/linux-master/fs/crypto/ |
H A D | keysetup_v1.c | 37 * master key with AES-128-ECB using the nonce as the AES key. This provides a 48 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], 71 res = crypto_skcipher_setkey(tfm, nonce, FSCRYPT_FILE_NONCE_SIZE); 47 derive_key_aes(const u8 *master_key, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], u8 *derived_key, unsigned int derived_keysize) argument
|
H A D | keysetup.c | 342 * per-file nonce will be included in all the IVs. But unlike 557 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], 575 memcpy(crypt_info->ci_nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); 712 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; local 737 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); 738 return fscrypt_setup_encryption_info(inode, policy, nonce, 555 fscrypt_setup_encryption_info(struct inode *inode, const union fscrypt_policy *policy, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], bool need_dirhash_key) argument
|
/linux-master/drivers/md/dm-vdo/indexer/ |
H A D | chapter-index.c | 129 u64 nonce = chapter_index->volume_nonce; local 139 result = uds_pack_delta_index_page(delta_index, nonce, memory,
|
H A D | indexer.h | 141 /* A 64-bit nonce to validate the index */ 142 u64 nonce; member in struct:uds_parameters
|
H A D | delta-index.c | 132 /* Externally-defined nonce */ 133 u64 nonce; member in struct:delta_page_header 444 static bool verify_delta_index_page(u64 nonce, u16 list_count, u64 expected_nonce, argument 450 * Verify the nonce. A mismatch can happen here during rebuild if we haven't written the 453 if (nonce != expected_nonce) 497 u64 nonce; local 503 const u8 *nonce_addr = (const u8 *) &header->nonce; 509 nonce = get_unaligned_le64(nonce_addr); 513 if (!verify_delta_index_page(nonce, list_count, expected_nonce, memory, 516 nonce [all...] |
/linux-master/net/rxrpc/ |
H A D | rxkad.c | 638 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce)); 641 challenge.nonce = htonl(conn->rxkad.nonce); 795 u32 version, nonce, min_level; local 815 nonce = ntohl(challenge.nonce); 818 trace_rxrpc_rx_challenge(conn, sp->hdr.serial, version, nonce, min_level); 839 resp->encrypted.inc_nonce = htonl(nonce + 1); 1154 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce [all...] |
/linux-master/tools/testing/selftests/tpm2/ |
H A D | tpm2.py | 251 def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(), 254 self.nonce = nonce 259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 260 return struct.pack(fmt, self.session_handle, len(self.nonce), 261 self.nonce, self.session_attributes, len(self.hmac), 265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
|
/linux-master/net/dccp/ |
H A D | options.c | 405 u8 i, nonce = 0; local 444 nonce ^= av->av_buf_nonce[i]; 468 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce))
|
/linux-master/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 193 * @nonce: the session nonce, may be NULL if not used 194 * @nonce_len: the session nonce length, may be 0 if not used 200 const u8 *nonce, u16 nonce_len, 208 if (nonce && nonce_len) 209 tpm_buf_append(buf, nonce, nonce_len); 263 NULL /* nonce */, 0, 418 NULL /* nonce */, 0, 476 NULL /* nonce */, 0, 199 tpm2_buf_append_auth(struct tpm_buf *buf, u32 session_handle, const u8 *nonce, u16 nonce_len, u8 attributes, const u8 *hmac, u16 hmac_len) argument
|
/linux-master/drivers/crypto/ |
H A D | omap-aes-gcm.c | 294 memcpy(rctx->iv, ctx->octx.nonce, 4); 306 memcpy(rctx->iv, ctx->octx.nonce, 4); 343 memcpy(ctx->octx.nonce, key + keylen, 4);
|
/linux-master/crypto/ |
H A D | ctr.c | 20 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:crypto_rfc3686_ctx 175 /* the nonce is stored in bytes at end of key */ 179 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), 202 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE);
|
/linux-master/fs/bcachefs/ |
H A D | io_write.c | 692 crc.nonce) 780 struct nonce nonce = extent_nonce(op->version, op->crc); local 793 csum = bch2_checksum_bio(c, op->crc.csum_type, nonce, &op->wbio.bio); 797 ret = bch2_encrypt_bio(c, op->crc.csum_type, nonce, &op->wbio.bio); 976 crc.nonce = op->nonce; 977 op->nonce += src_len >> 9; 986 u16 nonce = crc.nonce; local [all...] |
