/Linux-v5.4/crypto/ |
D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 806 __be64 *dst = (__be64 *)ciphertext; in khazad_crypt()
|
D | anubis.c | 575 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 578 __be32 *dst = (__be32 *)ciphertext; in anubis_crypt()
|
D | Kconfig | 414 with the plaintext blocks to get the ciphertext. Flipping a bit in the 415 ciphertext produces a flipped bit in the plaintext at the same
|
/Linux-v5.4/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 788 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 924 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 936 xor_128(round_key, data, ciphertext); in aes128k128d() 939 byte_sub(ciphertext, intermediatea); in aes128k128d() 941 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 943 byte_sub(ciphertext, intermediatea); in aes128k128d() 949 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/Linux-v5.4/Documentation/crypto/ |
D | userspace-if.rst | 94 ciphertext in different memory locations, all a consumer needs to do is 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 377 provided ciphertext is assumed to contain an authentication tag of
|
D | devel-algos.rst | 148 ciphertext. Please refer to the ScatterWalk interface offered by the
|
/Linux-v5.4/Documentation/filesystems/ |
D | fscrypt.rst | 118 "locked", i.e. in ciphertext or encrypted form. 221 resulting ciphertext is used as the derived key. If the ciphertext is 242 files doesn't map to the same ciphertext, or vice versa. In most 328 with ciphertext expansion. 709 be in plaintext form or in ciphertext form) is global. This mismatch 973 give the length of the ciphertext, which will be slightly longer 983 for an encrypted file contains the plaintext, not the ciphertext. 995 listed in an encoded form derived from their ciphertext. The 1098 read the ciphertext into the page cache and decrypt it in-place. The 1124 directories.) Instead, filesystems hash the ciphertext filenames, [all …]
|
D | fsverity.rst | 416 the ciphertext. This is necessary in order to make the file
|
/Linux-v5.4/drivers/staging/rtl8712/ |
D | rtl871x_security.c | 859 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 871 xor_128(round_key, data, ciphertext); in aes128k128d() 874 byte_sub(ciphertext, intermediatea); in aes128k128d() 876 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 878 byte_sub(ciphertext, intermediatea); in aes128k128d() 884 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/Linux-v5.4/drivers/staging/rtl8723bs/core/ |
D | rtw_security.c | 954 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext); 1101 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 1114 xor_128(round_key, data, ciphertext); in aes128k128d() 1117 byte_sub(ciphertext, intermediatea); in aes128k128d() 1119 xor_128(intermediateb, round_key, ciphertext); in aes128k128d() 1121 byte_sub(ciphertext, intermediatea); in aes128k128d() 1127 xor_128(intermediatea, round_key, ciphertext); in aes128k128d()
|
/Linux-v5.4/arch/x86/crypto/ |
D | aesni-intel_avx-x86_64.S | 310 mov arg5, %r13 # save the number of bytes of plaintext/ciphertext 496 vpshufb SHUF_MASK(%rip), %xmm9, %xmm9 # shuffle xmm9 back to output as ciphertext 855 # shuffle xmm9 back to output as ciphertext 999 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext 1060 … vmovdqu reg_i, (arg3 , %r11) # write back ciphertext for num_initial_blocks blocks 1065 vpshufb SHUF_MASK(%rip), reg_i, reg_i # prepare ciphertext for GHASH computations 1219 …pxor TMP1(%rsp), \XMM1, \XMM1 # combine GHASHed value with the corresponding ciphertext 1235 # ghash the 8 previously encrypted ciphertext blocks 1604 # GHASH the last 4 ciphertext blocks. 1950 ## encrypt the initial num_initial_blocks blocks and apply ghash on the ciphertext [all …]
|
D | aesni-intel_asm.S | 410 # shuffle xmm0 back to output as ciphertext 746 # shuffle xmm9 back to output as ciphertext 838 # write back plaintext/ciphertext for num_initial_blocks 846 # prepare plaintext/ciphertext for GHASH computation 966 # combine GHASHed value with the corresponding ciphertext 1130 movdqu \XMM1, (%arg3,%r11,1) # Write to the ciphertext buffer 1131 movdqu \XMM2, 16(%arg3,%r11,1) # Write to the ciphertext buffer 1132 movdqu \XMM3, 32(%arg3,%r11,1) # Write to the ciphertext buffer 1133 movdqu \XMM4, 48(%arg3,%r11,1) # Write to the ciphertext buffer
|
/Linux-v5.4/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 107 the leak of information about the ciphertext device (filesystem type,
|
/Linux-v5.4/Documentation/virt/kvm/ |
D | amd-memory-encryption.rst | 172 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
|
D | api.txt | 3816 moving ciphertext of those pages will not result in plaintext being 3821 swap or migrate (move) ciphertext pages. Hence, for now we pin the guest
|
/Linux-v5.4/fs/cifs/ |
D | cifsencrypt.c | 791 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
D | cifsglob.h | 161 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ member
|
D | sess.c | 497 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
|