Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 12 of 12) sorted by relevance

/net/dccp/
Dackvec.h132 nonce:1; member
136 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
Dackvec.c350 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument
358 new->nonce = nonce; in dccp_ackvec_parsed_add()
Doptions.c408 u8 i, nonce = 0; in dccp_insert_option_ackvec() local
447 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec()
471 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
/net/mac80211/
Daes_gmac.c20 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument
45 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
Dwpa.c1126 u8 nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_encrypt() local
1154 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt()
1155 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt()
1158 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt()
1172 u8 aad[GMAC_AAD_LEN], mic[GMAC_MIC_LEN], ipn[6], nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_decrypt() local
1200 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt()
1201 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt()
1203 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
Daes_gmac.h20 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
/net/ceph/
Dauth_x.c340 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer()
341 msg_b->nonce = cpu_to_le64(au->nonce); in ceph_x_build_authorizer()
349 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer()
639 if (au->nonce + 1 != le64_to_cpu(reply->nonce_plus_one)) in ceph_x_verify_authorizer_reply()
644 au->nonce, le64_to_cpu(reply->nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
Dauth_x.h34 u64 nonce; member
Dauth_x_protocol.h71 __le64 nonce; member
Dmessenger.c1998 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner()
2001 (int)le32_to_cpu(con->peer_addr.nonce), in process_banner()
2003 (int)le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner()
2991 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
Dmon_client.c903 &client_addr->in_addr, le32_to_cpu(client_addr->nonce)); in ceph_monc_blacklist_add()
992 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
/net/rxrpc/
Drxkad.c620 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
766 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local
788 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
792 sp->hdr.serial, version, nonce, min_level); in rxkad_respond_to_challenge()
811 resp.encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()