Searched refs:nonce (Results 51 - 75 of 145) sorted by relevance

123456

/linux-master/fs/crypto/
H A Dkeysetup_v1.c37 * master key with AES-128-ECB using the nonce as the AES key. This provides a
48 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE],
71 res = crypto_skcipher_setkey(tfm, nonce, FSCRYPT_FILE_NONCE_SIZE);
47 derive_key_aes(const u8 *master_key, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], u8 *derived_key, unsigned int derived_keysize) argument
H A Dkeysetup.c342 * per-file nonce will be included in all the IVs. But unlike
557 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE],
575 memcpy(crypt_info->ci_nonce, nonce, FSCRYPT_FILE_NONCE_SIZE);
712 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; local
737 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE);
738 return fscrypt_setup_encryption_info(inode, policy, nonce,
555 fscrypt_setup_encryption_info(struct inode *inode, const union fscrypt_policy *policy, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], bool need_dirhash_key) argument
/linux-master/drivers/md/dm-vdo/indexer/
H A Dchapter-index.c129 u64 nonce = chapter_index->volume_nonce; local
139 result = uds_pack_delta_index_page(delta_index, nonce, memory,
H A Dindexer.h141 /* A 64-bit nonce to validate the index */
142 u64 nonce; member in struct:uds_parameters
H A Ddelta-index.c132 /* Externally-defined nonce */
133 u64 nonce; member in struct:delta_page_header
444 static bool verify_delta_index_page(u64 nonce, u16 list_count, u64 expected_nonce, argument
450 * Verify the nonce. A mismatch can happen here during rebuild if we haven't written the
453 if (nonce != expected_nonce)
497 u64 nonce; local
503 const u8 *nonce_addr = (const u8 *) &header->nonce;
509 nonce = get_unaligned_le64(nonce_addr);
513 if (!verify_delta_index_page(nonce, list_count, expected_nonce, memory,
516 nonce
[all...]
/linux-master/net/rxrpc/
H A Drxkad.c638 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce));
641 challenge.nonce = htonl(conn->rxkad.nonce);
795 u32 version, nonce, min_level; local
815 nonce = ntohl(challenge.nonce);
818 trace_rxrpc_rx_challenge(conn, sp->hdr.serial, version, nonce, min_level);
839 resp->encrypted.inc_nonce = htonl(nonce + 1);
1154 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce
[all...]
/linux-master/tools/testing/selftests/tpm2/
H A Dtpm2.py251 def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(),
254 self.nonce = nonce
259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
260 return struct.pack(fmt, self.session_handle, len(self.nonce),
261 self.nonce, self.session_attributes, len(self.hmac),
265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
/linux-master/net/dccp/
H A Doptions.c405 u8 i, nonce = 0; local
444 nonce ^= av->av_buf_nonce[i];
468 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce))
/linux-master/security/keys/trusted-keys/
H A Dtrusted_tpm2.c193 * @nonce: the session nonce, may be NULL if not used
194 * @nonce_len: the session nonce length, may be 0 if not used
200 const u8 *nonce, u16 nonce_len,
208 if (nonce && nonce_len)
209 tpm_buf_append(buf, nonce, nonce_len);
263 NULL /* nonce */, 0,
418 NULL /* nonce */, 0,
476 NULL /* nonce */, 0,
199 tpm2_buf_append_auth(struct tpm_buf *buf, u32 session_handle, const u8 *nonce, u16 nonce_len, u8 attributes, const u8 *hmac, u16 hmac_len) argument
/linux-master/drivers/crypto/
H A Domap-aes-gcm.c294 memcpy(rctx->iv, ctx->octx.nonce, 4);
306 memcpy(rctx->iv, ctx->octx.nonce, 4);
343 memcpy(ctx->octx.nonce, key + keylen, 4);
/linux-master/crypto/
H A Dctr.c20 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:crypto_rfc3686_ctx
175 /* the nonce is stored in bytes at end of key */
179 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE),
202 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE);
/linux-master/fs/bcachefs/
H A Dio_write.c692 crc.nonce)
780 struct nonce nonce = extent_nonce(op->version, op->crc); local
793 csum = bch2_checksum_bio(c, op->crc.csum_type, nonce, &op->wbio.bio);
797 ret = bch2_encrypt_bio(c, op->crc.csum_type, nonce, &op->wbio.bio);
