/Linux-v4.19/crypto/ |
D | testmgr.h | 38 const char *plaintext; member 997 .plaintext = "", 1001 .plaintext = "a", 1006 .plaintext = "abc", 1011 .plaintext = "message digest", 1016 .plaintext = "abcdefghijklmnopqrstuvwxyz", 1023 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 1028 .plaintext = "123456789012345678901234567890123456789012345678901234567890123" 1038 .plaintext = "", 1044 .plaintext = "a", [all …]
|
D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
|
D | anubis.c | 575 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 577 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
|
D | testmgr.c | 233 memcpy(hash_buff, template->plaintext + temp, in ahash_partial_update() 319 memcpy(hash_buff, template[i].plaintext, template[i].psize); in __test_hash() 443 template[i].plaintext + temp, in __test_hash() 501 memcpy(hash_buff, template[i].plaintext, in __test_hash()
|
/Linux-v4.19/arch/x86/crypto/sha512-mb/ |
D | sha512_mb_mgr_datastruct.S | 60 #FIELD _plaintext, 8, 8 # pointer to plaintext 79 # RES_Q .plaintext, 1
|
/Linux-v4.19/arch/x86/crypto/sha1-mb/ |
D | sha1_mb_mgr_datastruct.S | 61 #FIELD _plaintext, 8, 8 # pointer to plaintext 80 # RES_Q .plaintext, 1
|
/Linux-v4.19/arch/x86/crypto/sha256-mb/ |
D | sha256_mb_mgr_datastruct.S | 60 #FIELD _plaintext, 8, 8 # pointer to plaintext 79 # RES_Q .plaintext, 1
|
/Linux-v4.19/Documentation/blockdev/drbd/ |
D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
/Linux-v4.19/Documentation/crypto/ |
D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
D | devel-algos.rst | 147 scatterlist which contains the plaintext and will contain the
|
/Linux-v4.19/Documentation/filesystems/ |
D | fscrypt.rst | 84 hide the plaintext file contents or filenames from other users on the 98 possible to recover portions of the plaintext file contents, if not 237 plaintext and ciphertext filenames need not be multiples of the AES 462 than the plaintext due to NUL-padding and an extra 2-byte overhead. 471 for an encrypted file contains the plaintext, not the ciphertext. 581 plaintext must be preserved. Instead, filesystems must encrypt into a 598 plaintext filenames, since the plaintext filenames are unavailable 599 without the key. (Hashing the plaintext filenames would also make it
|
/Linux-v4.19/Documentation/security/keys/ |
D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
/Linux-v4.19/net/bluetooth/ |
D | amp.c | 135 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 166 ret = crypto_shash_digest(shash, plaintext, psize, output); in hmac_sha256()
|
/Linux-v4.19/arch/x86/crypto/ |
D | aesni-intel_asm.S | 379 # (r13 is the number of bytes in plaintext mod 16) 671 # r16-r13 is the number of bytes in plaintext mod 16) 842 # write back plaintext/ciphertext for num_initial_blocks 850 # prepare plaintext/ciphertext for GHASH computation 1336 movdqu \XMM1, (%arg3,%r11,1) # Write to plaintext buffer 1340 movdqu \XMM2, 16(%arg3,%r11,1) # Write to plaintext buffer 1344 movdqu \XMM3, 32(%arg3,%r11,1) # Write to plaintext buffer 1348 movdqu \XMM4, 48(%arg3,%r11,1) # Write to plaintext buffer
|
D | aesni-intel_avx-x86_64.S | 390 ## if a = number of total plaintext bytes 1236 mov arg4, %r13 # save the number of bytes of plaintext/ciphertext 1369 # number of bytes in plaintext mod 16) 1392 # number of bytes in plaintext mod 16) 1696 ## if a = number of total plaintext bytes 2561 … mov arg4, %r13 # save the number of bytes of plaintext/ciphertext 2694 # (r13 is the number of bytes in plaintext mod 16) 2717 # number of bytes in plaintext mod 16)
|
/Linux-v4.19/Documentation/filesystems/cifs/ |
D | README | 553 does not work with lanman or plaintext authentication. 619 plaintext, ntlm, ntlmv2, signing allowed). Some 621 options to be enabled (lanman and plaintext require 623 plaintext authentication currently requires also 641 may use plaintext passwords 0x00020 642 must use plaintext passwords 0x20020
|
/Linux-v4.19/Documentation/power/ |
D | swsusp.txt | 292 your sensitive data are then stored in plaintext on disk. This means
|
/Linux-v4.19/Documentation/virtual/kvm/ |
D | api.txt | 3569 engine uses a tweak such that two identical plaintext pages, each at 3571 moving ciphertext of those pages will not result in plaintext being
|