/net/ceph/ |
D | decode.c | 24 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 59 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy()
|
D | auth_x.c | 314 msg_b->nonce = cpu_to_le64(au->nonce); in encrypt_authorizer() 398 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer() 405 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer() 745 if (au->nonce + 1 != le64_to_cpu(reply->nonce_plus_one)) in ceph_x_verify_authorizer_reply() 750 au->nonce, le64_to_cpu(reply->nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
|
D | auth_x.h | 35 u64 nonce; member
|
D | auth_x_protocol.h | 72 __le64 nonce; member
|
D | messenger.c | 2018 con->actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner() 2021 le32_to_cpu(con->peer_addr.nonce), in process_banner() 2023 le32_to_cpu(con->actual_peer_addr.nonce)); in process_banner() 3032 u32 nonce = le32_to_cpu(msgr->inst.addr.nonce) + 1000000; in ceph_messenger_reset_nonce() local 3033 msgr->inst.addr.nonce = cpu_to_le32(nonce); in ceph_messenger_reset_nonce() 3050 get_random_bytes(&msgr->inst.addr.nonce, sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init()
|
D | mon_client.c | 964 le32_to_cpu(client_addr->nonce)); in ceph_monc_blocklist_add() 976 le32_to_cpu(client_addr->nonce)); in ceph_monc_blocklist_add() 1069 monc->monmap->mon_inst[i].addr.nonce = 0; in build_initial_monmap()
|
/net/dccp/ |
D | ackvec.h | 130 nonce:1; member 134 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
D | ackvec.c | 347 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce) in dccp_ackvec_parsed_add() argument 355 new->nonce = nonce; in dccp_ackvec_parsed_add()
|
D | options.c | 405 u8 i, nonce = 0; in dccp_insert_option_ackvec() local 444 nonce ^= av->av_buf_nonce[i]; in dccp_insert_option_ackvec() 468 if (dccp_ackvec_update_records(av, dcb->dccpd_seq, nonce)) in dccp_insert_option_ackvec()
|
/net/mptcp/ |
D | options.c | 111 mp_opt->nonce = get_unaligned_be32(ptr); in mptcp_parse_option() 115 mp_opt->token, mp_opt->nonce); in mptcp_parse_option() 121 mp_opt->nonce = get_unaligned_be32(ptr); in mptcp_parse_option() 125 mp_opt->thmac, mp_opt->nonce); in mptcp_parse_option() 352 opts->nonce = subflow->local_nonce; in mptcp_syn_options() 714 opts->nonce = subflow_req->local_nonce; in mptcp_synack_options() 717 opts->thmac, opts->nonce); in mptcp_synack_options() 1070 put_unaligned_be32(opts->nonce, ptr); in mptcp_write_options() 1080 put_unaligned_be32(opts->nonce, ptr); in mptcp_write_options()
|
D | protocol.h | 111 u32 nonce; member
|
D | subflow.c | 174 subflow_req->remote_nonce = mp_opt.nonce; in subflow_init_req() 330 subflow->remote_nonce = mp_opt.nonce; in subflow_finish_connect()
|
/net/mac80211/ |
D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 55 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
D | wpa.c | 1144 u8 nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_encrypt() local 1172 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt() 1173 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt() 1176 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt() 1190 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_decrypt() local 1218 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt() 1219 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt() 1224 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
|
D | aes_gmac.h | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
|
/net/ipv6/ |
D | ndisc.c | 604 u64 nonce) in ndisc_send_ns() argument 624 if (nonce != 0) in ndisc_send_ns() 643 if (nonce != 0) { in ndisc_send_ns() 648 memcpy(opt + 2, &nonce, 6); in ndisc_send_ns() 787 u64 nonce = 0; in ndisc_recv_ns() local 833 memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6); in ndisc_recv_ns() 842 if (nonce != 0 && ifp->dad_nonce == nonce) { in ndisc_recv_ns() 843 u8 *np = (u8 *)&nonce; in ndisc_recv_ns()
|
D | addrconf.c | 3996 u64 nonce; in addrconf_dad_kick() local 4003 nonce = 0; in addrconf_dad_kick() 4007 get_random_bytes(&nonce, 6); in addrconf_dad_kick() 4008 while (nonce == 0); in addrconf_dad_kick() 4010 ifp->dad_nonce = nonce; in addrconf_dad_kick()
|
/net/rxrpc/ |
D | rxkad.c | 660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 817 u32 version, nonce, min_level, abort_code; in rxkad_respond_to_challenge() local 839 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() 843 sp->hdr.serial, version, nonce, min_level); in rxkad_respond_to_challenge() 866 resp->encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge()
|
D | protocol.h | 158 __be32 nonce; /* encrypted random number */ member
|