H A D | extents.h | 181 .nonce = crc->crc64.nonce, 192 .nonce = crc->crc128.nonce,
|
H A D | io_read.c | 549 struct nonce nonce = extent_nonce(rbio->version, crc); local 565 csum = bch2_checksum_bio(c, crc.csum_type, nonce, src); 587 ret = bch2_encrypt_bio(c, crc.csum_type, nonce, src); 596 nonce = nonce_add(nonce, crc.offset << 9); 602 ret = bch2_encrypt_bio(c, crc.csum_type, nonce, src); 618 ret = bch2_encrypt_bio(c, crc.csum_type, nonce, src);
|
H A D | debug.c | 225 struct nonce nonce; local 239 nonce = btree_nonce(i, offset << 9); 240 csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, n_ondisk); 264 nonce = btree_nonce(i, offset << 9); 265 csum = csum_vstruct(c, BSET_CSUM_TYPE(i), nonce, bne);
|
/linux-master/arch/arm64/crypto/ |
H A D | ghash-ce-glue.c | 48 u8 nonce[RFC4106_NONCE_SIZE]; member in struct:gcm_aes_ctx 491 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); 506 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE); 519 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE);
|
/linux-master/drivers/net/ |
H A D | amt.c | 662 amtd->nonce = amt->nonce; 753 amtrh->nonce = amt->nonce; 932 get_random_bytes(&amt->nonce, sizeof(__be32)); 966 amt->nonce = 0; 973 get_random_bytes(&amt->nonce, sizeof(__be32)); 1033 amtmu->nonce = amt->nonce; 1148 amtmq->nonce 2547 amt_send_advertisement(struct amt_dev *amt, __be32 nonce, __be32 daddr, __be16 dport) argument [all...] |
/linux-master/drivers/net/wireguard/ |
H A D | receive.c | 259 PACKET_CB(skb)->nonce = 279 PACKET_CB(skb)->nonce, 462 PACKET_CB(skb)->nonce))) { 463 net_dbg_ratelimited("%s: Packet has invalid nonce %llu (max %llu)\n", 465 PACKET_CB(skb)->nonce,
|
/linux-master/net/ipv6/ |
H A D | ndisc.c | 604 const struct in6_addr *saddr, u64 nonce) 619 if (nonce != 0) 638 if (nonce != 0) { 643 memcpy(opt + 2, &nonce, 6); 652 u64 nonce) 664 skb = ndisc_ns_create(dev, solicit, saddr, nonce); 803 u64 nonce = 0; local 846 memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6); 855 if (nonce != 0 && ifp->dad_nonce == nonce) { 603 ndisc_ns_create(struct net_device *dev, const struct in6_addr *solicit, const struct in6_addr *saddr, u64 nonce) argument 650 ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit, const struct in6_addr *daddr, const struct in6_addr *saddr, u64 nonce) argument [all...] |
/linux-master/drivers/crypto/caam/ |
H A D | pdb.h | 81 * @ctr_nonce: 4-byte array nonce 160 * @ctr_nonce: 4-byte array nonce 276 u32 nonce; member in struct:wimax_encap_pdb 288 u32 nonce; member in struct:wimax_decap_pdb
|
/linux-master/drivers/platform/x86/hp/hp-bioscfg/ |
H A D | spmobj-attributes.c | 28 u32 nonce; member in struct:secureplatform_provisioning_data 185 len += sysfs_emit_at(buf, len, "\t\"Nonce\": %d,\n", data.nonce);
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 153 memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE); 167 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE);
|
/linux-master/net/mac80211/ |
H A D | wpa.c | 1034 u8 nonce[GMAC_NONCE_LEN]; local 1062 memcpy(nonce, hdr->addr2, ETH_ALEN); 1063 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); 1066 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, 1080 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; local 1108 memcpy(nonce, hdr->addr2, ETH_ALEN); 1109 memcpy(nonce + ETH_ALEN, ipn, 6); 1114 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
|
/linux-master/net/ceph/ |
H A D | auth_x.c | 317 msg_b->nonce = cpu_to_le64(au->nonce); 402 get_random_bytes(&au->nonce, sizeof(au->nonce)); 409 dout(" built authorizer nonce %llx len %d\n", au->nonce, 896 if (nonce_plus_one != au->nonce + 1) {
|
/linux-master/arch/mips/crypto/ |
H A D | poly1305-mips.pl | 447 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 488 lwu $tmp0,0($nonce) # load nonce 489 lwu $tmp1,4($nonce) 490 lwu $tmp2,8($nonce) 491 lwu $tmp3,12($nonce) 497 daddu $in0,$tmp0 # accumulate nonce 1153 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3); 1210 lw $tmp0,0($nonce) # load nonce [all...] |