/linux-master/net/ceph/ |
H A D | auth_x.h | 35 u64 nonce; member in struct:ceph_x_authorizer
|
/linux-master/net/dccp/ |
H A D | ackvec.h | 62 * @av_buf_nonce: ECN nonce sums, each covering subsequent segments of up to 122 * @nonce: whether @vec had an ECN nonce of 0 or 1 130 nonce:1; member in struct:dccp_ackvec_parsed 134 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
/linux-master/net/mac80211/ |
H A D | aes_gmac.h | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
|
/linux-master/arch/arm/crypto/ |
H A D | ghash-ce-glue.c | 49 u8 nonce[]; // for RFC4106 nonce member in struct:gcm_key 684 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); 699 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE); 712 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE);
|
H A D | poly1305-armv4.pl | 371 my ($ctx,$mac,$nonce)=map("r$_",(0..2)); 418 ldr $g0,[$nonce,#0] 423 ldr $g1,[$nonce,#4] 428 ldr $g2,[$nonce,#8] 433 ldr $g3,[$nonce,#12]
|
H A D | poly1305-glue.c | 24 void poly1305_emit_arm(void *state, u8 *digest, const u32 *nonce);
|
/linux-master/arch/arm64/crypto/ |
H A D | ghash-ce-glue.c | 48 u8 nonce[RFC4106_NONCE_SIZE]; member in struct:gcm_aes_ctx 491 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); 506 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE); 519 memcpy(iv, ctx->nonce, RFC4106_NONCE_SIZE);
|
H A D | poly1305-armv8.pl | 45 my ($mac,$nonce)=($inp,$len); 208 ldp $t0,$t1,[$nonce] // load nonce 248 ror $t0,$t0,#32 // flip nonce words 251 adds $h0,$h0,$t0 // accumulate nonce
|
H A D | poly1305-glue.c | 24 asmlinkage void poly1305_emit(void *state, u8 *digest, const u32 *nonce);
|
/linux-master/arch/mips/crypto/ |
H A D | poly1305-glue.c | 18 asmlinkage void poly1305_emit_mips(void *state, u8 *digest, const u32 *nonce);
|
H A D | poly1305-mips.pl | 447 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 488 lwu $tmp0,0($nonce) # load nonce 489 lwu $tmp1,4($nonce) 490 lwu $tmp2,8($nonce) 491 lwu $tmp3,12($nonce) 497 daddu $in0,$tmp0 # accumulate nonce 1153 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3); 1210 lw $tmp0,0($nonce) # load nonce [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | chacha-p10le-8x.S | 610 lxvw4x 51, 19, 3 # vr19, counter, nonce 767 lxvw4x 51, 19, 3 # vr19, counter, nonce
|
/linux-master/arch/powerpc/perf/ |
H A D | hv-24x7.c | 522 int nonce) 539 if (!nonce) 544 (int)event_name_len, ev_name, nonce); 562 int nonce) 572 return device_str_attr_create(name, nl, nonce, desc, dl); 576 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) argument 586 return device_str_attr_create(name, nl, nonce, desc, dl); 590 struct hv_24x7_event_data *event, int nonce) 592 *attrs = event_to_attr(ix, event, event->domain, nonce); 946 int nonce; local 519 event_to_attr(unsigned int ix, struct hv_24x7_event_data *event, unsigned int domain, int nonce) argument 561 event_to_desc_attr(struct hv_24x7_event_data *event, int nonce) argument 589 event_data_to_attrs(unsigned int ix, struct attribute **attrs, struct hv_24x7_event_data *event, int nonce) argument [all...] |
/linux-master/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 55 u8 nonce[4]; member in struct:aesni_rfc4106_gcm_ctx 623 /*Account for 4 byte nonce at the end.*/ 626 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); 842 *(iv+i) = ctx->nonce[i]; 870 *(iv+i) = ctx->nonce[i];
|
