Searched refs:ciphertext (Results 1 – 17 of 17) sorted by relevance
| /linux/arch/arm/crypto/ |
| H A D | Kconfig | 66 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 79 ciphertext stealing when the message isn't a multiple of 16 bytes, and 94 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
| /linux/arch/arm64/crypto/ |
| H A D | Kconfig | 85 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 102 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 121 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E 151 - XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
| /linux/fs/smb/server/ |
| H A D | ntlmssp.h | 165 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; member
|
| /linux/Documentation/crypto/ |
| H A D | userspace-if.rst | 94 ciphertext in different memory locations, all a consumer needs to do is 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag 284 - AEAD encryption output: ciphertext \|\| authentication tag 396 provided ciphertext is assumed to contain an authentication tag of
|
| H A D | devel-algos.rst | 132 contains the plaintext and will contain the ciphertext. Please refer
|
| /linux/Documentation/filesystems/ |
| H A D | fscrypt.rst | 125 "locked", i.e. in ciphertext or encrypted form. 248 resulting ciphertext is used as the derived key. If the ciphertext is 269 files doesn't map to the same ciphertext, or vice versa. In most 378 the difficulty of dealing with ciphertext expansion. Therefore, 985 be in plaintext form or in ciphertext form) is global. This mismatch 1253 for an encrypted file contains the plaintext, not the ciphertext. 1265 listed in an encoded form derived from their ciphertext. The 1350 Inline encryption doesn't affect the ciphertext or other aspects of 1502 read the ciphertext into the page cache and decrypt it in-place. The 1528 directories.) Instead, filesystems hash the ciphertext filenames, [all …]
|
| H A D | fsverity.rst | 601 the ciphertext. This is necessary in order to make the fs-verity file
|
| /linux/Documentation/block/ |
| H A D | inline-encryption.rst | 33 verify the correctness of the resulting ciphertext. Inline encryption hardware 177 blk-crypto-fallback is used, the ciphertext written to disk (and hence the 289 re-generate the integrity info from the ciphertext data and store that on disk 294 ciphertext, not that of the plaintext). 537 reproduced in software in order to verify the ciphertext that is written to disk 547 For an example of a test that verifies the ciphertext written to disk in the
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 107 the leak of information about the ciphertext device (filesystem type,
|
| /linux/fs/smb/client/ |
| H A D | cifsencrypt.c | 634 arc4_crypt(ctx_arc4, ses->ntlmssp->ciphertext, sec_key, in calc_seckey()
|
| H A D | cifsglob.h | 237 unsigned char ciphertext[CIFS_CPHTXT_SIZE]; /* sent to server */ member
|
| H A D | sess.c | 1271 memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); in build_ntlmssp_auth_blob()
|
| /linux/drivers/staging/rtl8723bs/core/ |
| H A D | rtw_security.c | 638 static void aes128k128d(u8 *key, u8 *data, u8 *ciphertext) in aes128k128d() argument 643 aes_encrypt(&ctx, ciphertext, data); in aes128k128d()
|
| /linux/crypto/ |
| H A D | Kconfig | 750 tristate "XTS (XOR Encrypt XOR with ciphertext stealing)" 755 XTS (XOR Encrypt XOR with ciphertext stealing) mode (NIST SP800-38E
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | amd-memory-encryption.rst | 239 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 3103 to SNP private memory from reading ciphertext. Instead, 3106 If ciphertext hiding is enabled, the joint SEV-ES and 3113 A non-zero value enables SEV-SNP ciphertext hiding and
|
| /linux/Documentation/virt/kvm/ |
| H A D | api.rst | 4846 moving ciphertext of those pages will not result in plaintext being 4851 swap or migrate (move) ciphertext pages. Hence, for now we pin the guest
|