| /linux/crypto/ |
| A D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 806 __be64 *dst = (__be64 *)ciphertext; in khazad_crypt()
|
| A D | anubis.c | 573 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 576 __be32 *dst = (__be32 *)ciphertext; in anubis_crypt()
|
| A D | Kconfig | 442 with the plaintext blocks to get the ciphertext. Flipping a bit in the 443 ciphertext produces a flipped bit in the plaintext at the same
|
| /linux/drivers/staging/r8188eu/core/ |
| A D | rtw_security.c | 647 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 791 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 803 xor_128(round_key, data, ciphertext); in aes128k128d() 806 byte_sub(ciphertext, intermediatea); in aes128k128d() 808 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 810 byte_sub(ciphertext, intermediatea); in aes128k128d() 816 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
| /linux/Documentation/crypto/ |
| A D | userspace-if.rst | 94 ciphertext in different memory locations, all a consumer needs to do is 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 388 provided ciphertext is assumed to contain an authentication tag of
|
| A D | devel-algos.rst | 132 contains the plaintext and will contain the ciphertext. Please refer
|
| /linux/fs/ksmbd/ |
| A D | ntlmssp.h | 165 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; member
|
| /linux/drivers/staging/rtl8712/ |
| A D | rtl871x_security.c | 859 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 871 xor_128(round_key, data, ciphertext); in aes128k128d() 874 byte_sub(ciphertext, intermediatea); in aes128k128d() 876 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 878 byte_sub(ciphertext, intermediatea); in aes128k128d() 884 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
| /linux/Documentation/filesystems/ |
| A D | fscrypt.rst | 118 "locked", i.e. in ciphertext or encrypted form. 221 resulting ciphertext is used as the derived key. If the ciphertext is 242 files doesn't map to the same ciphertext, or vice versa. In most 363 with ciphertext expansion. 1073 for an encrypted file contains the plaintext, not the ciphertext. 1085 listed in an encoded form derived from their ciphertext. The 1178 Inline encryption doesn't affect the ciphertext or other aspects of 1265 directories.) Instead, filesystems hash the ciphertext filenames, 1268 the user-supplied name to get the ciphertext. 1275 back to the raw ciphertext. [all …]
|
| A D | fsverity.rst | 496 the ciphertext. This is necessary in order to make the fs-verity file
|
| /linux/arch/x86/crypto/ |
| A D | aesni-intel_avx-x86_64.S | 299 mov arg5, %r13 # save the number of bytes of plaintext/ciphertext 485 vpshufb SHUF_MASK(%rip), %xmm9, %xmm9 # shuffle xmm9 back to output as ciphertext 844 # shuffle xmm9 back to output as ciphertext 987 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext 1223 # ghash the 8 previously encrypted ciphertext blocks 1592 # GHASH the last 4 ciphertext blocks. 1935 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext 1997 vmovdqu reg_i, (arg3 , %r11) # write back ciphertext for 2159 # the corresponding ciphertext 2178 # ghash the 8 previously encrypted ciphertext blocks [all …]
|
| A D | aesni-intel_asm.S | 405 # shuffle xmm0 back to output as ciphertext 741 # shuffle xmm9 back to output as ciphertext 833 # write back plaintext/ciphertext for num_initial_blocks 841 # prepare plaintext/ciphertext for GHASH computation 961 # combine GHASHed value with the corresponding ciphertext 1125 movdqu \XMM1, (%arg3,%r11,1) # Write to the ciphertext buffer 1126 movdqu \XMM2, 16(%arg3,%r11,1) # Write to the ciphertext buffer 1127 movdqu \XMM3, 32(%arg3,%r11,1) # Write to the ciphertext buffer 1128 movdqu \XMM4, 48(%arg3,%r11,1) # Write to the ciphertext buffer
|
| /linux/Documentation/block/ |
| A D | inline-encryption.rst | 33 verify the correctness of the resulting ciphertext. Inline encryption hardware 177 blk-crypto-fallback is used, the ciphertext written to disk (and hence the 290 re-generate the integrity info from the ciphertext data and store that on disk 295 ciphertext, not that of the plaintext).
|
| /linux/drivers/staging/rtl8723bs/core/ |
| A D | rtw_security.c | 669 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 677 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 682 aes_encrypt(&ctx, ciphertext, data); in aes128k128d()
|
| /linux/Documentation/admin-guide/device-mapper/ |
| A D | dm-crypt.rst | 107 the leak of information about the ciphertext device (filesystem type,
|
| /linux/fs/cifs/ |
| A D | cifsencrypt.c | 702 cifs_arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
| A D | cifsglob.h | 158 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ member
|
| A D | sess.c | 858 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
|
| /linux/Documentation/virt/kvm/ |
| A D | amd-memory-encryption.rst | 200 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
|
| A D | api.rst | 4520 moving ciphertext of those pages will not result in plaintext being 4525 swap or migrate (move) ciphertext pages. Hence, for now we pin the guest
|