Home
last modified time | relevance | path

Searched refs:nonce (Results 1 - 25 of 194) sorted by relevance

12345678

/kernel/linux/linux-5.10/include/crypto/
H A Dchacha20poly1305.h20 const u64 nonce,
25 const u8 *ad, const size_t ad_len, const u64 nonce,
30 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE],
35 const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE],
40 const u64 nonce,
45 const u64 nonce,
/kernel/linux/linux-6.6/include/crypto/
H A Dchacha20poly1305.h20 const u64 nonce,
25 const u8 *ad, const size_t ad_len, const u64 nonce,
30 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE],
35 const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE],
40 const u64 nonce,
45 const u64 nonce,
/kernel/linux/linux-5.10/lib/crypto/
H A Dchacha20poly1305.c36 static void xchacha_init(u32 *chacha_state, const u8 *key, const u8 *nonce) in xchacha_init() argument
42 memcpy(iv + 8, nonce + 16, 8); in xchacha_init()
46 /* Compute the subkey given the original key and first 128 nonce bits */ in xchacha_init()
47 chacha_init(chacha_state, k, nonce); in xchacha_init()
92 const u64 nonce, in chacha20poly1305_encrypt()
102 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt()
114 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_encrypt()
119 xchacha_init(chacha_state, key, nonce); in xchacha20poly1305_encrypt()
170 const u64 nonce, in chacha20poly1305_decrypt()
181 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_decrypt()
90 chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt() argument
112 xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_encrypt() argument
168 chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt() argument
194 xchacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_decrypt() argument
208 chacha20poly1305_crypt_sg_inplace(struct scatterlist *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE], int encrypt) chacha20poly1305_crypt_sg_inplace() argument
333 chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt_sg_inplace() argument
343 chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt_sg_inplace() argument
[all...]
H A Dpoly1305-donna64.c113 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument
164 if (likely(nonce)) { in poly1305_core_emit()
165 /* h = (h + nonce) */ in poly1305_core_emit()
166 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit()
167 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
H A Dpoly1305-donna32.c120 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument
188 if (likely(nonce)) { in poly1305_core_emit()
189 /* mac = (h + nonce) % (2^128) */ in poly1305_core_emit()
190 f = (u64)h0 + nonce[0]; in poly1305_core_emit()
192 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit()
194 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit()
196 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
/kernel/linux/linux-6.6/lib/crypto/
H A Dchacha20poly1305.c36 static void xchacha_init(u32 *chacha_state, const u8 *key, const u8 *nonce) in xchacha_init() argument
42 memcpy(iv + 8, nonce + 16, 8); in xchacha_init()
46 /* Compute the subkey given the original key and first 128 nonce bits */ in xchacha_init()
47 chacha_init(chacha_state, k, nonce); in xchacha_init()
92 const u64 nonce, in chacha20poly1305_encrypt()
102 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt()
114 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_encrypt()
119 xchacha_init(chacha_state, key, nonce); in xchacha20poly1305_encrypt()
170 const u64 nonce, in chacha20poly1305_decrypt()
181 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_decrypt()
90 chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt() argument
112 xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_encrypt() argument
168 chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt() argument
194 xchacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) xchacha20poly1305_decrypt() argument
208 chacha20poly1305_crypt_sg_inplace(struct scatterlist *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE], int encrypt) chacha20poly1305_crypt_sg_inplace() argument
333 chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_encrypt_sg_inplace() argument
343 chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) chacha20poly1305_decrypt_sg_inplace() argument
[all...]
H A Dpoly1305-donna64.c111 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument
162 if (likely(nonce)) { in poly1305_core_emit()
163 /* h = (h + nonce) */ in poly1305_core_emit()
164 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit()
165 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
H A Dpoly1305-donna32.c120 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() argument
188 if (likely(nonce)) { in poly1305_core_emit()
189 /* mac = (h + nonce) % (2^128) */ in poly1305_core_emit()
190 f = (u64)h0 + nonce[0]; in poly1305_core_emit()
192 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit()
194 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit()
196 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
/kernel/linux/linux-6.6/net/ceph/
H A Ddecode.c28 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned()
63 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy()
185 sizeof(addr->nonce) + in ceph_encode_entity_addr()
188 ceph_encode_copy(p, &addr->nonce, sizeof(addr->nonce)); in ceph_encode_entity_addr()
/kernel/linux/linux-6.6/include/net/
H A Damt.h117 __be32 nonce; member
132 __be32 nonce; member
152 __be32 nonce; member
173 __be32 nonce; member
190 __be32 nonce; member
249 __be32 nonce; member
356 __be32 nonce; member
/kernel/linux/linux-5.10/net/ceph/
