/linux-master/fs/bcachefs/ |
H A D | io_write_types.h | 59 u16 nonce; member in struct:bch_write_op
|
H A D | extents.c | 293 lp.crc.nonce != rp.crc.nonce) 304 lp.crc.nonce != rp.crc.nonce || 436 l.nonce != r.nonce || 535 dst->crc64.nonce = src.nonce; 541 dst->crc128.nonce = src.nonce; 1127 unsigned nonce = UINT_MAX; local [all...] |
/linux-master/drivers/gpu/drm/radeon/ |
H A D | vce_v1_0.c | 47 uint32_t nonce[4]; member in struct:vce_v1_0_fw_signature::__anon847 190 data[0] = sign->val[i].nonce[0]; 191 data[1] = sign->val[i].nonce[1]; 192 data[2] = sign->val[i].nonce[2]; 193 data[3] = sign->val[i].nonce[3];
|
/linux-master/arch/x86/crypto/ |
H A D | poly1305_glue.c | 23 const u32 nonce[4]); 25 const u32 nonce[4]); 124 const u32 nonce[4]) 127 poly1305_emit_x86_64(ctx, mac, nonce); 129 poly1305_emit_avx(ctx, mac, nonce); 123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) argument
|
/linux-master/fs/crypto/ |
H A D | fscrypt_private.h | 42 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member in struct:fscrypt_context_v1 53 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member in struct:fscrypt_context_v2 62 * and key with which the file is encrypted. It also contains a nonce that was 96 /* Retrieve the context's nonce, assuming the context was already validated */ 101 return ctx->v1.nonce; 103 return ctx->v2.nonce; 289 /* This inode's nonce, copied from the fscrypt_context */ 323 /* per-file nonce; only set in DIRECT_KEY mode */ 324 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member in struct:fscrypt_iv::__anon1722
|
H A D | policy.c | 112 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { 318 * @nonce: nonce to use 321 * encryption policy. @nonce must be a new random nonce. 327 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) 345 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); 362 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZ 325 fscrypt_new_context(union fscrypt_context *ctx_u, const union fscrypt_policy *policy_u, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) argument 459 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; local [all...] |
/linux-master/drivers/crypto/nx/ |
H A D | nx-aes-gcm.c | 67 char *nonce = nx_ctx->priv.gcm.nonce; local 79 memcpy(nonce, in_key + key_len, 4); 442 char *nonce = nx_ctx->priv.gcm.nonce; local 444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); 459 char *nonce = nx_ctx->priv.gcm.nonce; local 461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN);
|
H A D | nx-aes-ctr.c | 63 memcpy(nx_ctx->priv.ctr.nonce, 121 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_NONCE_SIZE);
|
/linux-master/tools/crypto/ccp/ |
H A D | dbc_cli.py | 46 choices=["get-nonce", "get-param", "set-param", "set-uid"], 96 if args.command == "get-nonce": 98 nonce = get_nonce(d, sig) 99 print("Nonce: %s" % _pretty_buffer(bytes(nonce)))
|
/linux-master/drivers/md/dm-vdo/ |
H A D | recovery-journal.h | 178 /* The nonce of the VDO */ 179 nonce_t nonce; member in struct:recovery_journal 255 nonce_t nonce, struct vdo *vdo,
|
H A D | encodings.c | 253 nonce_t nonce; local 261 decode_u64_le(buffer, offset, &nonce); 262 geometry->nonce = nonce; 335 struct block_map_page *vdo_format_block_map_page(void *buffer, nonce_t nonce, argument 343 page->header.nonce = __cpu_to_le64(nonce); 350 nonce_t nonce, 357 !page->header.initialized || (nonce != __le64_to_cpu(page->header.nonce))) 349 vdo_validate_block_map_page(struct block_map_page *page, nonce_t nonce, physical_block_number_t pbn) argument [all...] |
H A D | block-map.h | 268 nonce_t nonce; member in struct:block_map 319 bool vdo_copy_valid_page(char *buffer, nonce_t nonce, 335 struct recovery_journal *journal, nonce_t nonce,
|
/linux-master/drivers/net/wireguard/ |
H A D | messages.h | 101 u8 nonce[COOKIE_NONCE_LEN]; member in struct:message_handshake_cookie
|
H A D | cookie.c | 190 get_random_bytes_wait(dst->nonce, COOKIE_NONCE_LEN); 194 macs->mac1, COOKIE_LEN, dst->nonce, 218 peer->latest_cookie.last_mac1_sent, COOKIE_LEN, src->nonce,
|
H A D | send.c | 208 header->counter = cpu_to_le64(PACKET_CB(skb)->nonce); 217 PACKET_CB(skb)->nonce, 379 PACKET_CB(skb)->nonce = 381 if (unlikely(PACKET_CB(skb)->nonce >= REJECT_AFTER_MESSAGES))
