aes(ctx.nonce, master_key->raw, crypt_key->raw); ext4_generate_encryption_key()
|
/linux-4.1.27/arch/powerpc/perf/ |
H A D | hv-24x7.c | 375 int nonce) event_to_attr() 394 if (!nonce) event_to_attr() 399 (int)event_name_len, ev_name, ev_suffix, nonce); event_to_attr() 417 int nonce) event_to_desc_attr() 427 return device_str_attr_create(name, nl, nonce, desc, dl); event_to_desc_attr() 431 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) event_to_long_desc_attr() argument 441 return device_str_attr_create(name, nl, nonce, desc, dl); event_to_long_desc_attr() 445 struct hv_24x7_event_data *event, int nonce) event_data_to_attrs() 451 *attrs = event_to_attr(ix, event, event->domain, nonce); event_data_to_attrs() 456 nonce); event_data_to_attrs() 829 int nonce; create_events_from_catalog() local 840 nonce = event_uniq_add(&ev_uniq, name, nl, event->domain); create_events_from_catalog() 842 event, nonce); create_events_from_catalog() 849 event_descs[desc_ct] = event_to_desc_attr(event, nonce); create_events_from_catalog() 853 event_to_long_desc_attr(event, nonce); create_events_from_catalog() 372 event_to_attr(unsigned ix, struct hv_24x7_event_data *event, unsigned domain, int nonce) event_to_attr() argument 416 event_to_desc_attr(struct hv_24x7_event_data *event, int nonce) event_to_desc_attr() argument 444 event_data_to_attrs(unsigned ix, struct attribute **attrs, struct hv_24x7_event_data *event, int nonce) event_data_to_attrs() argument
|
/linux-4.1.27/drivers/usb/wusbcore/ |
H A D | security.c | 396 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); wusb_dev_4way_handshake() 443 /* Setup the CCM nonce */ wusb_dev_4way_handshake() 451 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); wusb_dev_4way_handshake() 452 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); wusb_dev_4way_handshake() 479 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); wusb_dev_4way_handshake()
|
H A D | crypto.c | 85 * B0 contains flags, the CCM nonce and l(m). 154 * @n: CCM nonce 387 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, wusb_oob_mic_verify() 480 printk(KERN_ERR "E: keydvt in: nonce\n"); wusb_key_derive_verify()
|
/linux-4.1.27/crypto/ |
H A D | ctr.c | 30 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:crypto_rfc3686_ctx 259 /* the nonce is stored in bytes at end of key */ crypto_rfc3686_setkey() 263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), crypto_rfc3686_setkey() 290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); crypto_rfc3686_crypt()
|
H A D | vmac.c | 536 /* Invalidate nonce/aes cache and reset other elements */ vmac_set_key() 537 ctx->__vmac_ctx.cached_nonce[0] = (u64)-1; /* Ensure illegal nonce */ vmac_set_key() 538 ctx->__vmac_ctx.cached_nonce[1] = (u64)0; /* Ensure illegal nonce */ vmac_set_key() 603 u8 nonce[16] = {}; vmac_final() local 614 mac = vmac(ctx->partial, ctx->partial_size, nonce, NULL, ctx); vmac_final()
|
H A D | gcm.c | 37 u8 nonce[4]; member in struct:crypto_rfc4106_ctx 48 u8 nonce[4]; member in struct:crypto_rfc4543_ctx 869 memcpy(ctx->nonce, key + keylen, 4); crypto_rfc4106_setkey() 907 memcpy(iv, ctx->nonce, 4); crypto_rfc4106_crypt() 1080 memcpy(ctx->nonce, key + keylen, 4); crypto_rfc4543_setkey() 1136 memcpy(iv, ctx->nonce, 4); crypto_rfc4543_crypt()
|
H A D | ccm.c | 36 u8 nonce[3]; member in struct:crypto_rfc4309_ctx 649 memcpy(ctx->nonce, key + keylen, 3); crypto_rfc4309_setkey() 690 memcpy(iv + 1, ctx->nonce, 3); crypto_rfc4309_crypt()
|
H A D | drbg.c | 1078 * With a derivation function, a nonce is required in addition drbg_seed() 1079 * to the entropy. A nonce must be at least 1/2 of the security drbg_seed() 1080 * strength of the DRBG in size. Thus, entropy * nonce is 3/2 drbg_seed() 1081 * of the strength. The consideration of a nonce is only drbg_seed()
|
H A D | testmgr.h | 20340 * use a 13-byte nonce, we only support an 11-byte nonce. Similarly, all of 20341 * Special Publication 800-38C's test vectors also use nonce lengths our 20346 * part of the nonce which combine w/the iv, but need to be input this way.
