/linux-3.4.99/drivers/usb/wusbcore/ |
D | security.c | 377 get_random_bytes(&hs[0].nonce, sizeof(hs[0].nonce)); in wusb_dev_4way_handshake() 432 memcpy(keydvt_in.hnonce, hs[0].nonce, sizeof(keydvt_in.hnonce)); in wusb_dev_4way_handshake() 433 memcpy(keydvt_in.dnonce, hs[1].nonce, sizeof(keydvt_in.dnonce)); in wusb_dev_4way_handshake() 460 memcpy(hs[2].nonce, hs[0].nonce, sizeof(hs[2].nonce)); in wusb_dev_4way_handshake()
|
D | crypto.c | 389 .nonce = { 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, in wusb_oob_mic_verify()
|
/linux-3.4.99/net/dccp/ |
D | ackvec.h | 129 nonce:1; member 134 u8 *vec, u8 len, u8 nonce);
|
D | ackvec.c | 350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument 358 new->nonce = nonce; in dccp_ackvec_parsed_add()
|
D | options.c | 440 u8 i, nonce = 0; in dccp_insert_option_ackvec() local 479 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec() 503 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
|
/linux-3.4.99/net/ceph/ |
D | auth_x.c | 321 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer() 323 msg_b.nonce = cpu_to_le64(au->nonce); in ceph_x_build_authorizer() 330 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer() 598 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) in ceph_x_verify_authorizer_reply() 603 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
|
D | auth_x.h | 31 u64 nonce; member
|
D | auth_x_protocol.h | 71 __le64 nonce; member
|
D | messenger.c | 1478 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner() 1481 (int)le32_to_cpu(con->peer_addr.nonce), in process_banner() 1483 (int)le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner() 2458 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
|
D | mon_client.c | 766 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
|
/linux-3.4.99/crypto/ |
D | ctr.c | 29 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member 257 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey() 286 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt()
|
D | gcm.c | 37 u8 nonce[4]; member 42 u8 nonce[4]; member 870 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey() 908 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt() 1083 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4543_setkey() 1124 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt()
|
D | ccm.c | 36 u8 nonce[3]; member 656 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey() 697 memcpy(iv + 1, ctx->nonce, 3); in crypto_rfc4309_crypt()
|
D | vmac.c | 573 u8 nonce[16] = {}; in vmac_final() local 575 mac = vmac(NULL, 0, nonce, NULL, ctx); in vmac_final()
|
/linux-3.4.99/net/rxrpc/ |
D | rxkad.c | 585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 747 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local 769 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() 773 ntohl(sp->hdr.serial), version, nonce, min_level); in rxkad_respond_to_challenge() 800 resp.encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()
|
/linux-3.4.99/include/linux/ceph/ |
D | msgr.h | 64 __le32 nonce; /* unique id for process (e.g. pid) */ member
|
/linux-3.4.99/include/rxrpc/ |
D | packet.h | 141 __be32 nonce; /* encrypted random number */ member
|
/linux-3.4.99/arch/x86/crypto/ |
D | aesni-intel_glue.c | 66 u8 nonce[4]; member 954 memcpy(ctx->nonce, key + key_len, sizeof(ctx->nonce)); in rfc4106_set_key() 1102 *(iv+i) = ctx->nonce[i]; in __driver_rfc4106_encrypt() 1184 *(iv+i) = ctx->nonce[i]; in __driver_rfc4106_decrypt()
|
/linux-3.4.99/include/linux/usb/ |
D | ch9.h | 877 __u8 nonce[16]; member
|
/linux-3.4.99/drivers/crypto/ |
D | ixp4xx_crypto.c | 186 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member 871 memcpy(ctx->nonce, key + (key_len - CTR_RFC3686_NONCE_SIZE), in ablk_rfc3686_setkey() 970 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt()
|
D | s5p-sss.c | 156 uint8_t nonce[CTR_RFC3686_NONCE_SIZE]; member
|
/linux-3.4.99/security/keys/ |
D | trusted.c | 460 static int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce) in oiap() argument 473 memcpy(nonce, &tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)], in oiap()
|