/Linux-v5.4/net/ceph/ |
D | decode.c | 24 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 59 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy()
|
D | auth_x.h | 35 u64 nonce; member
|
D | auth_x.c | 314 msg_b->nonce = cpu_to_le64(au->nonce); in encrypt_authorizer() 398 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer() 405 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer() 745 if (au->nonce + 1 != le64_to_cpu(reply->nonce_plus_one)) in ceph_x_verify_authorizer_reply() 750 au->nonce, le64_to_cpu(reply->nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
|
D | auth_x_protocol.h | 72 __le64 nonce; member
|
/Linux-v5.4/drivers/crypto/nx/ |
D | nx-aes-gcm.c | 67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 446 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local 448 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 463 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local 465 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
|
D | nx.h | 92 u8 nonce[NX_GCM4106_NONCE_LEN]; member 106 u8 nonce[NX_CCM4309_NONCE_LEN]; member 114 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
|
D | nx-aes-ctr.c | 63 memcpy(nx_ctx->priv.ctr.nonce, in ctr3686_aes_nx_set_key() 124 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt()
|
/Linux-v5.4/drivers/gpu/drm/radeon/ |
D | vce_v1_0.c | 46 uint32_t nonce[4]; member 190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
/Linux-v5.4/drivers/crypto/caam/ |
D | caamalg_desc.h | 60 u32 *nonce, const u32 ctx1_iv_off, 66 const bool is_rfc3686, u32 *nonce, 72 u32 *nonce, const u32 ctx1_iv_off,
|
D | caamalg_desc.c | 213 const bool is_rfc3686, u32 *nonce, int era) in init_sh_desc_key_aead() argument 255 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in init_sh_desc_key_aead() 291 u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, in cnstr_shdsc_aead_encap() argument 295 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_encap() 385 const bool is_rfc3686, u32 *nonce, in cnstr_shdsc_aead_decap() argument 389 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_decap() 502 u32 *nonce, const u32 ctx1_iv_off, in cnstr_shdsc_aead_givencap() argument 509 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_givencap() 1394 const u8 *nonce = cdata->key_virt + cdata->keylen; in cnstr_shdsc_skcipher_encap() local 1396 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in cnstr_shdsc_skcipher_encap() [all …]
|
/Linux-v5.4/drivers/staging/wusbcore/ |
D | security.c | 380 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); in wusb_dev_4way_handshake() 435 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); in wusb_dev_4way_handshake() 436 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); in wusb_dev_4way_handshake() 463 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); in wusb_dev_4way_handshake()
|
/Linux-v5.4/arch/powerpc/perf/ |
D | hv-24x7.c | 449 int nonce) in event_to_attr() argument 466 if (!nonce) in event_to_attr() 471 (int)event_name_len, ev_name, nonce); in event_to_attr() 489 int nonce) in event_to_desc_attr() argument 499 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr() 503 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument 513 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr() 517 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument 519 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs() 861 int nonce; in create_events_from_catalog() local [all …]
|
/Linux-v5.4/fs/crypto/ |
D | fscrypt_private.h | 32 u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; member 42 u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; member 259 u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; member 453 return mode->ivsize >= offsetofend(union fscrypt_iv, nonce); in fscrypt_mode_supports_direct_key()
|
D | policy.c | 126 get_random_bytes(ctx->nonce, sizeof(ctx->nonce)); in fscrypt_new_context_from_policy() 142 get_random_bytes(ctx->nonce, sizeof(ctx->nonce)); in fscrypt_new_context_from_policy()
|
/Linux-v5.4/net/dccp/ |
D | ackvec.h | 130 nonce:1; member 134 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
D | ackvec.c | 347 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument 355 new->nonce = nonce; in dccp_ackvec_parsed_add()
|
D | options.c | 404 u8 i, nonce = 0; in dccp_insert_option_ackvec() local 443 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec() 467 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
|
/Linux-v5.4/net/mac80211/ |
D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 42 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
D | aes_gmac.h | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
|
D | wpa.c | 1133 u8 nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_encrypt() local 1161 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt() 1162 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt() 1165 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt() 1179 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_decrypt() local 1207 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt() 1208 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt() 1213 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
|
/Linux-v5.4/tools/testing/selftests/tpm2/ |
D | tpm2.py | 250 def __init__(self, session_handle=TPM2_RS_PW, nonce='', session_attributes=0, argument 253 self.nonce = nonce 258 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 259 return struct.pack(fmt, self.session_handle, len(self.nonce), 260 self.nonce, self.session_attributes, len(self.hmac), 264 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
|
/Linux-v5.4/crypto/ |
D | vmac.c | 70 } nonce; member 502 memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n); in vmac_update() 579 if (dctx->nonce.bytes[0] & 0x80) in vmac_final() 587 index = dctx->nonce.bytes[VMAC_NONCEBYTES - 1] & 1; in vmac_final() 588 dctx->nonce.bytes[VMAC_NONCEBYTES - 1] &= ~1; in vmac_final() 589 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce.bytes, in vmac_final() 590 dctx->nonce.bytes); in vmac_final() 591 pad = be64_to_cpu(dctx->nonce.pads[index]); in vmac_final()
|
D | ctr.c | 19 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member 180 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey() 207 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt()
|
/Linux-v5.4/drivers/crypto/chelsio/ |
D | chcr_crypto.h | 179 u8 nonce[4]; member 233 u8 nonce[4]; member
|
/Linux-v5.4/drivers/crypto/ |
D | omap-aes-gcm.c | 356 memcpy(rctx->iv, ctx->nonce, 4); in omap_aes_4106gcm_encrypt() 367 memcpy(rctx->iv, ctx->nonce, 4); in omap_aes_4106gcm_decrypt() 401 memcpy(ctx->nonce, key + keylen, 4); in omap_aes_4106gcm_setkey()
|