/kernel/linux/linux-5.10/include/crypto/ |
D | chacha20poly1305.h | 20 const u64 nonce, 25 const u8 *ad, const size_t ad_len, const u64 nonce, 30 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 35 const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], 40 const u64 nonce, 45 const u64 nonce,
|
/kernel/linux/linux-5.10/lib/crypto/ |
D | chacha20poly1305.c | 36 static void xchacha_init(u32 *chacha_state, const u8 *key, const u8 *nonce) in xchacha_init() argument 42 memcpy(iv + 8, nonce + 16, 8); in xchacha_init() 47 chacha_init(chacha_state, k, nonce); in xchacha_init() 92 const u64 nonce, in chacha20poly1305_encrypt() argument 102 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt() 114 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_encrypt() 119 xchacha_init(chacha_state, key, nonce); in xchacha20poly1305_encrypt() 170 const u64 nonce, in chacha20poly1305_decrypt() argument 181 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_decrypt() 196 const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], in xchacha20poly1305_decrypt() [all …]
|
D | poly1305-donna64.c | 113 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() 164 if (likely(nonce)) { in poly1305_core_emit() 166 t0 = ((u64)nonce[1] << 32) | nonce[0]; in poly1305_core_emit() 167 t1 = ((u64)nonce[3] << 32) | nonce[2]; in poly1305_core_emit()
|
D | poly1305-donna32.c | 120 void poly1305_core_emit(const struct poly1305_state *state, const u32 nonce[4], in poly1305_core_emit() 188 if (likely(nonce)) { in poly1305_core_emit() 190 f = (u64)h0 + nonce[0]; in poly1305_core_emit() 192 f = (u64)h1 + nonce[1] + (f >> 32); in poly1305_core_emit() 194 f = (u64)h2 + nonce[2] + (f >> 32); in poly1305_core_emit() 196 f = (u64)h3 + nonce[3] + (f >> 32); in poly1305_core_emit()
|
/kernel/linux/linux-5.10/net/ceph/ |
D | decode.c | 24 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_versioned() 59 ceph_decode_copy_safe(p, end, &addr->nonce, sizeof(addr->nonce), bad); in ceph_decode_entity_addr_legacy()
|
/kernel/linux/linux-5.10/drivers/crypto/nx/ |
D | nx-aes-gcm.c | 67 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_set_key() local 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 442 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_encrypt() local 444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 459 char *nonce = nx_ctx->priv.gcm.nonce; in gcm4106_aes_nx_decrypt() local 461 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt()
|
D | nx.h | 92 u8 nonce[NX_GCM4106_NONCE_LEN]; member 106 u8 nonce[NX_CCM4309_NONCE_LEN]; member 114 u8 nonce[CTR_RFC3686_NONCE_SIZE]; member
|
D | nx-aes-ctr.c | 63 memcpy(nx_ctx->priv.ctr.nonce, in ctr3686_aes_nx_set_key() 121 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_NONCE_SIZE); in ctr3686_aes_nx_crypt()
|
/kernel/linux/linux-5.10/fs/crypto/ |
D | policy.c | 72 if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { in supported_direct_key_modes() 262 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) in fscrypt_new_context() 280 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 296 memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_new_context() 392 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; in set_encryption_policy() local 430 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); in set_encryption_policy() 431 ctxsize = fscrypt_new_context(&ctx, policy, nonce); in set_encryption_policy()
|
D | fscrypt_private.h | 37 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 47 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member 95 return ctx->v1.nonce; in fscrypt_context_nonce() 97 return ctx->v2.nonce; in fscrypt_context_nonce() 285 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; member
|
D | keysetup.c | 525 const u8 nonce[FSCRYPT_FILE_NONCE_SIZE], in fscrypt_setup_encryption_info() 543 memcpy(crypt_info->ci_nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_setup_encryption_info() 661 u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; in fscrypt_prepare_new_inode() local 683 get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); in fscrypt_prepare_new_inode() 684 return fscrypt_setup_encryption_info(inode, policy, nonce, in fscrypt_prepare_new_inode()
|
/kernel/linux/linux-5.10/drivers/gpu/drm/radeon/ |
D | vce_v1_0.c | 46 uint32_t nonce[4]; member 190 data[0] = sign->val[i].nonce[0]; in vce_v1_0_load_fw() 191 data[1] = sign->val[i].nonce[1]; in vce_v1_0_load_fw() 192 data[2] = sign->val[i].nonce[2]; in vce_v1_0_load_fw() 193 data[3] = sign->val[i].nonce[3]; in vce_v1_0_load_fw()
|
/kernel/linux/linux-5.10/drivers/crypto/caam/ |
D | caamalg_desc.h | 60 u32 *nonce, const u32 ctx1_iv_off, 66 const bool is_rfc3686, u32 *nonce, 72 u32 *nonce, const u32 ctx1_iv_off,
|
