Searched refs:nonce (Results 1 - 49 of 49) sorted by relevance

/linux-4.1.27/net/mac80211/
H A Daes_gmac.h16 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
H A Daes_gmac.c24 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, ieee80211_aes_gmac() argument
45 memcpy(iv, nonce, GMAC_NONCE_LEN); ieee80211_aes_gmac()
H A Dwpa.c1111 u8 nonce[12]; ieee80211_crypto_aes_gmac_encrypt() local
1139 memcpy(nonce, hdr->addr2, ETH_ALEN); ieee80211_crypto_aes_gmac_encrypt()
1140 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); ieee80211_crypto_aes_gmac_encrypt()
1143 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, ieee80211_crypto_aes_gmac_encrypt()
1157 u8 aad[20], mic[16], ipn[6], nonce[12]; ieee80211_crypto_aes_gmac_decrypt() local
1185 memcpy(nonce, hdr->addr2, ETH_ALEN); ieee80211_crypto_aes_gmac_decrypt()
1186 memcpy(nonce + ETH_ALEN, ipn, 6); ieee80211_crypto_aes_gmac_decrypt()
1188 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, ieee80211_crypto_aes_gmac_decrypt()
/linux-4.1.27/net/ceph/
H A Dauth_x.h32 u64 nonce; member in struct:ceph_x_authorizer
H A Dauth_x_protocol.h71 __le64 nonce; member in struct:ceph_x_authorize_b
H A Dauth_x.c337 get_random_bytes(&au->nonce, sizeof(au->nonce)); ceph_x_build_authorizer()
339 msg_b.nonce = cpu_to_le64(au->nonce); ceph_x_build_authorizer()
346 dout(" built authorizer nonce %llx len %d\n", au->nonce, ceph_x_build_authorizer()
613 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) ceph_x_verify_authorizer_reply()
617 dout("verify_authorizer_reply nonce %llx got %llx ret %d\n", ceph_x_verify_authorizer_reply()
618 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); ceph_x_verify_authorizer_reply()
H A Dmessenger.c1994 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { process_banner()
1997 (int)le32_to_cpu(con->peer_addr.nonce), process_banner()
1999 (int)le32_to_cpu(con->actual_peer_addr.nonce)); process_banner()
2972 /* select a random nonce */ ceph_messenger_init()
2974 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); ceph_messenger_init()
H A Dmon_client.c769 monc->monmap->mon_inst[i].addr.nonce = 0; build_initial_monmap()
/linux-4.1.27/net/dccp/
H A Dackvec.h64 * @av_buf_nonce: ECN nonce sums, each covering subsequent segments of up to
124 * @nonce: whether @vec had an ECN nonce of 0 or 1
132 nonce:1; member in struct:dccp_ackvec_parsed
136 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
H A Dackvec.c350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) dccp_ackvec_parsed_add() argument
358 new->nonce = nonce; dccp_ackvec_parsed_add()
H A Doptions.c408 u8 i, nonce = 0; dccp_insert_option_ackvec() local
447 nonce ^= av->av_buf_nonce[i]; dccp_insert_option_ackvec()
471 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) dccp_insert_option_ackvec()
/linux-4.1.27/drivers/crypto/nx/
H A Dnx-aes-gcm.c79 char *nonce = nx_ctx->priv.gcm.nonce; gcm4106_aes_nx_set_key() local
91 memcpy(nonce, in_key + key_len, 4); gcm4106_aes_nx_set_key()
461 char *nonce = nx_ctx->priv.gcm.nonce; gcm4106_aes_nx_encrypt() local
463 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); gcm4106_aes_nx_encrypt()
474 char *nonce = nx_ctx->priv.gcm.nonce; gcm4106_aes_nx_decrypt() local
476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); gcm4106_aes_nx_decrypt()
H A Dnx.h102 u8 nonce[NX_GCM4106_NONCE_LEN]; member in struct:nx_gcm_priv
116 u8 nonce[NX_CCM4309_NONCE_LEN]; member in struct:nx_ccm_priv
124 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:nx_ctr_priv
H A Dnx-aes-ctr.c75 memcpy(nx_ctx->priv.ctr.nonce, ctr3686_aes_nx_set_key()
136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); ctr3686_aes_nx_crypt()
H A Dnx-aes-ccm.c76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); ccm4309_aes_nx_set_key()
502 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); ccm4309_aes_nx_encrypt()
534 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); ccm4309_aes_nx_decrypt()
/linux-4.1.27/fs/ext4/
H A Dcrypto_policy.c74 BUILD_BUG_ON(sizeof(ctx.nonce) != EXT4_KEY_DERIVATION_NONCE_SIZE); ext4_create_encryption_context_from_policy()
75 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); ext4_create_encryption_context_from_policy()
190 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); ext4_inherit_context()