976 crc.nonce = op->nonce;
977 op->nonce += src_len >> 9;
986 u16 nonce = crc.nonce; local
[all...]
H A Dextents.h181 .nonce = crc->crc64.nonce,
192 .nonce = crc->crc128.nonce,
H A Dio_read.c549 struct nonce nonce = extent_nonce(rbio->version, crc); local
565 csum = bch2_checksum_bio(c, crc.csum_type, nonce, src);
587 ret = bch2_encrypt_bio(c, crc.csum_type, nonce, src);
596 nonce = nonce_add(nonce, crc.offset << 9);
602 ret = bch2_encrypt_bio(c, crc.csum_type, nonce, src);
618 ret = bch2_encrypt_bio(c, crc.csum_type, nonce, src);
H A Ddebug.c225 struct nonce nonce; local
239 nonce = btree_nonce(i, offset << 9);
240 csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, n_ondisk);
264 nonce = btree_nonce(i, offset << 9);
265 csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, bne);
/linux-master/arch/arm64/crypto/
H A Dghash-ce-glue.c48 u8 nonce[RFC4106_NONCE_SIZE]; member in struct:gcm_aes_ctx
491 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE);
506 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE);
519 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE);
/linux-master/drivers/net/
H A Damt.c662 amtd->nonce = amt->nonce;
753 amtrh->nonce = amt->nonce;
932 get_random_bytes(&amt->nonce, sizeof(__be32));
966 amt->nonce = 0;
973 get_random_bytes(&amt->nonce, sizeof(__be32));
1033 amtmu->nonce = amt->nonce;
1148 amtmq->nonce
2547 amt_send_advertisement(struct amt_dev *amt, __be32 nonce, __be32 daddr, __be16 dport) argument
[all...]
/linux-master/drivers/net/wireguard/
H A Dreceive.c259 PACKET_CB(skb)->nonce =
279 PACKET_CB(skb)->nonce,
462 PACKET_CB(skb)->nonce))) {
463 net_dbg_ratelimited("%s: Packet has invalid nonce %llu (max %llu)\n",
465 PACKET_CB(skb)->nonce,
/linux-master/net/ipv6/
H A Dndisc.c604 const struct in6_addr *saddr, u64 nonce)
619 if (nonce != 0)
638 if (nonce != 0) {
643 memcpy(opt + 2, &nonce, 6);
652 u64 nonce)
664 skb = ndisc_ns_create(dev, solicit, saddr, nonce);
803 u64 nonce = 0; local
846 memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6);
855 if (nonce != 0 && ifp->dad_nonce == nonce) {
603 ndisc_ns_create(struct net_device *dev, const struct in6_addr *solicit, const struct in6_addr *saddr, u64 nonce) argument
650 ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit, const struct in6_addr *daddr, const struct in6_addr *saddr, u64 nonce) argument
[all...]
/linux-master/drivers/crypto/caam/
H A Dpdb.h81 * @ctr_nonce: 4-byte array nonce
160 * @ctr_nonce: 4-byte array nonce
276 u32 nonce; member in struct:wimax_encap_pdb
288 u32 nonce; member in struct:wimax_decap_pdb
/linux-master/drivers/platform/x86/hp/hp-bioscfg/
H A Dspmobj-attributes.c28 u32 nonce; member in struct:secureplatform_provisioning_data
185 len += sysfs_emit_at(buf, len, "\t\"Nonce\": %d,\n", data.nonce);
/linux-master/drivers/crypto/ccp/
H A Dccp-crypto-aes.c153 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE);
167 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE);
/linux-master/net/mac80211/
H A Dwpa.c1034 u8 nonce[GMAC_NONCE_LEN]; local
1062 memcpy(nonce, hdr->addr2, ETH_ALEN);
1063 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number);
1066 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
1080 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; local
1108 memcpy(nonce, hdr->addr2, ETH_ALEN);
1109 memcpy(nonce + ETH_ALEN, ipn, 6);
1114 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
/linux-master/net/ceph/
H A Dauth_x.c317 msg_b->nonce = cpu_to_le64(au->nonce);
402 get_random_bytes(&au->nonce, sizeof(au->nonce));
409 dout(" built authorizer nonce %llx len %d\n", au->nonce,
896 if (nonce_plus_one != au->nonce + 1) {
/linux-master/arch/mips/crypto/
H A Dpoly1305-mips.pl447 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2);
488 lwu $tmp0,0($nonce) # load nonce
489 lwu $tmp1,4($nonce)
490 lwu $tmp2,8($nonce)
491 lwu $tmp3,12($nonce)
497 daddu $in0,$tmp0 # accumulate nonce
1153 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3);
1210 lw $tmp0,0($nonce) # load nonce
[all...]

Completed in 259 milliseconds

123456