H A Ddecode.c24 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned()
59 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy()
/kernel/linux/linux-5.10/drivers/crypto/nx/
H A Dnx-aes-gcm.c67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local
79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key()
442 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local
444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt()
459 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local
461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
/kernel/linux/linux-5.10/fs/crypto/
H A Dpolicy.c72 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes()
253 * @nonce: nonce to use
256 * encryption policy. @nonce must be a new random nonce.
262 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context()
280 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context()
296 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZ in fscrypt_new_context()
260 fscrypt_new_context(union fscrypt_context *ctx_u, const union fscrypt_policy *policy_u, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) fscrypt_new_context() argument
392 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; set_encryption_policy() local
[all...]
H A Dfscrypt_private.h37 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
47 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
56 * and key with which the file is encrypted. It also contains a nonce that was
90 /* Retrieve the context's nonce, assuming the context was already validated */
95 return ctx->v1.nonce; in fscrypt_context_nonce()
97 return ctx->v2.nonce; in fscrypt_context_nonce()
248 /* This inode's nonce, copied from the fscrypt_context */
284 /* per-file nonce; only set in DIRECT_KEY mode */
285 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
/kernel/linux/linux-6.6/drivers/crypto/nx/
H A Dnx-aes-gcm.c67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local
79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key()
442 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local
444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt()
459 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local
461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
/kernel/linux/linux-5.10/drivers/crypto/caam/
H A Dcaamalg_desc.h60 u32 *nonce, const u32 ctx1_iv_off,
66 const bool is_rfc3686, u32 *nonce,
72 u32 *nonce, const u32 ctx1_iv_off,
/kernel/linux/linux-5.10/include/linux/ceph/
H A Dmsgr.h65 __le32 nonce; /* unique id for process (e.g. pid) */ member
73 lhs->nonce == rhs->nonce; in ceph_addr_equal_no_type()
/kernel/linux/linux-6.6/drivers/crypto/caam/
H A Dcaamalg_desc.h60 u32 *nonce, const u32 ctx1_iv_off,
66 const bool is_rfc3686, u32 *nonce,
72 u32 *nonce, const u32 ctx1_iv_off,
/kernel/linux/linux-6.6/fs/crypto/
H A Dpolicy.c112 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes()
293 * @nonce: nonce to use
296 * encryption policy. @nonce must be a new random nonce.
302 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context()
320 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context()
336 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZ in fscrypt_new_context()
300 fscrypt_new_context(union fscrypt_context *ctx_u, const union fscrypt_policy *policy_u, const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) fscrypt_new_context() argument
432 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; set_encryption_policy() local
[all...]
H A Dfscrypt_private.h42 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
52 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
61 * and key with which the file is encrypted. It also contains a nonce that was
95 /* Retrieve the context's nonce, assuming the context was already validated */
100 return ctx->v1.nonce; in fscrypt_context_nonce()
102 return ctx->v2.nonce; in fscrypt_context_nonce()
253 /* This inode's nonce, copied from the fscrypt_context */
289 /* per-file nonce; only set in DIRECT_KEY mode */
290 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
/kernel/linux/linux-5.10/arch/x86/crypto/
H A Dpoly1305_glue.c23 const u32 nonce[4]);
25 const u32 nonce[4]);
124 const u32 nonce[4]) in poly1305_simd_emit()
127 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_simd_emit()
129 poly1305_emit_avx(ctx, mac, nonce); in poly1305_simd_emit()
123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) poly1305_simd_emit() argument
/kernel/linux/linux-5.10/drivers/gpu/drm/radeon/
H A Dvce_v1_0.c46 uint32_t nonce[4]; member
189 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw()
190 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw()
191 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw()
192 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
/kernel/linux/linux-6.6/arch/x86/crypto/
H A Dpoly1305_glue.c23 const u32 nonce[4]);
25 const u32 nonce[4]);
124 const u32 nonce[4]) in poly1305_simd_emit()
127 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_simd_emit()
129 poly1305_emit_avx(ctx, mac, nonce); in poly1305_simd_emit()
123 poly1305_simd_emit(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) poly1305_simd_emit() argument
/kernel/linux/linux-6.6/drivers/gpu/drm/radeon/
H A Dvce_v1_0.c47 uint32_t nonce[4]; member
190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw()
191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw()
192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw()
193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
/kernel/linux/linux-6.6/tools/crypto/ccp/
H A Ddbc.c34 memcpy(nonce_out, tmp.nonce, sizeof(tmp.nonce)); in get_nonce()

Completed in 13 milliseconds

12345678