| /net/ceph/ |
| A D | decode.c | 28 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 63 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy() 185 sizeof(addr->nonce) + in ceph_encode_entity_addr() 188 ceph_encode_copy(p, &addr->nonce, sizeof(addr->nonce)); in ceph_encode_entity_addr()
|
| A D | auth_x.c | 317 msg_b->nonce = cpu_to_le64(au->nonce); in encrypt_authorizer() 402 get_random_bytes(&au->nonce, sizeof(au->nonce)); in ceph_x_build_authorizer() 409 dout(" built authorizer nonce %llx len %d\n", au->nonce, in ceph_x_build_authorizer() 896 if (nonce_plus_one != au->nonce + 1) { in ceph_x_verify_authorizer_reply()
|
| A D | auth_x.h | 35 u64 nonce; member
|
| A D | auth_x_protocol.h | 73 __le64 nonce; member
|
| A D | messenger.c | 1374 addr[i].nonce = 0; in ceph_parse_ips() 1661 u32 nonce = le32_to_cpu(msgr->inst.addr.nonce) + 1000000; in ceph_messenger_reset_nonce() local 1662 msgr->inst.addr.nonce = cpu_to_le32(nonce); in ceph_messenger_reset_nonce() 1688 get_random_bytes(&msgr->inst.addr.nonce, in ceph_messenger_init() 1689 sizeof(msgr->inst.addr.nonce)); in ceph_messenger_init() 1690 } while (!msgr->inst.addr.nonce); in ceph_messenger_init()
|
| A D | messenger_v2.c | 830 static void gcm_inc_nonce(struct ceph_gcm_nonce *nonce) in gcm_inc_nonce() argument 834 counter = le64_to_cpu(nonce->counter); in gcm_inc_nonce() 835 nonce->counter = cpu_to_le64(counter + 1); in gcm_inc_nonce() 842 struct ceph_gcm_nonce *nonce; in gcm_crypt() local 845 nonce = encrypt ? &con->v2.out_gcm_nonce : &con->v2.in_gcm_nonce; in gcm_crypt() 855 gcm_inc_nonce(nonce); in gcm_crypt() 1500 ceph_pr_addr(&con->peer_addr), le32_to_cpu(con->peer_addr.nonce), in prepare_client_ident() 2270 WARN_ON(!my_addr->nonce); in process_hello() 2533 __func__, con, ceph_pr_addr(&addr), le32_to_cpu(addr.nonce), in process_server_ident() 2540 le32_to_cpu(con->peer_addr.nonce), in process_server_ident() [all …]
|
| A D | messenger_v1.c | 718 con->v1.actual_peer_addr.nonce == con->peer_addr.nonce)) { in process_banner() 721 le32_to_cpu(con->peer_addr.nonce), in process_banner() 723 le32_to_cpu(con->v1.actual_peer_addr.nonce)); in process_banner()
|
| A D | mon_client.c | 1035 le32_to_cpu(client_addr->nonce)); in ceph_monc_blocklist_add() 1047 le32_to_cpu(client_addr->nonce)); in ceph_monc_blocklist_add() 1155 inst->addr.nonce = 0; in build_initial_monmap()
|
| /net/rxrpc/ |
| A D | rxgk.c | 636 size_t len = sizeof(*whdr) + sizeof(conn->rxgk.nonce); in rxgk_issue_challenge() 642 get_random_bytes(&conn->rxgk.nonce, sizeof(conn->rxgk.nonce)); in rxgk_issue_challenge() 645 page = rxgk_alloc_packet(sizeof(*whdr) + sizeof(conn->rxgk.nonce)); in rxgk_issue_challenge() 670 memcpy(whdr + 1, conn->rxgk.nonce, sizeof(conn->rxgk.nonce)); in rxgk_issue_challenge() 675 trace_rxrpc_tx_challenge(conn, serial, 0, *(u32 *)&conn->rxgk.nonce); in rxgk_issue_challenge() 701 u8 nonce[20]; in rxgk_validate_challenge() local 716 nonce, sizeof(nonce)) < 0) { in rxgk_validate_challenge() 722 trace_rxrpc_rx_challenge(conn, sp->hdr.serial, 0, *(u32 *)nonce, 0); in rxgk_validate_challenge() 834 u8 nonce[20]; in rxgk_construct_authenticator() member 847 a.nonce, sizeof(a.nonce)); in rxgk_construct_authenticator() [all …]
|
| A D | rxkad.c | 654 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce)); in rxkad_issue_challenge() 657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 688 trace_rxrpc_tx_challenge(conn, serial, 0, conn->rxkad.nonce); in rxkad_issue_challenge() 788 sp->chall.rxkad_nonce = ntohl(challenge.nonce); in rxkad_validate_challenge() 1242 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) { in rxkad_verify_response()
