| /linux/include/trace/events/ |
| H A D | bpf_test_run.h | 12 TP_PROTO(int nonce), 14 TP_ARGS(nonce), 17 __field(int, nonce) 21 __entry->nonce = nonce; 24 TP_printk("nonce %d", __entry->nonce)
|
| /linux/net/ceph/ |
| H A D | decode.c | 28 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 63 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy() 185 sizeof(addr->nonce) + in ceph_encode_entity_addr() 188 ceph_encode_copy(p, &addr->nonce, sizeof(addr->nonce)); in ceph_encode_entity_addr()
|
| /linux/lib/crypto/powerpc/ |
| H A D | poly1305.h | 15 asmlinkage void poly1305_emit_64(const struct poly1305_state *state, const u32 nonce[4], u8 digest[… 62 u8 digest[POLY1305_DIGEST_SIZE], const u32 nonce[4]) in poly1305_emit() 65 return poly1305_emit_generic(state, digest, nonce); in poly1305_emit() 66 poly1305_emit_64(state, nonce, digest); in poly1305_emit()
|
| /linux/include/net/ |
| H A D | amt.h | 117 __be32 nonce; member 132 __be32 nonce; member 152 __be32 nonce; member 173 __be32 nonce; member 190 __be32 nonce; member 249 __be32 nonce; member 356 __be32 nonce; member
|
| /linux/lib/crypto/ |
| H A D | poly1305-donna64.c | 112 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() 163 if (likely(nonce)) { in poly1305_core_emit() 165 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit() 166 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
|
| H A D | poly1305-donna32.c | 121 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() 189 if (likely(nonce)) { in poly1305_core_emit() 191 f = (u64)h0 + nonce[0]; in poly1305_core_emit() 193 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit() 195 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit() 197 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
|
| /linux/include/crypto/internal/ |
| H A D | poly1305.h | 30 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], 51 const u32 nonce[4]) in poly1305_emit_generic() 53 poly1305_core_emit(state, nonce, digest); in poly1305_emit_generic()
|
| /linux/lib/crypto/x86/ |
| H A D | poly1305.h | 68 const u32 nonce[4]); 71 const u32 nonce[4]); 135 u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) in poly1305_emit() 138 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_emit() 140 poly1305_emit_avx(ctx, mac, nonce); in poly1305_emit()
|
| /linux/drivers/md/dm-vdo/indexer/ |
| H A D | config.h | 43 u64 nonce; member 82 u64 nonce; member 108 u64 nonce; member
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 59 __u8 nonce[AES_KEYSIZE_128]; member 129 static int do_aead_crypto(u8 *in, u8 *out, size_t len, u8 *key, u8 *nonce, in do_aead_crypto() argument 166 aead_request_set_crypt(aead_req, &src_sg, &dst_sg, len, nonce); in do_aead_crypto() 215 get_random_bytes(b->nonce, AES_KEYSIZE_128); in trusted_dcp_seal() 219 b->nonce, true); in trusted_dcp_seal() 277 plain_blob_key, b->nonce, false); in trusted_dcp_unseal()
|
| /linux/fs/crypto/ |
| H A D | policy.c | 114 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes() 329 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context() 347 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 364 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 461 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; in set_encryption_policy() local 499 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); in set_encryption_policy() 500 ctxsize = fscrypt_new_context(&ctx, policy, nonce); in set_encryption_policy()
|
| /linux/drivers/gpu/drm/radeon/ |
| H A D | vce_v1_0.c | 47 uint32_t nonce[4]; member 190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
| /linux/arch/powerpc/perf/ |
| H A D | hv-24x7.c | 512 int nonce) in event_to_attr() argument 529 if (!nonce) in event_to_attr() 534 (int)event_name_len, ev_name, nonce); in event_to_attr() 552 int nonce) in event_to_desc_attr() argument 562 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr() 566 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument 576 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr() 580 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument 582 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs() 934 int nonce; in create_events_from_catalog() local [all …]
|
| /linux/lib/crypto/riscv/ |
