/kernel/linux/linux-5.10/crypto/ |
D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 806 __be64 *dst = (__be64 *)ciphertext; in khazad_crypt()
|
D | anubis.c | 573 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 576 __be32 *dst = (__be32 *)ciphertext; in anubis_crypt()
|
D | Kconfig | 437 with the plaintext blocks to get the ciphertext. Flipping a bit in the 438 ciphertext produces a flipped bit in the plaintext at the same
|
/kernel/linux/linux-5.10/Documentation/crypto/ |
D | userspace-if.rst | 94 ciphertext in different memory locations, all a consumer needs to do is 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 388 provided ciphertext is assumed to contain an authentication tag of
|
D | devel-algos.rst | 132 contains the plaintext and will contain the ciphertext. Please refer
|
/kernel/linux/linux-5.10/drivers/staging/rtl8712/ |
D | rtl871x_security.c | 859 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 871 xor_128(round_key, data, ciphertext); in aes128k128d() 874 byte_sub(ciphertext, intermediatea); in aes128k128d() 876 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 878 byte_sub(ciphertext, intermediatea); in aes128k128d() 884 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/kernel/linux/linux-5.10/Documentation/filesystems/ |
D | fscrypt.rst | 118 "locked", i.e. in ciphertext or encrypted form. 221 resulting ciphertext is used as the derived key. If the ciphertext is 242 files doesn't map to the same ciphertext, or vice versa. In most 363 with ciphertext expansion. 804 be in plaintext form or in ciphertext form) is global. This mismatch 1068 give the length of the ciphertext, which will be slightly longer 1078 for an encrypted file contains the plaintext, not the ciphertext. 1090 listed in an encoded form derived from their ciphertext. The 1193 read the ciphertext into the page cache and decrypt it in-place. The 1231 directories.) Instead, filesystems hash the ciphertext filenames, [all …]
|
D | fsverity.rst | 424 the ciphertext. This is necessary in order to make the file
|
/kernel/linux/linux-5.10/drivers/staging/rtl8723bs/core/ |
D | rtw_security.c | 922 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 1069 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 1082 xor_128(round_key, data, ciphertext); in aes128k128d() 1085 byte_sub(ciphertext, intermediatea); in aes128k128d() 1087 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 1089 byte_sub(ciphertext, intermediatea); in aes128k128d() 1095 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
D | aesni-intel_avx-x86_64.S | 309 mov arg5, %r13 # save the number of bytes of plaintext/ciphertext 495 vpshufb SHUF_MASK(%rip), %xmm9, %xmm9 # shuffle xmm9 back to output as ciphertext 854 # shuffle xmm9 back to output as ciphertext 997 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext 1058 … vmovdqu reg_i, (arg3 , %r11) # write back ciphertext for num_initial_blocks blocks 1063 vpshufb SHUF_MASK(%rip), reg_i, reg_i # prepare ciphertext for GHASH computations 1217 …pxor TMP1(%rsp), \XMM1, \XMM1 # combine GHASHed value with the corresponding ciphertext 1233 # ghash the 8 previously encrypted ciphertext blocks 1602 # GHASH the last 4 ciphertext blocks. 1945 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext [all …]
|
D | aesni-intel_asm.S | 409 # shuffle xmm0 back to output as ciphertext 745 # shuffle xmm9 back to output as ciphertext 837 # write back plaintext/ciphertext for num_initial_blocks 845 # prepare plaintext/ciphertext for GHASH computation 965 # combine GHASHed value with the corresponding ciphertext 1129 movdqu \XMM1, (%arg3,%r11,1) # Write to the ciphertext buffer 1130 movdqu \XMM2, 16(%arg3,%r11,1) # Write to the ciphertext buffer 1131 movdqu \XMM3, 32(%arg3,%r11,1) # Write to the ciphertext buffer 1132 movdqu \XMM4, 48(%arg3,%r11,1) # Write to the ciphertext buffer
|
/kernel/linux/linux-5.10/Documentation/block/ |
D | inline-encryption.rst | 114 blk-crypto-fallback is used, the ciphertext written to disk (and hence the 249 re-generate the integrity info from the ciphertext data and store that on disk 254 ciphertext, not that of the plaintext).
|
/kernel/linux/linux-5.10/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 107 the leak of information about the ciphertext device (filesystem type,
|
/kernel/linux/linux-5.10/Documentation/virt/kvm/ |
D | amd-memory-encryption.rst | 197 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
|
D | api.rst | 4248 moving ciphertext of those pages will not result in plaintext being 4253 swap or migrate (move) ciphertext pages. Hence, for now we pin the guest
|
/kernel/linux/linux-5.10/fs/cifs/ |
D | cifsencrypt.c | 791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
D | cifsglob.h | 161 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ member
|
D | sess.c | 775 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
|
/kernel/linux/patches/linux-5.10/imx8mm_patch/patches/drivers/ |
D | 0016_linux_drivers_crypto.patch | 1890 - * ciphertext block (CBC mode) or last counter (CTR mode).
|