/Linux-v4.19/arch/x86/crypto/sha256-mb/ |
D | sha256_mb_mgr_datastruct.S | 61 #FIELD _ciphertext, 8, 8 # pointer to ciphertext 80 # RES_Q .ciphertext, 1
|
/Linux-v4.19/arch/x86/crypto/sha512-mb/ |
D | sha512_mb_mgr_datastruct.S | 61 #FIELD _ciphertext, 8, 8 # pointer to ciphertext 80 # RES_Q .ciphertext, 1
|
/Linux-v4.19/arch/x86/crypto/sha1-mb/ |
D | sha1_mb_mgr_datastruct.S | 62 #FIELD _ciphertext, 8, 8 # pointer to ciphertext 81 # RES_Q .ciphertext, 1
|
/Linux-v4.19/crypto/ |
D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 806 __be64 *dst = (__be64 *)ciphertext; in khazad_crypt()
|
D | anubis.c | 575 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 578 __be32 *dst = (__be32 *)ciphertext; in anubis_crypt()
|
/Linux-v4.19/Documentation/filesystems/ |
D | fscrypt.rst | 212 with ciphertext expansion. 237 plaintext and ciphertext filenames need not be multiples of the AES 461 give the length of the ciphertext, which will be slightly longer 471 for an encrypted file contains the plaintext, not the ciphertext. 483 listed in an encoded form derived from their ciphertext. The 575 read the ciphertext into the page cache and decrypt it in-place. The 601 directories.) Instead, filesystems hash the ciphertext filenames, 604 the user-supplied name to get the ciphertext. 606 Lookups without the key are more complicated. The raw ciphertext may 608 filenames. Therefore, readdir() must base64-encode the ciphertext for [all …]
|
/Linux-v4.19/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 789 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 925 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 937 xor_128(round_key, data, ciphertext); in aes128k128d() 940 byte_sub(ciphertext, intermediatea); in aes128k128d() 942 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 944 byte_sub(ciphertext, intermediatea); in aes128k128d() 950 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/Linux-v4.19/Documentation/crypto/ |
D | userspace-if.rst | 94 ciphertext in different memory locations, all a consumer needs to do is 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 377 provided ciphertext is assumed to contain an authentication tag of
|
D | devel-algos.rst | 148 ciphertext. Please refer to the ScatterWalk interface offered by the
|
/Linux-v4.19/drivers/staging/rtl8712/ |
D | rtl871x_security.c | 879 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 891 xor_128(round_key, data, ciphertext); in aes128k128d() 894 byte_sub(ciphertext, intermediatea); in aes128k128d() 896 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 898 byte_sub(ciphertext, intermediatea); in aes128k128d() 904 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/Linux-v4.19/drivers/staging/rtl8723bs/core/ |
D | rtw_security.c | 954 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 1101 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 1114 xor_128(round_key, data, ciphertext); in aes128k128d() 1117 byte_sub(ciphertext, intermediatea); in aes128k128d() 1119 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 1121 byte_sub(ciphertext, intermediatea); in aes128k128d() 1127 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/Linux-v4.19/arch/x86/crypto/ |
D | aesni-intel_avx-x86_64.S | 393 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext 524 … vmovdqu reg_i, (arg2 , %r11) # write back ciphertext for num_initial_blocks blocks 529 vpshufb SHUF_MASK(%rip), reg_i, reg_i # prepare ciphertext for GHASH computations 684 …pxor TMP1(%rsp), \XMM1, \XMM1 # combine GHASHed value with the corresponding ciphertext 700 # ghash the 8 previously encrypted ciphertext blocks 1051 # GHASH the last 4 ciphertext blocks. 1236 mov arg4, %r13 # save the number of bytes of plaintext/ciphertext 1430 vpshufb SHUF_MASK(%rip), %xmm9, %xmm9 # shuffle xmm9 back to output as ciphertext 1699 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext 1831 vmovdqu reg_i, (arg2 , %r11) # write back ciphertext for [all …]
|
D | aesni-intel_asm.S | 414 # shuffle xmm0 back to output as ciphertext 750 # shuffle xmm9 back to output as ciphertext 842 # write back plaintext/ciphertext for num_initial_blocks 850 # prepare plaintext/ciphertext for GHASH computation 970 # combine GHASHed value with the corresponding ciphertext 1134 movdqu \XMM1, (%arg3,%r11,1) # Write to the ciphertext buffer 1135 movdqu \XMM2, 16(%arg3,%r11,1) # Write to the ciphertext buffer 1136 movdqu \XMM3, 32(%arg3,%r11,1) # Write to the ciphertext buffer 1137 movdqu \XMM4, 48(%arg3,%r11,1) # Write to the ciphertext buffer
|
/Linux-v4.19/Documentation/device-mapper/ |
D | dm-crypt.txt | 96 the leak of information about the ciphertext device (filesystem type,
|
/Linux-v4.19/Documentation/virtual/kvm/ |
D | amd-memory-encryption.rst | 172 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
|
D | api.txt | 3571 moving ciphertext of those pages will not result in plaintext being 3576 swap or migrate (move) ciphertext pages. Hence, for now we pin the guest
|
/Linux-v4.19/fs/cifs/ |
D | cifsencrypt.c | 805 sg_init_one(&sgout, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in calc_seckey()
|
D | cifsglob.h | 154 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ member
|
D | sess.c | 489 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
|