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | common.h | 31 /* maximum nonce bytes */
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | pdb.h | 197 u32 nonce; member in struct:wimax_encap_pdb 209 u32 nonce; member in struct:wimax_decap_pdb
|
H A D | caamalg.c | 203 u32 *nonce; append_key_aead() local 209 * | enckeylen = encryption key size + nonce size append_key_aead() 230 nonce = (u32 *)((void *)ctx->key + ctx->split_key_pad_len + append_key_aead() 232 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | append_key_aead() 1767 * in the nonce. Update the AES key length. rfc4106_setkey() 1806 * in the nonce. Update the AES key length. rfc4543_setkey() 1837 u32 *nonce; ablkcipher_setkey() local 1888 /* Load nonce into CONTEXT1 reg */ ablkcipher_setkey() 1890 nonce = (u32 *)(key + keylen); ablkcipher_setkey() 1891 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | ablkcipher_setkey() 1947 /* Load nonce into CONTEXT1 reg */ ablkcipher_setkey() 1949 nonce = (u32 *)(key + keylen); ablkcipher_setkey() 1950 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | ablkcipher_setkey() 2012 nonce = (u32 *)(key + keylen); ablkcipher_setkey() 2013 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | ablkcipher_setkey()
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 164 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); ccp_aes_rfc3686_setkey() 177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); ccp_aes_rfc3686_crypt()
|
H A D | ccp-crypto.h | 85 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:ccp_aes_ctx
|
/linux-4.1.27/include/rxrpc/ |
H A D | packet.h | 142 __be32 nonce; /* encrypted random number */ member in struct:rxkad_challenge 162 __be32 inc_nonce; /* challenge nonce + 1 */
|
/linux-4.1.27/include/linux/ceph/ |
H A D | msgr.h | 64 __le32 nonce; /* unique id for process (e.g. pid) */ member in struct:ceph_entity_addr
|
/linux-4.1.27/drivers/staging/skein/ |
H A D | skein_base.h | 179 #define SKEIN_BLK_TYPE_NONCE (20) /* nonce for PRNG */ 191 #define SKEIN_T1_BLK_TYPE_NONCE SKEIN_T1_BLK_TYPE(NONCE)/* nonce for PRNG */
|
/linux-4.1.27/net/rxrpc/ |
H A D | rxkad.c | 585 challenge.nonce = htonl(conn->security_nonce); rxkad_issue_challenge() 747 u32 version, nonce, min_level, abort_code; rxkad_respond_to_challenge() local 769 nonce = ntohl(challenge.nonce); rxkad_respond_to_challenge() 773 ntohl(sp->hdr.serial), version, nonce, min_level); rxkad_respond_to_challenge() 800 resp.encrypted.inc_nonce = htonl(nonce + 1); rxkad_respond_to_challenge()
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 54 u8 nonce[4]; member in struct:aesni_rfc4106_gcm_ctx 907 /*Account for 4 byte nonce at the end.*/ common_rfc4106_set_key() 915 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); common_rfc4106_set_key() 1028 *(iv+i) = ctx->nonce[i]; __driver_rfc4106_encrypt() 1118 *(iv+i) = ctx->nonce[i]; __driver_rfc4106_decrypt()
|
/linux-4.1.27/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 186 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:ixp_ctx 855 /* the nonce is stored in bytes at end of key */ ablk_rfc3686_setkey() 859 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), ablk_rfc3686_setkey() 958 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); ablk_rfc3686_crypt()
|
H A D | s5p-sss.c | 170 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:s5p_aes_ctx
|
/linux-4.1.27/include/linux/usb/ |
H A D | wusb.h | 359 * @n: CCM nonce, n->sfn == 0, TKID as established in the
|
/linux-4.1.27/net/xfrm/ |
H A D | xfrm_algo.c | 516 .defkeybits = 160, /* 128-bit key + 32-bit nonce */
|
/linux-4.1.27/fs/cifs/ |
H A D | cifsencrypt.c | 795 unsigned char sec_key[CIFS_SESS_KEY_SIZE]; /* a nonce */ calc_seckey() 826 /* make secondary_key/nonce as session key */ calc_seckey()
|
/linux-4.1.27/security/keys/ |
H A D | trusted.c | 428 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) oiap() argument 441 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], oiap()
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | prng.c | 394 /* followed by 16 bytes of unique nonce */ prng_sha512_instantiate()
|
/linux-4.1.27/net/sctp/ |
H A D | transport.c | 97 /* Initialize the 64-bit random nonce sent with heartbeat. */ sctp_transport_init()
|
H A D | sm_statefuns.c | 1171 /* Validate the 64-bit random nonce. */ sctp_sf_backbeat_8_3()
|
/linux-4.1.27/drivers/scsi/ |
H A D | constants.c | 1080 {0x6F06, "Insufficient block count for binding nonce recording"}, 1081 {0x6F07, "Conflict in binding nonce recording"},
|
/linux-4.1.27/drivers/staging/rtl8723au/include/ |
H A D | rtl8723a_bt-coexist.h | 59 AESCCMP_N_RESERVED = 0, /* reserved nonce octet value */
|
/linux-4.1.27/include/uapi/linux/usb/ |
H A D | ch9.h | 890 __u8 nonce[16]; member in struct:usb_handshake
|