Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 22 of 22) sorted by relevance

/linux-3.4.99/drivers/usb/wusbcore/
Dsecurity.c377 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); in wusb_dev_4way_handshake()
432 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); in wusb_dev_4way_handshake()
433 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); in wusb_dev_4way_handshake()
460 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); in wusb_dev_4way_handshake()
Dcrypto.c389 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, in wusb_oob_mic_verify()
/linux-3.4.99/net/dccp/
Dackvec.h129 nonce:1; member
134 u8 *vec, u8 len, u8 nonce);
Dackvec.c350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument
358 new->nonce = nonce; in dccp_ackvec_parsed_add()
Doptions.c440 u8 i, nonce = 0; in dccp_insert_option_ackvec() local
479 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec()
503 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
/linux-3.4.99/net/ceph/
Dauth_x.c321 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer()
323 msg_b.nonce = cpu_to_le64(au->nonce); in ceph_x_build_authorizer()
330 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer()
598 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) in ceph_x_verify_authorizer_reply()
603 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
Dauth_x.h31 u64 nonce; member
Dauth_x_protocol.h71 __le64 nonce; member
Dmessenger.c1478 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner()
1481 (int)le32_to_cpu(con->peer_addr.nonce), in process_banner()
1483 (int)le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner()
2458 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
Dmon_client.c766 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
/linux-3.4.99/crypto/
Dctr.c29 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
257 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey()
286 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt()
Dgcm.c37 u8 nonce[4]; member
42 u8 nonce[4]; member
870 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey()
908 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt()
1083 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4543_setkey()
1124 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt()
Dccm.c36 u8 nonce[3]; member
656 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey()
697 memcpy(iv + 1, ctx->nonce, 3); in crypto_rfc4309_crypt()
Dvmac.c573 u8 nonce[16] = {}; in vmac_final() local
575 mac = vmac(NULL, 0, nonce, NULL, ctx); in vmac_final()
/linux-3.4.99/net/rxrpc/
Drxkad.c585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
747 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local
769 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
773 ntohl(sp->hdr.serial), version, nonce, min_level); in rxkad_respond_to_challenge()
800 resp.encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()
/linux-3.4.99/include/linux/ceph/
Dmsgr.h64 __le32 nonce; /* unique id for process (e.g. pid) */ member
/linux-3.4.99/include/rxrpc/
Dpacket.h141 __be32 nonce; /* encrypted random number */ member
/linux-3.4.99/arch/x86/crypto/
Daesni-intel_glue.c66 u8 nonce[4]; member
954 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); in rfc4106_set_key()
1102 *(iv+i) = ctx->nonce[i]; in __driver_rfc4106_encrypt()
1184 *(iv+i) = ctx->nonce[i]; in __driver_rfc4106_decrypt()
/linux-3.4.99/include/linux/usb/
Dch9.h877 __u8 nonce[16]; member
/linux-3.4.99/drivers/crypto/
Dixp4xx_crypto.c186 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
871 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), in ablk_rfc3686_setkey()
970 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt()
Ds5p-sss.c156 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member
/linux-3.4.99/security/keys/
Dtrusted.c460 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) in oiap() argument
473 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], in oiap()