/Linux-v6.6/include/crypto/ |
D | chacha20poly1305.h | 20 const u64 nonce, 25 const u8 *ad, const size_t ad_len, const u64 nonce, 30 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 35 const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 40 const u64 nonce, 45 const u64 nonce,
|
/Linux-v6.6/lib/crypto/ |
D | chacha20poly1305.c | 36 static void xchacha_init(u32 *chacha_state, const u8 *key, const u8 *nonce) in xchacha_init() argument 42 memcpy(iv + 8, nonce + 16, 8); in xchacha_init() 47 chacha_init(chacha_state, k, nonce); in xchacha_init() 92 const u64 nonce, in chacha20poly1305_encrypt() argument 102 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt() 114 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_encrypt() 119 xchacha_init(chacha_state, key, nonce); in xchacha20poly1305_encrypt() 170 const u64 nonce, in chacha20poly1305_decrypt() argument 181 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_decrypt() 196 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_decrypt() [all …]
|
D | poly1305-donna64.c | 111 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() 162 if (likely(nonce)) { in poly1305_core_emit() 164 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit() 165 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
|
D | poly1305-donna32.c | 120 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() 188 if (likely(nonce)) { in poly1305_core_emit() 190 f = (u64)h0 + nonce[0]; in poly1305_core_emit() 192 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit() 194 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit() 196 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
|
/Linux-v6.6/net/ceph/ |
D | decode.c | 28 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 63 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy() 185 sizeof(addr->nonce) + in ceph_encode_entity_addr() 188 ceph_encode_copy(p, &addr->nonce, sizeof(addr->nonce)); in ceph_encode_entity_addr()
|
/Linux-v6.6/include/net/ |
D | amt.h | 117 __be32 nonce; member 132 __be32 nonce; member 152 __be32 nonce; member 173 __be32 nonce; member 190 __be32 nonce; member 249 __be32 nonce; member 356 __be32 nonce; member
|
/Linux-v6.6/drivers/crypto/nx/ |
D | nx-aes-gcm.c | 67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 442 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local 444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 459 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local 461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
|
D | nx.h | 92 u8 nonce[NX_GCM4106_NONCE_LEN]; member 106 u8 nonce[NX_CCM4309_NONCE_LEN]; member 114 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
|
/Linux-v6.6/fs/crypto/ |
D | policy.c | 112 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes() 302 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context() 320 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 336 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 432 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; in set_encryption_policy() local 470 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); in set_encryption_policy() 471 ctxsize = fscrypt_new_context(&ctx, policy, nonce); in set_encryption_policy()
|
D | fscrypt_private.h | 42 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 52 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 100 return ctx->v1.nonce; in fscrypt_context_nonce() 102 return ctx->v2.nonce; in fscrypt_context_nonce() 290 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
|
D | keysetup.c | 555 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], in fscrypt_setup_encryption_info() 573 memcpy(crypt_info->ci_nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_setup_encryption_info() 705 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; in fscrypt_prepare_new_inode() local 727 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_prepare_new_inode() 728 return fscrypt_setup_encryption_info(inode, policy, nonce, in fscrypt_prepare_new_inode()
|
/Linux-v6.6/drivers/gpu/drm/radeon/ |
D | vce_v1_0.c | 47 uint32_t nonce[4]; member 190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
/Linux-v6.6/arch/x86/crypto/ |
D | poly1305_glue.c | 23 const u32 nonce[4]); 25 const u32 nonce[4]); 124 const u32 nonce[4]) in poly1305_simd_emit() 127 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_simd_emit() 129 poly1305_emit_avx(ctx, mac, nonce); in poly1305_simd_emit()