| H A D | poly1305-riscv.pl | 250 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 289 lwu $tmp0,0($nonce) # load nonce 290 lwu $tmp1,4($nonce) 291 lwu $tmp2,8($nonce) 292 lwu $tmp3,12($nonce) 712 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3); 767 lw $tmp0,0($nonce) # load nonce 768 lw $tmp1,4($nonce) 769 lw $tmp2,8($nonce) 770 lw $tmp3,12($nonce)
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg_desc.h | 63 u32 *nonce, const u32 ctx1_iv_off, 69 const bool is_rfc3686, u32 *nonce, 75 u32 *nonce, const u32 ctx1_iv_off,
|
| H A D | caamalg_desc.c | 214 const bool is_rfc3686, u32 *nonce, int era) in init_sh_desc_key_aead() argument 256 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in init_sh_desc_key_aead() 292 u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, in cnstr_shdsc_aead_encap() argument 296 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_encap() 387 const bool is_rfc3686, u32 *nonce, in cnstr_shdsc_aead_decap() argument 391 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_decap() 504 u32 *nonce, const u32 ctx1_iv_off, in cnstr_shdsc_aead_givencap() argument 511 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_givencap() 1478 const u8 *nonce = cdata->key_virt + cdata->keylen; in cnstr_shdsc_skcipher_encap() local 1480 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in cnstr_shdsc_skcipher_encap() [all …]
|
| /linux/net/rxrpc/ |
| H A D | rxgk.c | 638 size_t len = sizeof(*whdr) + sizeof(conn->rxgk.nonce); in rxgk_issue_challenge() 644 get_random_bytes(&conn->rxgk.nonce, sizeof(conn->rxgk.nonce)); in rxgk_issue_challenge() 647 page = rxgk_alloc_packet(sizeof(*whdr) + sizeof(conn->rxgk.nonce)); in rxgk_issue_challenge() 672 memcpy(whdr + 1, conn->rxgk.nonce, sizeof(conn->rxgk.nonce)); in rxgk_issue_challenge() 677 trace_rxrpc_tx_challenge(conn, serial, 0, *(u32 *)&conn->rxgk.nonce); in rxgk_issue_challenge() 703 u8 nonce[20]; in rxgk_validate_challenge() local 718 nonce, sizeof(nonce)) < 0) { in rxgk_validate_challenge() 724 trace_rxrpc_rx_challenge(conn, sp->hdr.serial, 0, *(u32 *)nonce, 0); in rxgk_validate_challenge() 836 u8 nonce[20]; in rxgk_construct_authenticator() member 849 a.nonce, sizeof(a.nonce)); in rxgk_construct_authenticator() [all …]
|
| /linux/include/linux/ceph/ |
| H A D | msgr.h | 86 __le32 nonce; /* unique id for process (e.g. pid) */ member 94 lhs->nonce == rhs->nonce; in ceph_addr_equal_no_type()
|
| /linux/tools/crypto/ccp/ |
| H A D | dbc.c | 34 memcpy(nonce_out, tmp.nonce, sizeof(tmp.nonce)); in get_nonce()
|
| /linux/net/dccp/ |
| H A D | ackvec.h | |
| /linux/tools/testing/selftests/tpm2/ |
| H A D | tpm2.py | 251 def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(), argument 254 self.nonce = nonce 259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 260 return struct.pack(fmt, self.session_handle, len(self.nonce), 261 self.nonce, self.session_attributes, len(self.hmac), 265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
|
| /linux/net/mac80211/ |
| H A D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 57 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
| /linux/drivers/net/wireguard/ |
| H A D | send.c | 208 header->counter = cpu_to_le64(PACKET_CB(skb)->nonce); in encrypt_packet() 217 PACKET_CB(skb)->nonce, in encrypt_packet() 379 PACKET_CB(skb)->nonce = in wg_packet_send_staged_packets() 381 if (unlikely(PACKET_CB(skb)->nonce >= REJECT_AFTER_MESSAGES)) in wg_packet_send_staged_packets()
|
| /linux/lib/crypto/mips/ |
| H A D | poly1305-mips.pl | 445 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 486 lwu $tmp0,0($nonce) # load nonce 487 lwu $tmp1,4($nonce) 488 lwu $tmp2,8($nonce) 489 lwu $tmp3,12($nonce) 1149 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3); 1206 lw $tmp0,0($nonce) # load nonce 1207 lw $tmp1,4($nonce) 1208 lw $tmp2,8($nonce) 1209 lw $tmp3,12($nonce)
|
| /linux/drivers/net/ |
| H A D | amt.c | 664 amtd->nonce = amt->nonce; in amt_send_discovery() 755 amtrh->nonce = amt->nonce; in amt_send_request() 934 get_random_bytes(&amt->nonce, sizeof(__be32)); in amt_event_send_discovery() 968 amt->nonce = 0; in amt_event_send_request() 975 get_random_bytes(&amt->nonce, sizeof(__be32)); in amt_event_send_request() 1035 amtmu->nonce = amt->nonce; in amt_send_membership_update() 1152 amtmq->nonce = tunnel->nonce; in amt_send_membership_query() 2272 amt->nonce != amta->nonce) in amt_advertisement_handler() 2367 if (amtmq->nonce != amt->nonce) in amt_membership_query_handler() 2476 if ((amtmu->nonce == tunnel->nonce && in amt_update_handler() [all …]
|