D | caamalg_desc.c | 213 const bool is_rfc3686, u32 *nonce, int era) in init_sh_desc_key_aead() argument 255 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in init_sh_desc_key_aead() 291 u32 *nonce, const u32 ctx1_iv_off, const bool is_qi, in cnstr_shdsc_aead_encap() argument 295 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_encap() 386 const bool is_rfc3686, u32 *nonce, in cnstr_shdsc_aead_decap() argument 390 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_decap() 503 u32 *nonce, const u32 ctx1_iv_off, in cnstr_shdsc_aead_givencap() argument 510 init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce, era); in cnstr_shdsc_aead_givencap() 1398 const u8 *nonce = cdata->key_virt + cdata->keylen; in cnstr_shdsc_skcipher_encap() local 1400 append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE, in cnstr_shdsc_skcipher_encap() [all …]
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
D | poly1305_glue.c | 23 const u32 nonce[4]); 25 const u32 nonce[4]); 124 const u32 nonce[4]) in poly1305_simd_emit() 127 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_simd_emit() 129 poly1305_emit_avx(ctx, mac, nonce); in poly1305_simd_emit()
|
/kernel/linux/linux-5.10/net/dccp/ |
D | ackvec.h | 130 nonce:1; member 134 int dccp_ackvec_parsed_add(struct list_head *head, u8 *vec, u8 len, u8 nonce);
|
/kernel/linux/linux-5.10/arch/powerpc/perf/ |
D | hv-24x7.c | 535 int nonce) in event_to_attr() argument 552 if (!nonce) in event_to_attr() 557 (int)event_name_len, ev_name, nonce); in event_to_attr() 575 int nonce) in event_to_desc_attr() argument 585 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_desc_attr() 589 event_to_long_desc_attr(struct hv_24x7_event_data *event, int nonce) in event_to_long_desc_attr() argument 599 return device_str_attr_create(name, nl, nonce, desc, dl); in event_to_long_desc_attr() 603 struct hv_24x7_event_data *event, int nonce) in event_data_to_attrs() argument 605 *attrs = event_to_attr(ix, event, event->domain, nonce); in event_data_to_attrs() 947 int nonce; in create_events_from_catalog() local [all …]
|
/kernel/linux/linux-5.10/tools/testing/selftests/tpm2/ |
D | tpm2.py | 250 def __init__(self, session_handle=TPM2_RS_PW, nonce=bytes(), argument 253 self.nonce = nonce 258 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 259 return struct.pack(fmt, self.session_handle, len(self.nonce), 260 self.nonce, self.session_attributes, len(self.hmac), 264 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
|
/kernel/linux/linux-5.10/net/mac80211/ |
D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 55 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
|
/kernel/linux/linux-5.10/net/mptcp/ |
D | options.c | 110 mp_opt->nonce = get_unaligned_be32(ptr); in mptcp_parse_option() 114 mp_opt->token, mp_opt->nonce); in mptcp_parse_option() 120 mp_opt->nonce = get_unaligned_be32(ptr); in mptcp_parse_option() 124 mp_opt->thmac, mp_opt->nonce); in mptcp_parse_option() 351 opts->nonce = subflow->local_nonce; in mptcp_syn_options() 713 opts->nonce = subflow_req->local_nonce; in mptcp_synack_options() 716 opts->thmac, opts->nonce); in mptcp_synack_options() 1069 put_unaligned_be32(opts->nonce, ptr); in mptcp_write_options() 1079 put_unaligned_be32(opts->nonce, ptr); in mptcp_write_options()
|
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
D | trusted_tpm2.c | 35 const u8 *nonce, u16 nonce_len, in tpm2_buf_append_auth() argument 43 if (nonce && nonce_len) in tpm2_buf_append_auth() 44 tpm_buf_append(buf, nonce, nonce_len); in tpm2_buf_append_auth()
|
/kernel/linux/linux-5.10/drivers/net/wireguard/ |
D | send.c | 208 header->counter = cpu_to_le64(PACKET_CB(skb)->nonce); in encrypt_packet() 217 PACKET_CB(skb)->nonce, in encrypt_packet() 378 PACKET_CB(skb)->nonce = in wg_packet_send_staged_packets() 380 if (unlikely(PACKET_CB(skb)->nonce >= REJECT_AFTER_MESSAGES)) in wg_packet_send_staged_packets()
|
D | cookie.c | 190 get_random_bytes_wait(dst->nonce, COOKIE_NONCE_LEN); in wg_cookie_message_create() 194 macs->mac1, COOKIE_LEN, dst->nonce, in wg_cookie_message_create() 218 peer->latest_cookie.last_mac1_sent, COOKIE_LEN, src->nonce, in wg_cookie_message_consume()
|
/kernel/linux/linux-5.10/crypto/ |
D | vmac.c | 70 } nonce; member 500 memcpy(&dctx->nonce.bytes[dctx->nonce_size], p, n); in vmac_update() 577 if (dctx->nonce.bytes[0] & 0x80) in vmac_final() 585 index = dctx->nonce.bytes[VMAC_NONCEBYTES - 1] & 1; in vmac_final() 586 dctx->nonce.bytes[VMAC_NONCEBYTES - 1] &= ~1; in vmac_final() 587 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce.bytes, in vmac_final() 588 dctx->nonce.bytes); in vmac_final() 589 pad = be64_to_cpu(dctx->nonce.pads[index]); in vmac_final()
|
/kernel/linux/linux-5.10/arch/mips/crypto/ |
D | poly1305-mips.pl | 447 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 488 lwu $tmp0,0($nonce) # load nonce 489 lwu $tmp1,4($nonce) 490 lwu $tmp2,8($nonce) 491 lwu $tmp3,12($nonce) 1153 my ($ctx,$mac,$nonce,$tmp4) = ($a0,$a1,$a2,$a3); 1210 lw $tmp0,0($nonce) # load nonce 1211 lw $tmp1,4($nonce) 1212 lw $tmp2,8($nonce) 1213 lw $tmp3,12($nonce)
|