Lines Matching refs:nonce
149 // |key_schedule| and the nonce in |nonce|. Note that, while only 12 bytes of
150 // the nonce are used, 16 bytes are read and so the value must be
152 extern void aes128gcmsiv_kdf(const uint8_t nonce[16],
157 extern void aes256gcmsiv_kdf(const uint8_t nonce[16],
222 const uint8_t nonce[12]) {
272 out_tag[i] ^= nonce[i];
310 // keys given the |nonce|.
314 const uint8_t nonce[12]) {
316 OPENSSL_memcpy(padded_nonce, nonce, 12);
337 size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce,
363 record_enc_key, nonce);
367 (const uint8_t *)record_auth_key, nonce);
407 const uint8_t *nonce, size_t nonce_len,
435 record_enc_key, nonce);
495 calculated_tag[i] ^= nonce[i];
518 EVP_AEAD_AES_GCM_SIV_NONCE_LEN, // nonce length
535 EVP_AEAD_AES_GCM_SIV_NONCE_LEN, // nonce length
639 const uint8_t nonce[EVP_AEAD_AES_GCM_SIV_NONCE_LEN]) {
674 out_tag[i] ^= nonce[i];
690 // given nonce and writes them to |*out_keys|.
694 const uint8_t nonce[EVP_AEAD_AES_GCM_SIV_NONCE_LEN]) {
702 nonce, EVP_AEAD_AES_GCM_SIV_NONCE_LEN);
718 size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce,
743 gcm_siv_keys(gcm_siv_ctx, &keys, nonce);
746 gcm_siv_polyval(tag, in, in_len, ad, ad_len, keys.auth_key, nonce);
758 const uint8_t *nonce, size_t nonce_len,
784 gcm_siv_keys(gcm_siv_ctx, &keys, nonce);
789 gcm_siv_polyval(expected_tag, out, in_len, ad, ad_len, keys.auth_key, nonce);
802 EVP_AEAD_AES_GCM_SIV_NONCE_LEN, // nonce length
819 EVP_AEAD_AES_GCM_SIV_NONCE_LEN, // nonce length