Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 37 of 37) sorted by relevance

/linux-4.1.27/drivers/crypto/nx/
Dnx-aes-gcm.c79 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local
91 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key()
461 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local
463 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt()
474 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local
476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
Dnx.h102 u8 nonce[NX_GCM4106_NONCE_LEN]; member
116 u8 nonce[NX_CCM4309_NONCE_LEN]; member
124 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
Dnx-aes-ctr.c75 memcpy(nx_ctx->priv.ctr.nonce, in ctr3686_aes_nx_set_key()
136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt()
Dnx-aes-ccm.c76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key()
502 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_encrypt()
534 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_decrypt()
/linux-4.1.27/arch/powerpc/perf/
Dhv-24x7.c375 int nonce) in event_to_attr() argument
394 if (!nonce) in event_to_attr()
399 (int)event_name_len, ev_name, ev_suffix, nonce); in event_to_attr()
417 int nonce) in event_to_desc_attr() argument
427 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr()
431 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument
441 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr()
445 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument
451 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs()
456 nonce); in event_data_to_attrs()
[all …]
/linux-4.1.27/drivers/usb/wusbcore/
Dsecurity.c396 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); in wusb_dev_4way_handshake()
451 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); in wusb_dev_4way_handshake()
452 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); in wusb_dev_4way_handshake()
479 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); in wusb_dev_4way_handshake()
Dcrypto.c387 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, in wusb_oob_mic_verify()
/linux-4.1.27/net/dccp/
Dackvec.h132 nonce:1; member
136 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
Dackvec.c350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument
358 new->nonce = nonce; in dccp_ackvec_parsed_add()
Doptions.c408 u8 i, nonce = 0; in dccp_insert_option_ackvec() local
447 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec()
471 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
/linux-4.1.27/net/mac80211/
Daes_gmac.c24 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument
45 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
Daes_gmac.h16 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
Dwpa.c1111 u8 nonce[12]; in ieee80211_crypto_aes_gmac_encrypt() local
1139 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt()
1140 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt()
1143 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt()
1157 u8 aad[20], mic[16], ipn[6], nonce[12]; in ieee80211_crypto_aes_gmac_decrypt() local
1185 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt()
1186 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt()
1188 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
/linux-4.1.27/fs/ext4/
Dcrypto_policy.c74 BUILD_BUG_ON(sizeof(ctx.nonce) != EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_create_encryption_context_from_policy()
75 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_create_encryption_context_from_policy()
190 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_inherit_context()
Dext4_crypto.h54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE]; member
Dcrypto_key.c151 res = ext4_derive_key_aes(ctx.nonce, master_key->raw, crypt_key->raw); in ext4_generate_encryption_key()
/linux-4.1.27/net/ceph/
Dauth_x.c337 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer()
339 msg_b.nonce = cpu_to_le64(au->nonce); in ceph_x_build_authorizer()
346 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer()
613 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) in ceph_x_verify_authorizer_reply()
618 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
Dauth_x.h32 u64 nonce; member
Dauth_x_protocol.h71 __le64 nonce; member
Dmessenger.c1994 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner()
1997 (int)le32_to_cpu(con->peer_addr.nonce), in process_banner()
1999 (int)le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner()
2974 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
Dmon_client.c769 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
/linux-4.1.27/drivers/crypto/caam/
Dpdb.h197 u32 nonce; member
209 u32 nonce; member
Dcaamalg.c203 u32 *nonce; in append_key_aead() local
230 nonce = (u32 *)((void *)ctx->key + ctx->split_key_pad_len + in append_key_aead()
232 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in append_key_aead()
1837 u32 *nonce; in ablkcipher_setkey() local
1890 nonce = (u32 *)(key + keylen); in ablkcipher_setkey()
1891 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
1949 nonce = (u32 *)(key + keylen); in ablkcipher_setkey()
1950 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
2012 nonce = (u32 *)(key + keylen); in ablkcipher_setkey()
2013 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
/linux-4.1.27/crypto/
Dctr.c30 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey()
290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt()
Dgcm.c37 u8 nonce[4]; member
48 u8 nonce[4]; member
869 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey()
907 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt()
1080 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4543_setkey()
1136 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt()
Dccm.c36 u8 nonce[3]; member
649 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey()
690 memcpy(iv + 1, ctx->nonce, 3); in crypto_rfc4309_crypt()
Dvmac.c603 u8 nonce[16] = {}; in vmac_final() local
614 mac = vmac(ctx->partial, ctx->partial_size, nonce, NULL, ctx); in vmac_final()
/linux-4.1.27/net/rxrpc/
Drxkad.c585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
747 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local
769 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
773 ntohl(sp->hdr.serial), version, nonce, min_level); in rxkad_respond_to_challenge()
800 resp.encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()
/linux-4.1.27/include/rxrpc/
Dpacket.h142 __be32 nonce; /* encrypted random number */ member
/linux-4.1.27/include/linux/ceph/
Dmsgr.h64 __le32 nonce; /* unique id for process (e.g. pid) */ member
/linux-4.1.27/drivers/crypto/ccp/
Dccp-crypto-aes.c164 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_setkey()
177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt()
Dccp-crypto.h85 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
/linux-4.1.27/arch/x86/crypto/
Daesni-intel_glue.c54 u8 nonce[4]; member
915 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); in common_rfc4106_set_key()
1028 *(iv+i) = ctx->nonce[i]; in __driver_rfc4106_encrypt()
1118 *(iv+i) = ctx->nonce[i]; in __driver_rfc4106_decrypt()
/linux-4.1.27/include/uapi/linux/usb/
Dch9.h890 __u8 nonce[16]; member
/linux-4.1.27/drivers/crypto/
Dixp4xx_crypto.c186 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
859 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), in ablk_rfc3686_setkey()
958 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt()
Ds5p-sss.c170 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member
/linux-4.1.27/security/keys/
Dtrusted.c428 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) in oiap() argument
441 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], in oiap()