Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 18 of 18) sorted by relevance

/Linux-v4.19/crypto/
Dtestmgr.h38 const char *plaintext; member
997 .plaintext = "",
1001 .plaintext = "a",
1006 .plaintext = "abc",
1011 .plaintext = "message digest",
1016 .plaintext = "abcdefghijklmnopqrstuvwxyz",
1023 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
1028 .plaintext = "123456789012345678901234567890123456789012345678901234567890123"
1038 .plaintext = "",
1044 .plaintext = "a",
[all …]
Dkhazad.c803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument
805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
Danubis.c575 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument
577 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
Dtestmgr.c233 memcpy(hash_buff, template->plaintext + temp, in ahash_partial_update()
319 memcpy(hash_buff, template[i].plaintext, template[i].psize); in __test_hash()
443 template[i].plaintext + temp, in __test_hash()
501 memcpy(hash_buff, template[i].plaintext, in __test_hash()
/Linux-v4.19/arch/x86/crypto/sha512-mb/
Dsha512_mb_mgr_datastruct.S60 #FIELD _plaintext, 8, 8 # pointer to plaintext
79 # RES_Q .plaintext, 1
/Linux-v4.19/arch/x86/crypto/sha1-mb/
Dsha1_mb_mgr_datastruct.S61 #FIELD _plaintext, 8, 8 # pointer to plaintext
80 # RES_Q .plaintext, 1
/Linux-v4.19/arch/x86/crypto/sha256-mb/
Dsha256_mb_mgr_datastruct.S60 #FIELD _plaintext, 8, 8 # pointer to plaintext
79 # RES_Q .plaintext, 1
/Linux-v4.19/Documentation/blockdev/drbd/
Ddrbd-connection-state-overview.dot6 node [shape=plaintext]
/Linux-v4.19/Documentation/crypto/
Duserspace-if.rst93 If a consumer on the other hand wants to maintain the plaintext and the
237 with the plaintext / ciphertext. See below for the memory structure.
263 - plaintext or ciphertext
277 - AEAD encryption input: AAD \|\| plaintext
286 - AEAD decryption output: plaintext
Ddevel-algos.rst147 scatterlist which contains the plaintext and will contain the
/Linux-v4.19/Documentation/filesystems/
Dfscrypt.rst84 hide the plaintext file contents or filenames from other users on the
98 possible to recover portions of the plaintext file contents, if not
237 plaintext and ciphertext filenames need not be multiples of the AES
462 than the plaintext due to NUL-padding and an extra 2-byte overhead.
471 for an encrypted file contains the plaintext, not the ciphertext.
581 plaintext must be preserved. Instead, filesystems must encrypt into a
598 plaintext filenames, since the plaintext filenames are unavailable
599 without the key. (Hashing the plaintext filenames would also make it
/Linux-v4.19/Documentation/security/keys/
Decryptfs.rst28 In order to avoid known-plaintext attacks, the datablob obtained through
/Linux-v4.19/net/bluetooth/
Damp.c135 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument
166 ret = crypto_shash_digest(shash, plaintext, psize, output); in hmac_sha256()
/Linux-v4.19/arch/x86/crypto/
Daesni-intel_asm.S379 # (r13 is the number of bytes in plaintext mod 16)
671 # r16-r13 is the number of bytes in plaintext mod 16)
842 # write back plaintext/ciphertext for num_initial_blocks
850 # prepare plaintext/ciphertext for GHASH computation
1336 movdqu \XMM1, (%arg3,%r11,1) # Write to plaintext buffer
1340 movdqu \XMM2, 16(%arg3,%r11,1) # Write to plaintext buffer
1344 movdqu \XMM3, 32(%arg3,%r11,1) # Write to plaintext buffer
1348 movdqu \XMM4, 48(%arg3,%r11,1) # Write to plaintext buffer
Daesni-intel_avx-x86_64.S390 ## if a = number of total plaintext bytes
1236 mov arg4, %r13 # save the number of bytes of plaintext/ciphertext
1369 # number of bytes in plaintext mod 16)
1392 # number of bytes in plaintext mod 16)
1696 ## if a = number of total plaintext bytes
2561 … mov arg4, %r13 # save the number of bytes of plaintext/ciphertext
2694 # (r13 is the number of bytes in plaintext mod 16)
2717 # number of bytes in plaintext mod 16)
/Linux-v4.19/Documentation/filesystems/cifs/
DREADME553 does not work with lanman or plaintext authentication.
619 plaintext, ntlm, ntlmv2, signing allowed). Some
621 options to be enabled (lanman and plaintext require
623 plaintext authentication currently requires also
641 may use plaintext passwords 0x00020
642 must use plaintext passwords 0x20020
/Linux-v4.19/Documentation/power/
Dswsusp.txt292 your sensitive data are then stored in plaintext on disk. This means
/Linux-v4.19/Documentation/virtual/kvm/
Dapi.txt3569 engine uses a tweak such that two identical plaintext pages, each at
3571 moving ciphertext of those pages will not result in plaintext being