Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 17 of 17) sorted by relevance

/linux/arch/arm/crypto/
H A DKconfig37 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
50 ciphertext stealing when the message isn't a multiple of 16 bytes, and
65 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/linux/arch/arm64/crypto/
H A DKconfig52 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
70 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
89 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
119 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/linux/fs/smb/server/
H A Dntlmssp.h165 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; member
/linux/Documentation/crypto/
H A Duserspace-if.rst94 ciphertext in different memory locations, all a consumer needs to do is
237 with the plaintext / ciphertext. See below for the memory structure.
263 - plaintext or ciphertext
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
284 - AEAD encryption output: ciphertext \|\| authentication tag
396 provided ciphertext is assumed to contain an authentication tag of
H A Ddevel-algos.rst132 contains the plaintext and will contain the ciphertext. Please refer
/linux/Documentation/filesystems/
H A Dfscrypt.rst125 "locked", i.e. in ciphertext or encrypted form.
248 resulting ciphertext is used as the derived key. If the ciphertext is
269 files doesn't map to the same ciphertext, or vice versa. In most
378 the difficulty of dealing with ciphertext expansion. Therefore,
980 be in plaintext form or in ciphertext form) is global. This mismatch
1248 for an encrypted file contains the plaintext, not the ciphertext.
1260 listed in an encoded form derived from their ciphertext. The
1345 Inline encryption doesn't affect the ciphertext or other aspects of
1497 read the ciphertext into the page cache and decrypt it in-place. The
1523 directories.) Instead, filesystems hash the ciphertext filenames,
[all …]
H A Dfsverity.rst617 the ciphertext. This is necessary in order to make the fs-verity file
/linux/Documentation/block/
H A Dinline-encryption.rst33 verify the correctness of the resulting ciphertext. Inline encryption hardware
177 blk-crypto-fallback is used, the ciphertext written to disk (and hence the
295 re-generate the integrity info from the ciphertext data and store that on disk
300 ciphertext, not that of the plaintext).
543 reproduced in software in order to verify the ciphertext that is written to disk
553 For an example of a test that verifies the ciphertext written to disk in the
/linux/fs/smb/client/
H A Dcifsencrypt.c510 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
H A Dsess.c997 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
H A Dcifsglob.h237 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ member
/linux/drivers/staging/rtl8723bs/core/
H A Drtw_security.c616 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument
621 aes_encrypt(&aes, ciphertext, data); in aes128k128d()
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst107 the leak of information about the ciphertext device (filesystem type,
/linux/crypto/
H A DKconfig738 tristate "XTS (XOR Encrypt XOR with ciphertext stealing)"
743 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
/linux/Documentation/virt/kvm/x86/
H A Damd-memory-encryption.rst239 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt3209 to SNP private memory from reading ciphertext. Instead,
3212 If ciphertext hiding is enabled, the joint SEV-ES and
3219 A non-zero value enables SEV-SNP ciphertext hiding and
/linux/Documentation/virt/kvm/
H A Dapi.rst4845 moving ciphertext of those pages will not result in plaintext being
4850 swap or migrate (move) ciphertext pages. Hence, for now we pin the guest