Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 42 of 42) sorted by relevance

/linux-4.4.14/drivers/crypto/nx/
Dnx-aes-gcm.c78 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local
90 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key()
457 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local
459 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt()
474 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local
476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
Dnx.h102 u8 nonce[NX_GCM4106_NONCE_LEN]; member
116 u8 nonce[NX_CCM4309_NONCE_LEN]; member
124 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
Dnx-aes-ctr.c75 memcpy(nx_ctx->priv.ctr.nonce, in ctr3686_aes_nx_set_key()
136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt()
Dnx-aes-ccm.c76 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key()
500 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_encrypt()
530 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_decrypt()
/linux-4.4.14/drivers/gpu/drm/radeon/
Dvce_v1_0.c46 uint32_t nonce[4]; member
190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw()
191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw()
192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw()
193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
/linux-4.4.14/arch/powerpc/perf/
Dhv-24x7.c386 int nonce) in event_to_attr() argument
405 if (!nonce) in event_to_attr()
410 (int)event_name_len, ev_name, ev_suffix, nonce); in event_to_attr()
428 int nonce) in event_to_desc_attr() argument
438 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr()
442 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument
452 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr()
456 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument
462 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs()
467 nonce); in event_data_to_attrs()
[all …]
/linux-4.4.14/drivers/usb/wusbcore/
Dsecurity.c396 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); in wusb_dev_4way_handshake()
451 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); in wusb_dev_4way_handshake()
452 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); in wusb_dev_4way_handshake()
479 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); in wusb_dev_4way_handshake()
Dcrypto.c387 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, in wusb_oob_mic_verify()
/linux-4.4.14/net/dccp/
Dackvec.h132 nonce:1; member
136 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
Dackvec.c350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument
358 new->nonce = nonce; in dccp_ackvec_parsed_add()
Doptions.c408 u8 i, nonce = 0; in dccp_insert_option_ackvec() local
447 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec()
471 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
/linux-4.4.14/net/mac80211/
Daes_gmac.c24 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument
46 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
Daes_gmac.h16 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
Dwpa.c1121 u8 nonce[12]; in ieee80211_crypto_aes_gmac_encrypt() local
1149 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt()
1150 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt()
1153 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt()
1167 u8 aad[20], mic[16], ipn[6], nonce[12]; in ieee80211_crypto_aes_gmac_decrypt() local
1195 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt()
1196 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt()
1198 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
/linux-4.4.14/fs/f2fs/
Dcrypto_policy.c81 BUILD_BUG_ON(sizeof(ctx.nonce) != F2FS_KEY_DERIVATION_NONCE_SIZE); in f2fs_create_encryption_context_from_policy()
82 get_random_bytes(ctx.nonce, F2FS_KEY_DERIVATION_NONCE_SIZE); in f2fs_create_encryption_context_from_policy()
205 get_random_bytes(ctx.nonce, F2FS_KEY_DERIVATION_NONCE_SIZE); in f2fs_inherit_context()
Df2fs_crypto.h56 char nonce[F2FS_KEY_DERIVATION_NONCE_SIZE]; member
Dcrypto_key.c211 res = f2fs_derive_key_aes(ctx.nonce, master_key->raw, in _f2fs_get_encryption_info()
/linux-4.4.14/fs/ext4/
Dcrypto_policy.c80 BUILD_BUG_ON(sizeof(ctx.nonce) != EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_create_encryption_context_from_policy()
81 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_create_encryption_context_from_policy()
219 get_random_bytes(ctx.nonce, EXT4_KEY_DERIVATION_NONCE_SIZE); in ext4_inherit_context()
Dext4_crypto.h54 char nonce[EXT4_KEY_DERIVATION_NONCE_SIZE]; member
Dcrypto_key.c234 res = ext4_derive_key_aes(ctx.nonce, master_key->raw, in _ext4_get_encryption_info()
/linux-4.4.14/net/ceph/
Dauth_x.c347 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer()
349 msg_b.nonce = cpu_to_le64(au->nonce); in ceph_x_build_authorizer()
356 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer()
622 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) in ceph_x_verify_authorizer_reply()
627 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
Dauth_x.h32 u64 nonce; member
Dauth_x_protocol.h71 __le64 nonce; member
Dmessenger.c2007 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner()
2010 (int)le32_to_cpu(con->peer_addr.nonce), in process_banner()
2012 (int)le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner()
2987 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
Dmon_client.c797 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
/linux-4.4.14/drivers/crypto/caam/
Dpdb.h197 u32 nonce; member
209 u32 nonce; member
Dcaamalg.c201 u32 *nonce; in append_key_aead() local
228 nonce = (u32 *)((void *)ctx->key + ctx->split_key_pad_len + in append_key_aead()
230 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in append_key_aead()
1467 u32 *nonce; in ablkcipher_setkey() local
1520 nonce = (u32 *)(key + keylen); in ablkcipher_setkey()
1521 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
1579 nonce = (u32 *)(key + keylen); in ablkcipher_setkey()
1580 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
1642 nonce = (u32 *)(key + keylen); in ablkcipher_setkey()
1643 append_load_imm_u32(desc, *nonce, LDST_CLASS_IND_CCB | in ablkcipher_setkey()
/linux-4.4.14/crypto/
Dctr.c30 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
263 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey()
290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt()
Dgcm.c38 u8 nonce[4]; member
54 u8 nonce[4]; member
794 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey()
836 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt()
1026 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4543_setkey()
1066 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt()
Dccm.c36 u8 nonce[3]; member
676 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey()
719 memcpy(iv + 1, ctx->nonce, 3); in crypto_rfc4309_crypt()
Dvmac.c603 u8 nonce[16] = {}; in vmac_final() local
614 mac = vmac(ctx->partial, ctx->partial_size, nonce, NULL, ctx); in vmac_final()
/linux-4.4.14/net/rxrpc/
Drxkad.c585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
747 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local
769 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
773 ntohl(sp->hdr.serial), version, nonce, min_level); in rxkad_respond_to_challenge()
800 resp.encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()
/linux-4.4.14/include/rxrpc/
Dpacket.h142 __be32 nonce; /* encrypted random number */ member
/linux-4.4.14/include/linux/ceph/
Dmsgr.h64 __le32 nonce; /* unique id for process (e.g. pid) */ member
/linux-4.4.14/drivers/crypto/ccp/
Dccp-crypto-aes.c164 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_setkey()
177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt()
Dccp-crypto.h85 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
/linux-4.4.14/drivers/char/tpm/
Dtpm2-cmd.c400 const u8 *nonce, u16 nonce_len, in tpm2_buf_append_auth() argument
408 if (nonce && nonce_len) in tpm2_buf_append_auth()
409 tpm_buf_append(buf, nonce, nonce_len); in tpm2_buf_append_auth()
/linux-4.4.14/arch/x86/crypto/
Daesni-intel_glue.c59 u8 nonce[4]; member
897 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); in common_rfc4106_set_key()
961 *(iv+i) = ctx->nonce[i]; in helper_rfc4106_encrypt()
1043 *(iv+i) = ctx->nonce[i]; in helper_rfc4106_decrypt()
/linux-4.4.14/include/uapi/linux/usb/
Dch9.h931 __u8 nonce[16]; member
/linux-4.4.14/drivers/crypto/
Dixp4xx_crypto.c187 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
875 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), in ablk_rfc3686_setkey()
974 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt()
Ds5p-sss.c172 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member
/linux-4.4.14/security/keys/
Dtrusted.c428 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) in oiap() argument
441 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], in oiap()