Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 12 of 12) sorted by relevance

/linux-4.4.14/crypto/
Dtestmgr.h41 char *plaintext; member
343 .plaintext = "",
347 .plaintext = "a",
352 .plaintext = "abc",
357 .plaintext = "message digest",
362 .plaintext = "abcdefghijklmnopqrstuvwxyz",
369 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
374 .plaintext = "123456789012345678901234567890123456789012345678901234567890123"
392 .plaintext = "a",
397 .plaintext = "abc",
[all …]
Dkhazad.c803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument
805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
Danubis.c575 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument
577 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
Dtestmgr.c251 memcpy(hash_buff, template[i].plaintext, template[i].psize); in __test_hash()
333 template[i].plaintext + temp, in __test_hash()
/linux-4.4.14/arch/x86/crypto/sha-mb/
Dsha1_mb_mgr_datastruct.S61 #FIELD _plaintext, 8, 8 # pointer to plaintext
80 # RES_Q .plaintext, 1
/linux-4.4.14/Documentation/blockdev/drbd/
Ddrbd-connection-state-overview.dot6 node [shape=plaintext]
/linux-4.4.14/Documentation/security/
Dkeys-ecryptfs.txt26 In order to avoid known-plaintext attacks, the datablob obtained through
/linux-4.4.14/net/bluetooth/
Damp.c135 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument
166 ret = crypto_shash_digest(shash, plaintext, psize, output); in hmac_sha256()
/linux-4.4.14/arch/x86/crypto/
Daesni-intel_asm.S295 # write back plaintext/ciphertext for num_initial_blocks
300 # prepare plaintext/ciphertext for GHASH computation
517 # write back plaintext/ciphertext for num_initial_blocks
521 # prepare plaintext/ciphertext for GHASH computation
1013 movdqu \XMM1, (%arg2,%r11,1) # Write to plaintext buffer
1017 movdqu \XMM2, 16(%arg2,%r11,1) # Write to plaintext buffer
1021 movdqu \XMM3, 32(%arg2,%r11,1) # Write to plaintext buffer
1025 movdqu \XMM4, 48(%arg2,%r11,1) # Write to plaintext buffer
1320 mov %arg4, %r13 # save the number of bytes of plaintext/ciphertext
1378 # (%r13 is the number of bytes in plaintext mod 16)
[all …]
Daesni-intel_avx-x86_64.S350 ## if a = number of total plaintext bytes
1166 mov arg4, %r13 # save the number of bytes of plaintext/ciphertext
1299 # number of bytes in plaintext mod 16)
1322 # number of bytes in plaintext mod 16)
1609 ## if a = number of total plaintext bytes
2443 … mov arg4, %r13 # save the number of bytes of plaintext/ciphertext
2576 # (r13 is the number of bytes in plaintext mod 16)
2599 # number of bytes in plaintext mod 16)
/linux-4.4.14/Documentation/filesystems/cifs/
DREADME554 does not work with lanman or plaintext authentication.
626 plaintext, ntlm, ntlmv2, signing allowed). Some
628 options to be enabled (lanman and plaintext require
630 plaintext authentication currently requires also
648 may use plaintext passwords 0x00020
649 must use plaintext passwords 0x20020
/linux-4.4.14/Documentation/power/
Dswsusp.txt284 your sensitive data are then stored in plaintext on disk. This means