|
/linux-master/include/keys/ |
H A D | trusted_tpm.h | 43 int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce);
|
/linux-master/net/rxrpc/ |
H A D | protocol.h | 151 __be32 nonce; /* encrypted random number */ member in struct:rxkad_challenge 171 __be32 inc_nonce; /* challenge nonce + 1 */
|
/linux-master/drivers/md/dm-vdo/indexer/ |
H A D | index-layout.c | 54 * Each save also has a unique nonce. 130 u64 nonce; member in struct:index_save_data 168 u64 nonce; member in struct:sub_index_layout 177 u64 nonce; member in struct:super_block_data 306 /* Generate a primary nonce from the provided data. */ 313 * Deterministically generate a secondary nonce from an existing nonce and some arbitrary data by 314 * hashing the original nonce and the data to produce a new nonce. 316 static u64 generate_secondary_nonce(u64 nonce, cons argument [all...] |
H A D | volume.h | 102 u64 nonce; member in struct:volume
|
/linux-master/arch/powerpc/perf/ |
H A D | hv-24x7.c | 522 int nonce) 539 if (!nonce) 544 (int)event_name_len, ev_name, nonce); 562 int nonce) 572 return device_str_attr_create(name, nl, nonce, desc, dl); 576 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) argument 586 return device_str_attr_create(name, nl, nonce, desc, dl); 590 struct hv_24x7_event_data *event, int nonce) 592 *attrs = event_to_attr(ix, event, event->domain, nonce); 946 int nonce; local 519 event_to_attr(unsigned int ix, struct hv_24x7_event_data *event, unsigned int domain, int nonce) argument 561 event_to_desc_attr(struct hv_24x7_event_data *event, int nonce) argument 589 event_data_to_attrs(unsigned int ix, struct attribute **attrs, struct hv_24x7_event_data *event, int nonce) argument [all...] |
/linux-master/drivers/crypto/caam/ |
H A D | caamalg_desc.c | 213 const bool is_rfc3686, u32 *nonce, int era) 228 * | enckeylen = encryption key size + nonce size 255 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, 283 * @nonce: pointer to rfc3686 nonce 291 u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, 295 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); 378 * @nonce: pointer to rfc3686 nonce 386 const bool is_rfc3686, u32 *nonce, 210 init_sh_desc_key_aead(u32 * const desc, struct alginfo * const cdata, struct alginfo * const adata, const bool is_rfc3686, u32 *nonce, int era) argument 288 cnstr_shdsc_aead_encap(u32 * const desc, struct alginfo *cdata, struct alginfo *adata, unsigned int ivsize, unsigned int icvsize, const bool is_rfc3686, u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, int era) argument 383 cnstr_shdsc_aead_decap(u32 * const desc, struct alginfo *cdata, struct alginfo *adata, unsigned int ivsize, unsigned int icvsize, const bool geniv, const bool is_rfc3686, u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, int era) argument 500 cnstr_shdsc_aead_givencap(u32 * const desc, struct alginfo *cdata, struct alginfo *adata, unsigned int ivsize, unsigned int icvsize, const bool is_rfc3686, u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, int era) argument 1398 const u8 *nonce = cdata->key_virt + cdata->keylen; local 1473 const u8 *nonce = cdata->key_virt + cdata->keylen; local [all...] |
/linux-master/net/dccp/ |
H A D | ackvec.c | 352 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) argument 360 new->nonce = nonce;
|
/linux-master/include/uapi/scsi/ |
H A D | scsi_bsg_ufs.h | 172 __u8 nonce[16]; member in struct:ufs_arpmb_meta
|
/linux-master/drivers/crypto/chelsio/ |
H A D | chcr_crypto.h | 179 u8 nonce[4]; member in struct:ablk_ctx 237 u8 nonce[4]; member in struct:chcr_aead_ctx
|
/linux-master/crypto/ |
H A D | vmac.c | 71 } nonce; member in struct:vmac_desc_ctx 72 unsigned int nonce_size; /* nonce bytes filled so far */ 501 memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n); 573 * The VMAC specification requires a nonce at least 1 bit shorter than 575 * nonce. We define the unused bit to be the first one and require that 578 if (dctx->nonce.bytes[0] & 0x80) 584 /* Generate pseudorandom pad by encrypting the nonce */ 586 index = dctx->nonce.bytes[VMAC_NONCEBYTES - 1] & 1; 587 dctx->nonce.bytes[VMAC_NONCEBYTES - 1] &= ~1; 588 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce [all...] |