Searched refs:nonce (Results 26 - 50 of 145) sorted by relevance

123456

/linux-master/fs/bcachefs/
H A Dio_write_types.h59 u16 nonce; member in struct:bch_write_op
H A Dextents.c293 lp.crc.nonce != rp.crc.nonce)
304 lp.crc.nonce != rp.crc.nonce ||
436 l.nonce != r.nonce ||
535 dst->crc64.nonce = src.nonce;
541 dst->crc128.nonce = src.nonce;
1127 unsigned nonce = UINT_MAX; local
[all...]
/linux-master/drivers/gpu/drm/radeon/
H A Dvce_v1_0.c47 uint32_t nonce[4]; member in struct:vce_v1_0_fw_signature::__anon847
190 data[0] = sign->val[i].nonce[0];
191 data[1] = sign->val[i].nonce[1];
192 data[2] = sign->val[i].nonce[2];
193 data[3] = sign->val[i].nonce[3];
/linux-master/arch/x86/crypto/
H A Dpoly1305_glue.c23 const u32 nonce[4]);
25 const u32 nonce[4]);
124 const u32 nonce[4])
127 poly1305_emit_x86_64(ctx, mac, nonce);
129 poly1305_emit_avx(ctx, mac, nonce);
123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) argument
/linux-master/fs/crypto/
H A Dfscrypt_private.h42 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member in struct:fscrypt_context_v1
53 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member in struct:fscrypt_context_v2
62 * and key with which the file is encrypted. It also contains a nonce that was
96 /* Retrieve the context's nonce, assuming the context was already validated */
101 return ctx->v1.nonce;
103 return ctx->v2.nonce;
289 /* This inode's nonce, copied from the fscrypt_context */
323 /* per-file nonce; only set in DIRECT_KEY mode */
324 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member in struct:fscrypt_iv::__anon1722
H A Dpolicy.c112 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) {
318 * @nonce: nonce to use
321 * encryption policy. @nonce must be a new random nonce.
327 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE])
345 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE);
362 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZ
325 fscrypt_new_context(union fscrypt_context *ctx_u, const union fscrypt_policy *policy_u, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) argument
459 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; local
[all...]
/linux-master/drivers/crypto/nx/
H A Dnx-aes-gcm.c67 char *nonce = nx_ctx->priv.gcm.nonce; local
79 memcpy(nonce, in_key + key_len, 4);
442 char *nonce = nx_ctx->priv.gcm.nonce; local
444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN);
459 char *nonce = nx_ctx->priv.gcm.nonce; local
461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN);
H A Dnx-aes-ctr.c63 memcpy(nx_ctx->priv.ctr.nonce,
121 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_NONCE_SIZE);
/linux-master/tools/crypto/ccp/
H A Ddbc_cli.py46 choices=["get-nonce", "get-param", "set-param", "set-uid"],
96 if args.command == "get-nonce":
98 nonce = get_nonce(d, sig)
99 print("Nonce: %s" % _pretty_buffer(bytes(nonce)))
/linux-master/drivers/md/dm-vdo/
H A Drecovery-journal.h178 /* The nonce of the VDO */
179 nonce_t nonce; member in struct:recovery_journal
255 nonce_t nonce, struct vdo *vdo,
H A Dencodings.c253 nonce_t nonce; local
261 decode_u64_le(buffer, offset, &nonce);
262 geometry->nonce = nonce;
335 struct block_map_page *vdo_format_block_map_page(void *buffer, nonce_t nonce, argument
343 page->header.nonce = __cpu_to_le64(nonce);
350 nonce_t nonce,
357 !page->header.initialized || (nonce != __le64_to_cpu(page->header.nonce)))
349 vdo_validate_block_map_page(struct block_map_page *page, nonce_t nonce, physical_block_number_t pbn) argument
[all...]
H A Dblock-map.h268 nonce_t nonce; member in struct:block_map
319 bool vdo_copy_valid_page(char *buffer, nonce_t nonce,
335 struct recovery_journal *journal, nonce_t nonce,
/linux-master/drivers/net/wireguard/
H A Dmessages.h101 u8 nonce[COOKIE_NONCE_LEN]; member in struct:message_handshake_cookie
H A Dcookie.c190 get_random_bytes_wait(dst->nonce, COOKIE_NONCE_LEN);
194 macs->mac1, COOKIE_LEN, dst->nonce,
218 peer->latest_cookie.last_mac1_sent, COOKIE_LEN, src->nonce,
H A Dsend.c208 header->counter = cpu_to_le64(PACKET_CB(skb)->nonce);
217 PACKET_CB(skb)->nonce,
379 PACKET_CB(skb)->nonce =
381 if (unlikely(PACKET_CB(skb)->nonce >= REJECT_AFTER_MESSAGES))