H A D | poly1305-x86_64-cryptogams.pl | 178 my ($mac,$nonce)=($inp,$len); # *_emit arguments 396 add 0($nonce),%rax # accumulate nonce 397 adc 8($nonce),%rcx 1505 add 0($nonce),%rax # accumulate nonce 1506 adc 8($nonce),%rcx 3858 add 0($nonce),%rax # accumulate nonce 3859 adc 8($nonce), [all...] |
H A D | poly1305_glue.c | 23 const u32 nonce[4]); 25 const u32 nonce[4]); 124 const u32 nonce[4]) 127 poly1305_emit_x86_64(ctx, mac, nonce); 129 poly1305_emit_avx(ctx, mac, nonce); 123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) argument
|
/linux-master/crypto/ |
H A D | ccm.c | 31 u8 nonce[3]; member in struct:crypto_rfc4309_ctx 577 memcpy(ctx->nonce, key + keylen, 3); 616 memcpy(iv + 1, ctx->nonce, 3);
|
H A D | ctr.c | 20 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member in struct:crypto_rfc3686_ctx 175 /* the nonce is stored in bytes at end of key */ 179 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), 202 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE);
|
H A D | gcm.c | 34 u8 nonce[4]; member in struct:crypto_rfc4106_ctx 50 u8 nonce[4]; member in struct:crypto_rfc4543_ctx 697 memcpy(ctx->nonce, key + keylen, 4); 731 memcpy(iv, ctx->nonce, 4); 905 memcpy(ctx->nonce, key + keylen, 4); 941 memcpy(iv, ctx->nonce, 4);
|
H A D | vmac.c | 71 } nonce; member in struct:vmac_desc_ctx 72 unsigned int nonce_size; /* nonce bytes filled so far */ 501 memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n); 573 * The VMAC specification requires a nonce at least 1 bit shorter than 575 * nonce. We define the unused bit to be the first one and require that 578 if (dctx->nonce.bytes[0] & 0x80) 584 /* Generate pseudorandom pad by encrypting the nonce */ 586 index = dctx->nonce.bytes[VMAC_NONCEBYTES - 1] & 1; 587 dctx->nonce.bytes[VMAC_NONCEBYTES - 1] &= ~1; 588 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce [all...] |
/linux-master/drivers/accel/habanalabs/common/ |
H A D | firmware_if.c | 3199 u32 nonce, u32 timeout) 3218 pkt.nonce = cpu_to_le32(nonce); 3237 u32 nonce) 3240 sizeof(struct cpucp_sec_attest_info), nonce, 3245 struct cpucp_dev_info_signed *dev_info_signed, u32 nonce) 3248 sizeof(struct cpucp_dev_info_signed), nonce, 3198 hl_fw_get_sec_attest_data(struct hl_device *hdev, u32 packet_id, void *data, u32 size, u32 nonce, u32 timeout) argument 3236 hl_fw_get_sec_attest_info(struct hl_device *hdev, struct cpucp_sec_attest_info *sec_attest_info, u32 nonce) argument 3244 hl_fw_get_dev_info_signed(struct hl_device *hdev, struct cpucp_dev_info_signed *dev_info_signed, u32 nonce) argument
|
H A D | habanalabs.h | 3994 u32 nonce); 3996 struct cpucp_dev_info_signed *dev_info_signed, u32 nonce);
|
H A D | habanalabs_ioctl.c | 701 info->nonce = le32_to_cpu(sec_attest_info->nonce); 751 info->nonce = le32_to_cpu(dev_info_signed->nonce);
|
/linux-master/drivers/block/ |
H A D | rbd.c | 3927 le32_to_cpu(lockers[0].info.addr.nonce), handle); 5068 le32_to_cpu(client_addr->nonce));
|
/linux-master/drivers/crypto/caam/ |
H A D | caamalg.c | 200 u32 *desc, *nonce = NULL; local 228 nonce = (u32 *)((void *)ctx->key + ctx->adata.keylen_pad + 266 ctx->authsize, is_rfc3686, nonce, ctx1_iv_off, 289 nonce, ctx1_iv_off, false, ctrlpriv->era); 312 ctx->authsize, is_rfc3686, nonce, 705 * in the nonce. Update the AES key length. 731 * in the nonce. Update the AES key length. 1189 * For RFC7539 simply load the 12 bytes nonce in a single operation
|