/kernel/linux/linux-5.10/include/crypto/ |
H A D | chacha20poly1305.h | 20 const u64 nonce, 25 const u8 *ad, const size_t ad_len, const u64 nonce, 30 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 35 const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 40 const u64 nonce, 45 const u64 nonce,
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | chacha20poly1305.h | 20 const u64 nonce, 25 const u8 *ad, const size_t ad_len, const u64 nonce, 30 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 35 const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 40 const u64 nonce, 45 const u64 nonce,
|
/kernel/linux/linux-5.10/lib/crypto/ |
H A D | chacha20poly1305.c | 36 static void xchacha_init(u32 *chacha_state, const u8 *key, const u8 *nonce) in xchacha_init() argument 42 memcpy(iv + 8, nonce + 16, 8); in xchacha_init() 46 /* Compute the subkey given the original key and first 128 nonce bits */ in xchacha_init() 47 chacha_init(chacha_state, k, nonce); in xchacha_init() 92 const u64 nonce, in chacha20poly1305_encrypt() 102 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt() 114 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_encrypt() 119 xchacha_init(chacha_state, key, nonce); in xchacha20poly1305_encrypt() 170 const u64 nonce, in chacha20poly1305_decrypt() 181 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_decrypt() 90 chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt() argument 112 xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_encrypt() argument 168 chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt() argument 194 xchacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_decrypt() argument 208 chacha20poly1305_crypt_sg_inplace(struct scatterlist *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE], int encrypt) chacha20poly1305_crypt_sg_inplace() argument 333 chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt_sg_inplace() argument 343 chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt_sg_inplace() argument [all...] |
H A D | poly1305-donna64.c | 113 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument 164 if (likely(nonce)) { in poly1305_core_emit() 165 /* h = (h + nonce) */ in poly1305_core_emit() 166 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit() 167 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
|
H A D | poly1305-donna32.c | 120 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument 188 if (likely(nonce)) { in poly1305_core_emit() 189 /* mac = (h + nonce) % (2^128) */ in poly1305_core_emit() 190 f = (u64)h0 + nonce[0]; in poly1305_core_emit() 192 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit() 194 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit() 196 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
|
/kernel/linux/linux-6.6/lib/crypto/ |
H A D | chacha20poly1305.c | 36 static void xchacha_init(u32 *chacha_state, const u8 *key, const u8 *nonce) in xchacha_init() argument 42 memcpy(iv + 8, nonce + 16, 8); in xchacha_init() 46 /* Compute the subkey given the original key and first 128 nonce bits */ in xchacha_init() 47 chacha_init(chacha_state, k, nonce); in xchacha_init() 92 const u64 nonce, in chacha20poly1305_encrypt() 102 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt() 114 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_encrypt() 119 xchacha_init(chacha_state, key, nonce); in xchacha20poly1305_encrypt() 170 const u64 nonce, in chacha20poly1305_decrypt() 181 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_decrypt() 90 chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt() argument 112 xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_encrypt() argument 168 chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt() argument 194 xchacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_decrypt() argument 208 chacha20poly1305_crypt_sg_inplace(struct scatterlist *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE], int encrypt) chacha20poly1305_crypt_sg_inplace() argument 333 chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt_sg_inplace() argument 343 chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt_sg_inplace() argument [all...] |
H A D | poly1305-donna64.c | 111 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument 162 if (likely(nonce)) { in poly1305_core_emit() 163 /* h = (h + nonce) */ in poly1305_core_emit() 164 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit() 165 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
|
H A D | poly1305-donna32.c | 120 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument 188 if (likely(nonce)) { in poly1305_core_emit() 189 /* mac = (h + nonce) % (2^128) */ in poly1305_core_emit() 190 f = (u64)h0 + nonce[0]; in poly1305_core_emit() 192 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit() 194 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit() 196 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
|
/kernel/linux/linux-6.6/net/ceph/ |
H A D | decode.c | 28 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 63 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy() 185 sizeof(addr->nonce) + in ceph_encode_entity_addr() 188 ceph_encode_copy(p, &addr->nonce, sizeof(addr->nonce)); in ceph_encode_entity_addr()
|
/kernel/linux/linux-6.6/include/net/ |
H A D | amt.h | 117 __be32 nonce; member 132 __be32 nonce; member 152 __be32 nonce; member 173 __be32 nonce; member 190 __be32 nonce; member 249 __be32 nonce; member 356 __be32 nonce; member
