| /linux/crypto/ |
| H A D | testmgr.h | 41 const char *plaintext; member 3981 .plaintext = "", 3985 .plaintext = "a", 3990 .plaintext = "abc", 3995 .plaintext = "message digest", 4000 .plaintext = "abcdefghijklmnopqrstuvwxyz", 4005 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 4010 .plaintext = "123456789012345678901234567890123456789012345678901234567890123" 4020 .plaintext = "", 4026 .plaintext = "a", [all …]
|
| H A D | testmgr.c | 1250 kv.iov_base = (void *)vec->plaintext; in build_hash_sglist() 1713 generate_random_bytes(rng, (u8 *)vec->plaintext, vec->psize); in generate_random_hash_testvec() 1736 crypto_ahash_reqtfm(req), vec->plaintext, in generate_random_hash_testvec() 1834 vec.plaintext = kmalloc(maxdatasize, GFP_KERNEL); in test_hash_vs_generic_impl() 1836 if (!vec.key || !vec.plaintext || !vec.digest) { in test_hash_vs_generic_impl() 1858 kfree(vec.plaintext); in test_hash_vs_generic_impl()
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_test.c | 30 const struct xdr_netobj *plaintext; member 76 .head[0].iov_len = param->plaintext->len, in checksum_case() 77 .len = param->plaintext->len, in checksum_case() 103 memcpy(buf.head[0].iov_base, param->plaintext->data, buf.head[0].iov_len); in checksum_case() 235 .plaintext = &nfold_test1_plaintext, 241 .plaintext = &nfold_test2_plaintext, 247 .plaintext = &nfold_test3_plaintext, 253 .plaintext = &nfold_test4_plaintext, 259 .plaintext = &nfold_test5_plaintext, 265 .plaintext = &nfold_test6_plaintext, [all …]
|
| /linux/tools/verification/models/ |
| H A D | wwnr.dot | 2 {node [shape = plaintext, style=invis, label=""] "__init_not_running"}; 4 {node [shape = plaintext] "not_running"}; 5 {node [shape = plaintext] "running"};
|
| H A D | wip.dot | 3 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
| /linux/tools/verification/models/sched/ |
| H A D | snroc.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_other_context"}; 6 {node [shape = plaintext] "other_context"}; 7 {node [shape = plaintext] "own_context"};
|
| H A D | scpd.dot | 4 {node [shape = plaintext] "can_sched"}; 5 {node [shape = plaintext, style=invis, label=""] "__init_cant_sched"}; 7 {node [shape = plaintext] "cant_sched"};
|
| H A D | sco.dot | 4 {node [shape = plaintext] "scheduling_context"}; 5 {node [shape = plaintext, style=invis, label=""] "__init_thread_context"}; 7 {node [shape = plaintext] "thread_context"};
|
| H A D | snep.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_non_scheduling_context"}; 6 {node [shape = plaintext] "non_scheduling_context"}; 7 {node [shape = plaintext] "scheduling_contex"};
|
| H A D | nrp.dot | 7 {node [shape = plaintext, style=invis, label=""] "__init_preempt_irq"};
|
| H A D | sssw.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_runnable"};
|
| H A D | opid.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_disabled"};
|
| H A D | sts.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_can_sched"};
|
| /linux/Documentation/admin-guide/blockdev/drbd/ |
| H A D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
| /linux/Documentation/crypto/ |
| H A D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
| H A D | devel-algos.rst | 132 contains the plaintext and will contain the ciphertext. Please refer
|
| H A D | krb5.rst | 252 plaintext before encrypting it (the reverse of authenc). The handle returned
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 15 On IPL (boot) a small plaintext bootloader is started, which provides
|
| /linux/Documentation/block/ |
| H A D | inline-encryption.rst | 289 its integrity information is calculated (using the plaintext data, since 293 must not store the integrity info that it received with the plaintext data 294 since that might reveal information about the plaintext data. As such, it must 296 instead. Another issue with storing the integrity info of the plaintext data is 300 ciphertext, not that of the plaintext). 350 plaintext pagecache pages of encrypted files. The focus here is just on
|
| /linux/Documentation/filesystems/ |
| H A D | fscrypt.rst | 90 plaintext file contents or filenames from other users on the same 268 "tweak" the encryption of each file so that the same plaintext in two 350 plaintext filenames, the KDF is also used to derive a 128-bit 539 With CBC-CTS, the IV reuse means that when the plaintext filenames share a 545 All supported filenames encryption modes accept any plaintext length 842 encrypted using that key appear "unlocked", i.e. in plaintext form. 980 be in plaintext form or in ciphertext form) is global. This mismatch 1248 for an encrypted file contains the plaintext, not the ciphertext. 1503 plaintext must be preserved. Instead, filesystems must encrypt into a 1520 plaintext filenames, since the plaintext filenames are unavailable [all …]
|
| H A D | fsverity.rst | 616 fs-verity. In this case, the plaintext data is verified rather than 629 when the file is, since it contains hashes of the plaintext data. 913 file contents are, because it stores hashes of the plaintext
|
| /linux/Documentation/networking/ |
| H A D | tls.rst | 286 Specifies the maximum size of the plaintext payload for transmitted TLS records. 289 TLS records. No plaintext fragment will exceed this size. This option can be used
|
| /linux/Documentation/trace/rv/ |
| H A D | deterministic_automata.rst | 117 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | hypercalls.rst | 185 * bit 4 - plaintext = 0, encrypted = 1
|