/linux-master/arch/x86/crypto/ |
H A D | poly1305-x86_64-cryptogams.pl | 178 my ($mac,$nonce)=($inp,$len); # *_emit arguments 396 add 0($nonce),%rax # accumulate nonce 397 adc 8($nonce),%rcx 1505 add 0($nonce),%rax # accumulate nonce 1506 adc 8($nonce),%rcx 3858 add 0($nonce),%rax # accumulate nonce 3859 adc 8($nonce), [all...] |
/linux-master/drivers/crypto/caam/ |
H A D | caamalg.c | 200 u32 *desc, *nonce = NULL; local 228 nonce = (u32 *)((void *)ctx->key + ctx->adata.keylen_pad + 266 ctx->authsize, is_rfc3686, nonce, ctx1_iv_off, 289 nonce, ctx1_iv_off, false, ctrlpriv->era); 312 ctx->authsize, is_rfc3686, nonce, 705 * in the nonce. Update the AES key length. 731 * in the nonce. Update the AES key length. 1189 * For RFC7539 simply load the 12 bytes nonce in a single operation
|
H A D | caamalg_qi2.c | 183 u32 *nonce = NULL; local 207 nonce = (u32 *)((void *)ctx->key + ctx->adata.keylen_pad + 243 nonce, ctx1_iv_off, true, 247 ivsize, ctx->authsize, is_rfc3686, nonce, 269 is_rfc3686, nonce, ctx1_iv_off, true, 835 * in the nonce. Update the AES key length. 934 * in the nonce. Update the AES key length.
|
/linux-master/drivers/scsi/mpi3mr/mpi/ |
H A D | mpi30_cnfg.h | 1471 union mpi3_security_nonce nonce; member in struct:mpi3_security_page0 1517 union mpi3_security_nonce nonce; member in struct:mpi3_security_page1 1545 union mpi3_security_nonce nonce; member in struct:mpi3_security_page2
|
/linux-master/drivers/md/dm-vdo/ |
H A D | dedupe.c | 2199 .nonce = (u64) geometry.nonce,
|
/linux-master/drivers/md/dm-vdo/indexer/ |
H A D | volume.c | 429 index_page, volume->nonce); 1553 volume->nonce = uds_get_volume_nonce(layout);
|
/linux-master/net/mptcp/ |
H A D | subflow.c | 68 /* validate received token and create truncated hmac and nonce for SYN-ACK */ 207 subflow_req->remote_nonce = mp_opt.nonce; 536 subflow->remote_nonce = mp_opt.nonce;
|
H A D | protocol.h | 155 u32 nonce; member in struct:mptcp_options_received
|
/linux-master/net/rxrpc/ |
H A D | ar-internal.h | 515 u32 nonce; /* response re-use preventer */ member in struct:rxrpc_connection::__anon3023::__anon3024
|
/linux-master/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 998 memcpy(ablkctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), 1313 memcpy(reqctx->iv, ablkctx->nonce, CTR_RFC3686_NONCE_SIZE); 2558 memcpy(ivptr, aeadctx->nonce, CTR_RFC3686_NONCE_SIZE); 3514 keylen -= 4; /* nonce/salt is present in the last 4 bytes */ 3589 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen 3708 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen
|
/linux-master/drivers/accel/habanalabs/common/ |
H A D | habanalabs.h | 3994 u32 nonce); 3996 struct cpucp_dev_info_signed *dev_info_signed, u32 nonce);
|
/linux-master/fs/bcachefs/ |
H A D | journal_io.c | 51 static struct nonce journal_nonce(const struct jset *jset) 53 return (struct nonce) {{
|
H A D | bcachefs_format.h | 637 struct nonce { struct
|
/linux-master/drivers/gpu/drm/display/ |
H A D | drm_dp_mst_topology.c | 3213 u8 nonce[7]; local 3226 get_random_bytes(nonce, sizeof(nonce)); 3239 build_query_stream_enc_status(txmsg, payload->vcpi, nonce);
|
/linux-master/net/ipv6/ |
H A D | addrconf.c | 4073 u64 nonce; local 4081 nonce = 0; 4085 get_random_bytes(&nonce, 6); 4086 while (nonce == 0); 4088 ifp->dad_nonce = nonce;
|
/linux-master/drivers/crypto/ |
H A D | s5p-sss.c | 253 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:s5p_aes_ctx
|
/linux-master/include/linux/platform_data/ |
H A D | cros_ec_commands.h | 6169 * The salt is *only* ever used for key derivation. The nonce is unique, 6172 uint8_t nonce[FP_CONTEXT_NONCE_BYTES]; member in struct:ec_fp_template_encryption_metadata
|
/linux-master/net/tls/ |
H A D | tls_sw.c | 1528 /* For CCM based ciphers, first byte of nonce+iv is a constant */ 2661 u16 nonce_size = cipher_desc->nonce;
|
/linux-master/lib/crypto/ |
H A D | chacha20poly1305-selftest.c | 18 const u8 *input, *output, *assoc, *nonce, *key; member in struct:chacha20poly1305_testvec 8830 const u8 nonce[12], 8844 memcpy(&bottom_row[4], nonce, 12); 8864 const u8 *nonce, const size_t nonce_len, 8869 get_unaligned_le64(nonce), key); 8872 ad_len, nonce, key); 8908 chacha20poly1305_enc_vectors[i].nonce, 8932 get_unaligned_le64(chacha20poly1305_enc_vectors[i].nonce), 8951 get_unaligned_le64(chacha20poly1305_dec_vectors[i].nonce), 8974 get_unaligned_le64(chacha20poly1305_dec_vectors[i].nonce), 8828 chacha20poly1305_encrypt_bignonce(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[12], const u8 key[CHACHA20POLY1305_KEY_SIZE]) argument 8862 chacha20poly1305_selftest_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 *nonce, const size_t nonce_len, const u8 key[CHACHA20POLY1305_KEY_SIZE]) argument [all...] |
/linux-master/drivers/block/ |
H A D | rbd.c | 3927 le32_to_cpu(lockers[0].info.addr.nonce), handle); 5068 le32_to_cpu(client_addr->nonce));
|