/Linux-v5.4/crypto/ |
D | testmgr.h | 39 const char *plaintext; member 1170 .plaintext = "", 1174 .plaintext = "a", 1179 .plaintext = "abc", 1184 .plaintext = "message digest", 1189 .plaintext = "abcdefghijklmnopqrstuvwxyz", 1194 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 1199 .plaintext = "123456789012345678901234567890123456789012345678901234567890123" 1209 .plaintext = "", 1215 .plaintext = "a", [all …]
|
D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
|
D | anubis.c | 575 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 577 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
|
D | testmgr.c | 1044 kv.iov_base = (void *)vec->plaintext; in build_hash_sglist() 1514 generate_random_bytes((u8 *)vec->plaintext, vec->psize); in generate_random_hash_testvec() 1536 vec->digest_error = crypto_shash_digest(desc, vec->plaintext, in generate_random_hash_testvec() 1633 vec.plaintext = kmalloc(maxdatasize, GFP_KERNEL); in test_hash_vs_generic_impl() 1635 if (!vec.key || !vec.plaintext || !vec.digest) { in test_hash_vs_generic_impl() 1656 kfree(vec.plaintext); in test_hash_vs_generic_impl()
|
D | Kconfig | 414 with the plaintext blocks to get the ciphertext. Flipping a bit in the 415 ciphertext produces a flipped bit in the plaintext at the same
|
/Linux-v5.4/Documentation/admin-guide/blockdev/drbd/ |
D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
/Linux-v5.4/Documentation/crypto/ |
D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
D | devel-algos.rst | 147 scatterlist which contains the plaintext and will contain the
|
/Linux-v5.4/Documentation/filesystems/ |
D | fscrypt.rst | 90 plaintext file contents or filenames from other users on the same 241 "tweak" the encryption of each file so that the same plaintext in two 362 With CTS-CBC, the IV reuse means that when the plaintext filenames 368 All supported filenames encryption modes accept any plaintext length 612 encrypted using that key appear "unlocked", i.e. in plaintext form. 709 be in plaintext form or in ciphertext form) is global. This mismatch 974 than the plaintext due to NUL-padding and an extra 2-byte overhead. 983 for an encrypted file contains the plaintext, not the ciphertext. 1104 plaintext must be preserved. Instead, filesystems must encrypt into a 1121 plaintext filenames, since the plaintext filenames are unavailable [all …]
|
D | fsverity.rst | 415 fs-verity. In this case, the plaintext data is verified rather than 428 when the file is, since it contains hashes of the plaintext data. 711 file contents are, because it stores hashes of the plaintext
|
/Linux-v5.4/Documentation/security/keys/ |
D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
/Linux-v5.4/net/bluetooth/ |
D | amp.c | 128 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 158 ret = crypto_shash_digest(shash, plaintext, psize, output); in hmac_sha256()
|
/Linux-v5.4/arch/x86/crypto/ |
D | aesni-intel_asm.S | 375 # (r13 is the number of bytes in plaintext mod 16) 667 # r16-r13 is the number of bytes in plaintext mod 16) 838 # write back plaintext/ciphertext for num_initial_blocks 846 # prepare plaintext/ciphertext for GHASH computation 1332 movdqu \XMM1, (%arg3,%r11,1) # Write to plaintext buffer 1336 movdqu \XMM2, 16(%arg3,%r11,1) # Write to plaintext buffer 1340 movdqu \XMM3, 32(%arg3,%r11,1) # Write to plaintext buffer 1344 movdqu \XMM4, 48(%arg3,%r11,1) # Write to plaintext buffer
|
D | aesni-intel_avx-x86_64.S | 310 mov arg5, %r13 # save the number of bytes of plaintext/ciphertext 452 # number of bytes in plaintext mod 16) 468 # (r13 is the number of bytes in plaintext mod 16) 776 # r16-r13 is the number of bytes in plaintext mod 16) 996 ## if a = number of total plaintext bytes 1947 ## if a = number of total plaintext bytes
|
/Linux-v5.4/Documentation/admin-guide/cifs/ |
D | usage.rst | 645 does not work with lanman or plaintext authentication. 735 plaintext, ntlm, ntlmv2, signing allowed). Some 737 options to be enabled (lanman and plaintext require 739 plaintext authentication currently requires also 757 may use plaintext passwords 0x00020 758 must use plaintext passwords 0x20020
|
/Linux-v5.4/Documentation/power/ |
D | swsusp.rst | 327 your sensitive data are then stored in plaintext on disk. This means
|
/Linux-v5.4/Documentation/virt/kvm/ |
D | api.txt | 3814 engine uses a tweak such that two identical plaintext pages, each at 3816 moving ciphertext of those pages will not result in plaintext being
|