H A Dext4_crypto.h46 * 16 bytes: Encryption Key derivation nonce
54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE]; member in struct:ext4_encryption_context
H A Dcrypto_key.c151 res = ext4_derive_key_aes(ctx.nonce, master_key->raw, crypt_key->raw); ext4_generate_encryption_key()
/linux-4.1.27/arch/powerpc/perf/
H A Dhv-24x7.c375 int nonce) event_to_attr()
394 if (!nonce) event_to_attr()
399 (int)event_name_len, ev_name, ev_suffix, nonce); event_to_attr()
417 int nonce) event_to_desc_attr()
427 return device_str_attr_create(name, nl, nonce, desc, dl); event_to_desc_attr()
431 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) event_to_long_desc_attr() argument
441 return device_str_attr_create(name, nl, nonce, desc, dl); event_to_long_desc_attr()
445 struct hv_24x7_event_data *event, int nonce) event_data_to_attrs()
451 *attrs = event_to_attr(ix, event, event->domain, nonce); event_data_to_attrs()
456 nonce); event_data_to_attrs()
829 int nonce; create_events_from_catalog() local
840 nonce = event_uniq_add(&ev_uniq, name, nl, event->domain); create_events_from_catalog()
842 event, nonce); create_events_from_catalog()
849 event_descs[desc_ct] = event_to_desc_attr(event, nonce); create_events_from_catalog()
853 event_to_long_desc_attr(event, nonce); create_events_from_catalog()
372 event_to_attr(unsigned ix, struct hv_24x7_event_data *event, unsigned domain, int nonce) event_to_attr() argument
416 event_to_desc_attr(struct hv_24x7_event_data *event, int nonce) event_to_desc_attr() argument
444 event_data_to_attrs(unsigned ix, struct attribute **attrs, struct hv_24x7_event_data *event, int nonce) event_data_to_attrs() argument
/linux-4.1.27/drivers/usb/wusbcore/
H A Dsecurity.c396 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); wusb_dev_4way_handshake()
443 /* Setup the CCM nonce */ wusb_dev_4way_handshake()
451 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); wusb_dev_4way_handshake()
452 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); wusb_dev_4way_handshake()
479 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); wusb_dev_4way_handshake()
H A Dcrypto.c85 * B0 contains flags, the CCM nonce and l(m).
154 * @n: CCM nonce
387 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, wusb_oob_mic_verify()
480 printk(KERN_ERR "E: keydvt in: nonce\n"); wusb_key_derive_verify()
/linux-4.1.27/crypto/
H A Dctr.c30 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:crypto_rfc3686_ctx
259 /* the nonce is stored in bytes at end of key */ crypto_rfc3686_setkey()
263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), crypto_rfc3686_setkey()
290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); crypto_rfc3686_crypt()
H A Dvmac.c536 /* Invalidate nonce/aes cache and reset other elements */ vmac_set_key()
537 ctx->__vmac_ctx.cached_nonce[0] = (u64)-1; /* Ensure illegal nonce */ vmac_set_key()
538 ctx->__vmac_ctx.cached_nonce[1] = (u64)0; /* Ensure illegal nonce */ vmac_set_key()
603 u8 nonce[16] = {}; vmac_final() local
614 mac = vmac(ctx->partial, ctx->partial_size, nonce, NULL, ctx); vmac_final()
H A Dgcm.c37 u8 nonce[4]; member in struct:crypto_rfc4106_ctx
48 u8 nonce[4]; member in struct:crypto_rfc4543_ctx
869 memcpy(ctx->nonce, key + keylen, 4); crypto_rfc4106_setkey()
907 memcpy(iv, ctx->nonce, 4); crypto_rfc4106_crypt()
1080 memcpy(ctx->nonce, key + keylen, 4); crypto_rfc4543_setkey()
1136 memcpy(iv, ctx->nonce, 4); crypto_rfc4543_crypt()
H A Dccm.c36 u8 nonce[3]; member in struct:crypto_rfc4309_ctx
649 memcpy(ctx->nonce, key + keylen, 3); crypto_rfc4309_setkey()
690 memcpy(iv + 1, ctx->nonce, 3); crypto_rfc4309_crypt()
H A Ddrbg.c1078 * With a derivation function, a nonce is required in addition drbg_seed()
1079 * to the entropy. A nonce must be at least 1/2 of the security drbg_seed()
1080 * strength of the DRBG in size. Thus, entropy * nonce is 3/2 drbg_seed()
1081 * of the strength. The consideration of a nonce is only drbg_seed()
H A Dtestmgr.h20340 * use a 13-byte nonce, we only support an 11-byte nonce. Similarly, all of
20341 * Special Publication 800-38C's test vectors also use nonce lengths our
20346 * part of the nonce which combine w/the iv, but need to be input this way.