|
/Linux-v6.6/drivers/crypto/caam/ |
D | caamalg_desc.h | 60 u32 *nonce, const u32 ctx1_iv_off, 66 const bool is_rfc3686, u32 *nonce, 72 u32 *nonce, const u32 ctx1_iv_off,
|
D | caamalg_desc.c | 213 const bool is_rfc3686, u32 *nonce, int era) in init_sh_desc_key_aead() argument 255 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in init_sh_desc_key_aead() 291 u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, in cnstr_shdsc_aead_encap() argument 295 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_encap() 386 const bool is_rfc3686, u32 *nonce, in cnstr_shdsc_aead_decap() argument 390 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_decap() 503 u32 *nonce, const u32 ctx1_iv_off, in cnstr_shdsc_aead_givencap() argument 510 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_givencap() 1398 const u8 *nonce = cdata->key_virt + cdata->keylen; in cnstr_shdsc_skcipher_encap() local 1400 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in cnstr_shdsc_skcipher_encap() [all …]
|
/Linux-v6.6/tools/crypto/ccp/ |
D | dbc.c | 35 memcpy(nonce_out, tmp.nonce, sizeof(tmp.nonce)); in get_nonce()
|
/Linux-v6.6/arch/powerpc/perf/ |
D | hv-24x7.c | 522 int nonce) in event_to_attr() argument 539 if (!nonce) in event_to_attr() 544 (int)event_name_len, ev_name, nonce); in event_to_attr() 562 int nonce) in event_to_desc_attr() argument 572 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr() 576 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument 586 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr() 590 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument 592 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs() 946 int nonce; in create_events_from_catalog() local [all …]
|
/Linux-v6.6/include/linux/ceph/ |
D | msgr.h | 86 __le32 nonce; /* unique id for process (e.g. pid) */ member 94 lhs->nonce == rhs->nonce; in ceph_addr_equal_no_type()
|
/Linux-v6.6/net/dccp/ |
D | ackvec.h | 130 nonce:1; member 134 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
/Linux-v6.6/net/mac80211/ |
D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 55 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
/Linux-v6.6/tools/testing/selftests/tpm2/ |
D | tpm2.py | 251 def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(), argument 254 self.nonce = nonce 259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 260 return struct.pack(fmt, self.session_handle, len(self.nonce), 261 self.nonce, self.session_attributes, len(self.hmac), 265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
|
/Linux-v6.6/drivers/net/wireguard/ |
D | send.c | 208 header->counter = cpu_to_le64(PACKET_CB(skb)->nonce); in encrypt_packet() 217 PACKET_CB(skb)->nonce, in encrypt_packet() 378 PACKET_CB(skb)->nonce = in wg_packet_send_staged_packets() 380 if (unlikely(PACKET_CB(skb)->nonce >= REJECT_AFTER_MESSAGES)) in wg_packet_send_staged_packets()
|
/Linux-v6.6/crypto/ |
D | vmac.c | 71 } nonce; member 501 memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n); in vmac_update() 578 if (dctx->nonce.bytes[0] & 0x80) in vmac_final() 586 index = dctx->nonce.bytes[VMAC_NONCEBYTES - 1] & 1; in vmac_final() 587 dctx->nonce.bytes[VMAC_NONCEBYTES - 1] &= ~1; in vmac_final() 588 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce.bytes, in vmac_final() 589 dctx->nonce.bytes); in vmac_final() 590 pad = be64_to_cpu(dctx->nonce.pads[index]); in vmac_final()
|
/Linux-v6.6/net/rxrpc/ |
D | rxkad.c | 636 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce)); in rxkad_issue_challenge() 639 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 792 u32 version, nonce, min_level; in rxkad_respond_to_challenge() local 812 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() 815 trace_rxrpc_rx_challenge(conn, sp->hdr.serial, version, nonce, min_level); in rxkad_respond_to_challenge() 836 resp->encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge() 1151 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) { in rxkad_verify_response()
|
/Linux-v6.6/arch/mips/crypto/ |
D | poly1305-mips.pl | 447 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 488 lwu $tmp0,0($nonce) # load nonce 489 lwu $tmp1,4($nonce) 490 lwu $tmp2,8($nonce) 491 lwu $tmp3,12($nonce) 1153 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3); 1210 lw $tmp0,0($nonce) # load nonce 1211 lw $tmp1,4($nonce) 1212 lw $tmp2,8($nonce) 1213 lw $tmp3,12($nonce)
|