|
/kernel/linux/linux-5.10/net/ceph/ |
H A D | decode.c | 24 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 59 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy()
|
/kernel/linux/linux-5.10/drivers/crypto/nx/ |
H A D | nx-aes-gcm.c | 67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 442 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local 444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 459 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local 461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
|
/kernel/linux/linux-5.10/fs/crypto/ |
H A D | policy.c | 72 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes() 253 * @nonce: nonce to use 256 * encryption policy. @nonce must be a new random nonce. 262 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context() 280 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 296 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZ in fscrypt_new_context() 260 fscrypt_new_context(union fscrypt_context *ctx_u, const union fscrypt_policy *policy_u, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) fscrypt_new_context() argument 392 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; set_encryption_policy() local [all...] |
H A D | fscrypt_private.h | 37 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 47 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 56 * and key with which the file is encrypted. It also contains a nonce that was 90 /* Retrieve the context's nonce, assuming the context was already validated */ 95 return ctx->v1.nonce; in fscrypt_context_nonce() 97 return ctx->v2.nonce; in fscrypt_context_nonce() 248 /* This inode's nonce, copied from the fscrypt_context */ 284 /* per-file nonce; only set in DIRECT_KEY mode */ 285 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
|
/kernel/linux/linux-6.6/drivers/crypto/nx/ |
H A D | nx-aes-gcm.c | 67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 442 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local 444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 459 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local 461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
|
/kernel/linux/linux-5.10/drivers/crypto/caam/ |
H A D | caamalg_desc.h | 60 u32 *nonce, const u32 ctx1_iv_off, 66 const bool is_rfc3686, u32 *nonce, 72 u32 *nonce, const u32 ctx1_iv_off,
|
/kernel/linux/linux-5.10/include/linux/ceph/ |
H A D | msgr.h | 65 __le32 nonce; /* unique id for process (e.g. pid) */ member 73 lhs->nonce == rhs->nonce; in ceph_addr_equal_no_type()
|
/kernel/linux/linux-6.6/drivers/crypto/caam/ |
H A D | caamalg_desc.h | 60 u32 *nonce, const u32 ctx1_iv_off, 66 const bool is_rfc3686, u32 *nonce, 72 u32 *nonce, const u32 ctx1_iv_off,
|
/kernel/linux/linux-6.6/fs/crypto/ |
H A D | policy.c | 112 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes() 293 * @nonce: nonce to use 296 * encryption policy. @nonce must be a new random nonce. 302 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context() 320 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 336 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZ in fscrypt_new_context() 300 fscrypt_new_context(union fscrypt_context *ctx_u, const union fscrypt_policy *policy_u, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) fscrypt_new_context() argument 432 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; set_encryption_policy() local [all...] |
H A D | fscrypt_private.h | 42 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 52 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 61 * and key with which the file is encrypted. It also contains a nonce that was 95 /* Retrieve the context's nonce, assuming the context was already validated */ 100 return ctx->v1.nonce; in fscrypt_context_nonce() 102 return ctx->v2.nonce; in fscrypt_context_nonce() 253 /* This inode's nonce, copied from the fscrypt_context */ 289 /* per-file nonce; only set in DIRECT_KEY mode */ 290 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | poly1305_glue.c | 23 const u32 nonce[4]); 25 const u32 nonce[4]); 124 const u32 nonce[4]) in poly1305_simd_emit() 127 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_simd_emit() 129 poly1305_emit_avx(ctx, mac, nonce); in poly1305_simd_emit() 123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) poly1305_simd_emit() argument
|
/kernel/linux/linux-5.10/drivers/gpu/drm/radeon/ |
H A D | vce_v1_0.c | 46 uint32_t nonce[4]; member 189 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 190 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 191 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 192 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | poly1305_glue.c | 23 const u32 nonce[4]); 25 const u32 nonce[4]); 124 const u32 nonce[4]) in poly1305_simd_emit() 127 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_simd_emit() 129 poly1305_emit_avx(ctx, mac, nonce); in poly1305_simd_emit() 123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) poly1305_simd_emit() argument
|
/kernel/linux/linux-6.6/drivers/gpu/drm/radeon/ |
H A D | vce_v1_0.c | 47 uint32_t nonce[4]; member 190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
/kernel/linux/linux-6.6/tools/crypto/ccp/ |
H A D | dbc.c | 34 memcpy(nonce_out, tmp.nonce, sizeof(tmp.nonce)); in get_nonce()
|