/linux-4.1.27/drivers/crypto/qce/
H A Dcommon.h31 /* maximum nonce bytes */
/linux-4.1.27/drivers/crypto/caam/
H A Dpdb.h197 u32 nonce; member in struct:wimax_encap_pdb
209 u32 nonce; member in struct:wimax_decap_pdb
H A Dcaamalg.c203 u32 *nonce; append_key_aead() local
209 * | enckeylen = encryption key size + nonce size append_key_aead()
230 nonce = (u32 *)((void *)ctx->key + ctx->split_key_pad_len + append_key_aead()
232 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | append_key_aead()
1767 * in the nonce. Update the AES key length. rfc4106_setkey()
1806 * in the nonce. Update the AES key length. rfc4543_setkey()
1837 u32 *nonce; ablkcipher_setkey() local
1888 /* Load nonce into CONTEXT1 reg */ ablkcipher_setkey()
1890 nonce = (u32 *)(key + keylen); ablkcipher_setkey()
1891 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | ablkcipher_setkey()
1947 /* Load nonce into CONTEXT1 reg */ ablkcipher_setkey()
1949 nonce = (u32 *)(key + keylen); ablkcipher_setkey()
1950 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | ablkcipher_setkey()
2012 nonce = (u32 *)(key + keylen); ablkcipher_setkey()
2013 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | ablkcipher_setkey()
/linux-4.1.27/drivers/crypto/ccp/
H A Dccp-crypto-aes.c164 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); ccp_aes_rfc3686_setkey()
177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); ccp_aes_rfc3686_crypt()
H A Dccp-crypto.h85 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:ccp_aes_ctx
/linux-4.1.27/include/rxrpc/
H A Dpacket.h142 __be32 nonce; /* encrypted random number */ member in struct:rxkad_challenge
162 __be32 inc_nonce; /* challenge nonce + 1 */
/linux-4.1.27/include/linux/ceph/
H A Dmsgr.h64 __le32 nonce; /* unique id for process (e.g. pid) */ member in struct:ceph_entity_addr
/linux-4.1.27/drivers/staging/skein/
H A Dskein_base.h179 #define SKEIN_BLK_TYPE_NONCE (20) /* nonce for PRNG */
191 #define SKEIN_T1_BLK_TYPE_NONCE SKEIN_T1_BLK_TYPE(NONCE)/* nonce for PRNG */
/linux-4.1.27/net/rxrpc/
H A Drxkad.c585 challenge.nonce = htonl(conn->security_nonce); rxkad_issue_challenge()
747 u32 version, nonce, min_level, abort_code; rxkad_respond_to_challenge() local
769 nonce = ntohl(challenge.nonce); rxkad_respond_to_challenge()
773 ntohl(sp->hdr.serial), version, nonce, min_level); rxkad_respond_to_challenge()
800 resp.encrypted.inc_nonce = htonl(nonce + 1); rxkad_respond_to_challenge()
/linux-4.1.27/arch/x86/crypto/
H A Daesni-intel_glue.c54 u8 nonce[4]; member in struct:aesni_rfc4106_gcm_ctx
907 /*Account for 4 byte nonce at the end.*/ common_rfc4106_set_key()
915 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); common_rfc4106_set_key()
1028 *(iv+i) = ctx->nonce[i]; __driver_rfc4106_encrypt()
1118 *(iv+i) = ctx->nonce[i]; __driver_rfc4106_decrypt()
/linux-4.1.27/drivers/crypto/
H A Dixp4xx_crypto.c186 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:ixp_ctx
855 /* the nonce is stored in bytes at end of key */ ablk_rfc3686_setkey()
859 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), ablk_rfc3686_setkey()
958 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); ablk_rfc3686_crypt()
H A Ds5p-sss.c170 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:s5p_aes_ctx
/linux-4.1.27/include/linux/usb/
H A Dwusb.h359 * @n: CCM nonce, n->sfn == 0, TKID as established in the
/linux-4.1.27/net/xfrm/
H A Dxfrm_algo.c516 .defkeybits = 160, /* 128-bit key + 32-bit nonce */
/linux-4.1.27/fs/cifs/
H A Dcifsencrypt.c795 unsigned char sec_key[CIFS_SESS_KEY_SIZE]; /* a nonce */ calc_seckey()
826 /* make secondary_key/nonce as session key */ calc_seckey()
/linux-4.1.27/security/keys/
H A Dtrusted.c428 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) oiap() argument
441 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], oiap()
/linux-4.1.27/arch/s390/crypto/
H A Dprng.c394 /* followed by 16 bytes of unique nonce */ prng_sha512_instantiate()
/linux-4.1.27/net/sctp/
H A Dtransport.c97 /* Initialize the 64-bit random nonce sent with heartbeat. */ sctp_transport_init()
H A Dsm_statefuns.c1171 /* Validate the 64-bit random nonce. */ sctp_sf_backbeat_8_3()
/linux-4.1.27/drivers/scsi/
H A Dconstants.c1080 {0x6F06, "Insufficient block count for binding nonce recording"},
1081 {0x6F07, "Conflict in binding nonce recording"},
/linux-4.1.27/drivers/staging/rtl8723au/include/
H A Drtl8723a_bt-coexist.h59 AESCCMP_N_RESERVED = 0, /* reserved nonce octet value */
/linux-4.1.27/include/uapi/linux/usb/
H A Dch9.h890 __u8 nonce[16]; member in struct:usb_handshake

Completed in 1625 milliseconds