/linux-4.4.14/drivers/crypto/nx/ |
D | nx-aes-gcm.c | 78 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local 90 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 457 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local 459 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 474 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local 476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
|
D | nx.h | 102 u8 nonce[NX_GCM4106_NONCE_LEN]; member 116 u8 nonce[NX_CCM4309_NONCE_LEN]; member 124 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
|
D | nx-aes-ctr.c | 75 memcpy(nx_ctx->priv.ctr.nonce, in ctr3686_aes_nx_set_key() 136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt()
|
D | nx-aes-ccm.c | 76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key() 500 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_encrypt() 530 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_decrypt()
|
/linux-4.4.14/drivers/gpu/drm/radeon/ |
D | vce_v1_0.c | 46 uint32_t nonce[4]; member 190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
/linux-4.4.14/arch/powerpc/perf/ |
D | hv-24x7.c | 386 int nonce) in event_to_attr() argument 405 if (!nonce) in event_to_attr() 410 (int)event_name_len, ev_name, ev_suffix, nonce); in event_to_attr() 428 int nonce) in event_to_desc_attr() argument 438 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr() 442 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument 452 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr() 456 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument 462 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs() 467 nonce); in event_data_to_attrs() [all …]
|
/linux-4.4.14/drivers/usb/wusbcore/ |
D | security.c | 396 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); in wusb_dev_4way_handshake() 451 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); in wusb_dev_4way_handshake() 452 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); in wusb_dev_4way_handshake() 479 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); in wusb_dev_4way_handshake()
|
D | crypto.c | 387 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, in wusb_oob_mic_verify()
|
/linux-4.4.14/net/dccp/ |
D | ackvec.h | 132 nonce:1; member 136 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
D | ackvec.c | 350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument 358 new->nonce = nonce; in dccp_ackvec_parsed_add()
|
D | options.c | 408 u8 i, nonce = 0; in dccp_insert_option_ackvec() local 447 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec() 471 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
|
/linux-4.4.14/net/mac80211/ |
D | aes_gmac.c | 24 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 46 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
D | aes_gmac.h | 16 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
|
D | wpa.c | 1121 u8 nonce[12]; in ieee80211_crypto_aes_gmac_encrypt() local 1149 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt() 1150 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt() 1153 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt() 1167 u8 aad[20], mic[16], ipn[6], nonce[12]; in ieee80211_crypto_aes_gmac_decrypt() local 1195 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt() 1196 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt() 1198 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
|
/linux-4.4.14/fs/f2fs/ |
D | crypto_policy.c | 81 BUILD_BUG_ON(sizeof(ctx.nonce) != F2FS_KEY_DERIVATION_NONCE_SIZE); in f2fs_create_encryption_context_from_policy() 82 get_random_bytes(ctx.nonce, F2FS_KEY_DERIVATION_NONCE_SIZE); in f2fs_create_encryption_context_from_policy() 205 get_random_bytes(ctx.nonce, F2FS_KEY_DERIVATION_NONCE_SIZE); in f2fs_inherit_context()
|
D | f2fs_crypto.h | 56 char nonce[F2FS_KEY_DERIVATION_NONCE_SIZE]; member
|
D | crypto_key.c | 211 res = f2fs_derive_key_aes(ctx.nonce, master_key->raw, in _f2fs_get_encryption_info()
|
/linux-4.4.14/fs/ext4/ |
D | crypto_policy.c | 80 BUILD_BUG_ON(sizeof(ctx.nonce) != EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_create_encryption_context_from_policy() 81 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_create_encryption_context_from_policy() 219 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_inherit_context()
|
D | ext4_crypto.h | 54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE]; member
|
D | crypto_key.c | 234 res = ext4_derive_key_aes(ctx.nonce, master_key->raw, in _ext4_get_encryption_info()
|
/linux-4.4.14/net/ceph/ |
D | auth_x.c | 347 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer() 349 msg_b.nonce = cpu_to_le64(au->nonce); in ceph_x_build_authorizer() 356 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer() 622 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) in ceph_x_verify_authorizer_reply() 627 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
|
D | auth_x.h | 32 u64 nonce; member
|
D | auth_x_protocol.h | 71 __le64 nonce; member
|
D | messenger.c | 2007 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner() 2010 (int)le32_to_cpu(con->peer_addr.nonce), in process_banner() 2012 (int)le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner() 2987 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
|
D | mon_client.c | 797 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
|
/linux-4.4.14/drivers/crypto/caam/ |
D | pdb.h | 197 u32 nonce; member 209 u32 nonce; member
|
D | caamalg.c | 201 u32 *nonce; in append_key_aead() local 228 nonce = (u32 *)((void *)ctx->key + ctx->split_key_pad_len + in append_key_aead() 230 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in append_key_aead() 1467 u32 *nonce; in ablkcipher_setkey() local 1520 nonce = (u32 *)(key + keylen); in ablkcipher_setkey() 1521 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey() 1579 nonce = (u32 *)(key + keylen); in ablkcipher_setkey() 1580 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey() 1642 nonce = (u32 *)(key + keylen); in ablkcipher_setkey() 1643 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
|
/linux-4.4.14/crypto/ |
D | ctr.c | 30 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member 263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey() 290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt()
|
D | gcm.c | 38 u8 nonce[4]; member 54 u8 nonce[4]; member 794 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey() 836 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt() 1026 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4543_setkey() 1066 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt()
|
D | ccm.c | 36 u8 nonce[3]; member 676 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey() 719 memcpy(iv + 1, ctx->nonce, 3); in crypto_rfc4309_crypt()
|
D | vmac.c | 603 u8 nonce[16] = {}; in vmac_final() local 614 mac = vmac(ctx->partial, ctx->partial_size, nonce, NULL, ctx); in vmac_final()
|
/linux-4.4.14/net/rxrpc/ |
D | rxkad.c | 585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 747 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local 769 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() 773 ntohl(sp->hdr.serial), version, nonce, min_level); in rxkad_respond_to_challenge() 800 resp.encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()
|
/linux-4.4.14/include/rxrpc/ |
D | packet.h | 142 __be32 nonce; /* encrypted random number */ member
|
/linux-4.4.14/include/linux/ceph/ |
D | msgr.h | 64 __le32 nonce; /* unique id for process (e.g. pid) */ member
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto-aes.c | 164 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_setkey() 177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt()
|
D | ccp-crypto.h | 85 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
|
/linux-4.4.14/drivers/char/tpm/ |
D | tpm2-cmd.c | 400 const u8 *nonce, u16 nonce_len, in tpm2_buf_append_auth() argument 408 if (nonce && nonce_len) in tpm2_buf_append_auth() 409 tpm_buf_append(buf, nonce, nonce_len); in tpm2_buf_append_auth()
|
/linux-4.4.14/arch/x86/crypto/ |
D | aesni-intel_glue.c | 59 u8 nonce[4]; member 897 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); in common_rfc4106_set_key() 961 *(iv+i) = ctx->nonce[i]; in helper_rfc4106_encrypt() 1043 *(iv+i) = ctx->nonce[i]; in helper_rfc4106_decrypt()
|
/linux-4.4.14/include/uapi/linux/usb/ |
D | ch9.h | 931 __u8 nonce[16]; member
|
/linux-4.4.14/drivers/crypto/ |
D | ixp4xx_crypto.c | 187 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member 875 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), in ablk_rfc3686_setkey() 974 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt()
|
D | s5p-sss.c | 172 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member
|
/linux-4.4.14/security/keys/ |
D | trusted.c | 428 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) in oiap() argument 441 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], in oiap()
|