/linux-master/include/keys/
H A Dtrusted_tpm.h43 int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce);
/linux-master/net/rxrpc/
H A Dprotocol.h151 __be32 nonce; /* encrypted random number */ member in struct:rxkad_challenge
171 __be32 inc_nonce; /* challenge nonce + 1 */
/linux-master/drivers/md/dm-vdo/indexer/
H A Dindex-layout.c54 * Each save also has a unique nonce.
130 u64 nonce; member in struct:index_save_data
168 u64 nonce; member in struct:sub_index_layout
177 u64 nonce; member in struct:super_block_data
306 /* Generate a primary nonce from the provided data. */
313 * Deterministically generate a secondary nonce from an existing nonce and some arbitrary data by
314 * hashing the original nonce and the data to produce a new nonce.
316 static u64 generate_secondary_nonce(u64 nonce, cons argument
[all...]
H A Dvolume.h102 u64 nonce; member in struct:volume
/linux-master/arch/powerpc/perf/
H A Dhv-24x7.c522 int nonce)
539 if (!nonce)
544 (int)event_name_len, ev_name, nonce);
562 int nonce)
572 return device_str_attr_create(name, nl, nonce, desc, dl);
576 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) argument
586 return device_str_attr_create(name, nl, nonce, desc, dl);
590 struct hv_24x7_event_data *event, int nonce)
592 *attrs = event_to_attr(ix, event, event->domain, nonce);
946 int nonce; local
519 event_to_attr(unsigned int ix, struct hv_24x7_event_data *event, unsigned int domain, int nonce) argument
561 event_to_desc_attr(struct hv_24x7_event_data *event, int nonce) argument
589 event_data_to_attrs(unsigned int ix, struct attribute **attrs, struct hv_24x7_event_data *event, int nonce) argument
[all...]
/linux-master/drivers/crypto/caam/
H A Dcaamalg_desc.c213 const bool is_rfc3686, u32 *nonce, int era)
228 * | enckeylen = encryption key size + nonce size
255 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE,
283 * @nonce: pointer to rfc3686 nonce
291 u32 *nonce, const u32 ctx1_iv_off, const bool is_qi,
295 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era);
378 * @nonce: pointer to rfc3686 nonce
386 const bool is_rfc3686, u32 *nonce,
210 init_sh_desc_key_aead(u32 * const desc, struct alginfo * const cdata, struct alginfo * const adata, const bool is_rfc3686, u32 *nonce, int era) argument
288 cnstr_shdsc_aead_encap(u32 * const desc, struct alginfo *cdata, struct alginfo *adata, unsigned int ivsize, unsigned int icvsize, const bool is_rfc3686, u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, int era) argument
383 cnstr_shdsc_aead_decap(u32 * const desc, struct alginfo *cdata, struct alginfo *adata, unsigned int ivsize, unsigned int icvsize, const bool geniv, const bool is_rfc3686, u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, int era) argument
500 cnstr_shdsc_aead_givencap(u32 * const desc, struct alginfo *cdata, struct alginfo *adata, unsigned int ivsize, unsigned int icvsize, const bool is_rfc3686, u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, int era) argument
1398 const u8 *nonce = cdata->key_virt + cdata->keylen; local
1473 const u8 *nonce = cdata->key_virt + cdata->keylen; local
[all...]
/linux-master/net/dccp/
H A Dackvec.c352 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) argument
360 new->nonce = nonce;
/linux-master/include/uapi/scsi/
H A Dscsi_bsg_ufs.h172 __u8 nonce[16]; member in struct:ufs_arpmb_meta
/linux-master/drivers/crypto/chelsio/
H A Dchcr_crypto.h179 u8 nonce[4]; member in struct:ablk_ctx
237 u8 nonce[4]; member in struct:chcr_aead_ctx
/linux-master/crypto/
H A Dvmac.c71 } nonce; member in struct:vmac_desc_ctx
72 unsigned int nonce_size; /* nonce bytes filled so far */
501 memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n);
573 * The VMAC specification requires a nonce at least 1 bit shorter than
575 * nonce. We define the unused bit to be the first one and require that
578 if (dctx->nonce.bytes[0] & 0x80)
584 /* Generate pseudorandom pad by encrypting the nonce */
586 index = dctx->nonce.bytes[VMAC_NONCEBYTES - 1] & 1;
587 dctx->nonce.bytes[VMAC_NONCEBYTES - 1] &= ~1;
588 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce
[all...]

Completed in 201 milliseconds

123456