|
| A D | protocol.h | 156 __be32 nonce; /* encrypted random number */ member
|
| A D | ar-internal.h | 569 u32 nonce; /* response re-use preventer */ member 574 u8 nonce[20]; /* Response re-use preventer */ member
|
| /net/mac80211/ |
| A D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 55 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
| A D | wpa.c | 1035 u8 nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_encrypt() local 1067 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_encrypt() 1068 bip_ipn_swap(nonce + ETH_ALEN, mmie->sequence_number); in ieee80211_crypto_aes_gmac_encrypt() 1071 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_encrypt() 1085 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_decrypt() local 1113 memcpy(nonce, hdr->addr2, ETH_ALEN); in ieee80211_crypto_aes_gmac_decrypt() 1114 memcpy(nonce + ETH_ALEN, ipn, 6); in ieee80211_crypto_aes_gmac_decrypt() 1119 if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce, in ieee80211_crypto_aes_gmac_decrypt()
|
| A D | aes_gmac.h | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
|
| /net/mptcp/ |
| A D | options.c | 131 mp_opt->nonce = get_unaligned_be32(ptr); in mptcp_parse_option() 135 mp_opt->token, mp_opt->nonce); in mptcp_parse_option() 142 mp_opt->nonce = get_unaligned_be32(ptr); in mptcp_parse_option() 146 mp_opt->thmac, mp_opt->nonce); in mptcp_parse_option() 422 opts->nonce = subflow->local_nonce; in mptcp_syn_options() 919 opts->nonce = subflow_req->local_nonce; in mptcp_synack_options() 922 opts->thmac, opts->nonce); in mptcp_synack_options() 1507 put_unaligned_be32(opts->nonce, ptr); in mptcp_write_options() 1515 put_unaligned_be32(opts->nonce, ptr); in mptcp_write_options()
|
| A D | subflow.c | 225 subflow_req->remote_nonce = mp_opt.nonce; in subflow_check_req() 576 subflow->remote_nonce = mp_opt.nonce; in subflow_finish_connect()
|
| A D | protocol.h | 171 u32 nonce; member
|
| /net/ipv6/ |
| A D | ndisc.c | 607 const struct in6_addr *saddr, u64 nonce) in ndisc_ns_create() argument 622 if (nonce != 0) in ndisc_ns_create() 641 if (nonce != 0) { in ndisc_ns_create() 646 memcpy(opt + 2, &nonce, 6); in ndisc_ns_create() 655 u64 nonce) in ndisc_send_ns() argument 667 skb = ndisc_ns_create(dev, solicit, saddr, nonce); in ndisc_send_ns() 803 u64 nonce = 0; in ndisc_recv_ns() local 844 memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6); in ndisc_recv_ns() 853 if (nonce != 0 && ifp->dad_nonce == nonce) { in ndisc_recv_ns() 854 u8 *np = (u8 *)&nonce; in ndisc_recv_ns()
|
| A D | addrconf.c | 4072 u64 nonce; in addrconf_dad_kick() local 4080 nonce = 0; in addrconf_dad_kick() 4084 get_random_bytes(&nonce, 6); in addrconf_dad_kick() 4085 while (nonce == 0); in addrconf_dad_kick() 4087 ifp->dad_nonce = nonce; in addrconf_dad_kick()
|
| /net/tls/ |
| A D | tls.h | 55 unsigned int nonce; member
|
| A D | tls_main.c | 79 .nonce = cipher ## _IV_SIZE, \ 91 .nonce = 0, \
|
| A D | tls_sw.c | 2719 u16 nonce_size = cipher_desc->nonce; in init_prot_info()
|
| /net/bpf/ |
| A D | test_run.c | 594 __bpf_kfunc int bpf_modify_return_test_tp(int nonce) in bpf_modify_return_test_tp() argument 596 trace_bpf_trigger_tp(nonce); in bpf_modify_return_test_tp() 598 return nonce; in bpf_modify_return_test_tp()
|