/linux-6.3-rc2/crypto/ |
A D | testmgr.h | 40 const char *plaintext; member 5529 .plaintext = 5563 .plaintext = 5596 .plaintext = 5615 .plaintext = 6019 .plaintext = 8147 .plaintext = 8239 .plaintext = 8327 .plaintext = 8421 .plaintext = [all …]
|
A D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
|
A D | anubis.c | 573 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 575 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
|
A D | testmgr.c | 1189 kv.iov_base = (void *)vec->plaintext; in build_hash_sglist() 1653 generate_random_bytes((u8 *)vec->plaintext, vec->psize); in generate_random_hash_testvec() 1675 vec->digest_error = crypto_shash_digest(desc, vec->plaintext, in generate_random_hash_testvec() 1772 vec.plaintext = kmalloc(maxdatasize, GFP_KERNEL); in test_hash_vs_generic_impl() 1774 if (!vec.key || !vec.plaintext || !vec.digest) { in test_hash_vs_generic_impl() 1795 kfree(vec.plaintext); in test_hash_vs_generic_impl()
|
A D | Kconfig | 738 with the plaintext blocks to get the ciphertext. Flipping a bit in the 739 ciphertext produces a flipped bit in the plaintext at the same
|
/linux-6.3-rc2/net/sunrpc/auth_gss/ |
A D | gss_krb5_test.c | 30 const struct xdr_netobj *plaintext; member 78 .len = param->plaintext->len, in checksum_case() 274 .plaintext = &nfold_test_kerberos, 280 .plaintext = &nfold_test_kerberos, 286 .plaintext = &nfold_test_kerberos, 292 .plaintext = &nfold_test_kerberos, 310 krb5_nfold(param->plaintext->len * 8, param->plaintext->data, in rfc3961_nfold_case() 750 memcpy(text, param->plaintext->data, param->plaintext->len); in rfc3962_encrypt_case() 1355 param->plaintext->len); in rfc6803_encrypt_case() 1848 param->plaintext->len); in rfc8009_encrypt_case() [all …]
|
/linux-6.3-rc2/tools/verification/models/ |
A D | wwnr.dot | 2 {node [shape = plaintext, style=invis, label=""] "__init_not_running"}; 4 {node [shape = plaintext] "not_running"}; 5 {node [shape = plaintext] "running"};
|
A D | wip.dot | 3 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
/linux-6.3-rc2/drivers/virt/coco/sev-guest/ |
A D | sev-guest.c | 239 void *plaintext, size_t len) in __enc_payload() argument 247 return enc_dec_message(crypto, msg, plaintext, msg->payload, len, true); in __enc_payload() 251 void *plaintext, size_t len) in dec_payload() argument 260 return enc_dec_message(crypto, msg, msg->payload, plaintext, len, false); in dec_payload()
|
/linux-6.3-rc2/Documentation/admin-guide/blockdev/drbd/ |
A D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
/linux-6.3-rc2/Documentation/crypto/ |
A D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
A D | devel-algos.rst | 132 contains the plaintext and will contain the ciphertext. Please refer
|
/linux-6.3-rc2/Documentation/block/ |
A D | inline-encryption.rst | 284 its integrity information is calculated (using the plaintext data, since 288 must not store the integrity info that it received with the plaintext data 289 since that might reveal information about the plaintext data. As such, it must 291 instead. Another issue with storing the integrity info of the plaintext data is 295 ciphertext, not that of the plaintext).
|
/linux-6.3-rc2/Documentation/security/keys/ |
A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
/linux-6.3-rc2/net/bluetooth/ |
A D | amp.c | 128 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 158 ret = crypto_shash_digest(shash, plaintext, psize, output); in hmac_sha256()
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | fscrypt.rst | 90 plaintext file contents or filenames from other users on the same 241 "tweak" the encryption of each file so that the same plaintext in two 323 plaintext filenames, the KDF is also used to derive a 128-bit 426 With CTS-CBC, the IV reuse means that when the plaintext filenames share a 432 All supported filenames encryption modes accept any plaintext length 698 encrypted using that key appear "unlocked", i.e. in plaintext form. 823 be in plaintext form or in ciphertext form) is global. This mismatch 1092 for an encrypted file contains the plaintext, not the ciphertext. 1285 plaintext must be preserved. Instead, filesystems must encrypt into a 1302 plaintext filenames, since the plaintext filenames are unavailable [all …]
|
A D | fsverity.rst | 510 fs-verity. In this case, the plaintext data is verified rather than 523 when the file is, since it contains hashes of the plaintext data. 807 file contents are, because it stores hashes of the plaintext
|
/linux-6.3-rc2/Documentation/virt/kvm/s390/ |
A D | s390-pv-boot.rst | 15 On IPL (boot) a small plaintext bootloader is started, which provides
|
/linux-6.3-rc2/Documentation/trace/rv/ |
A D | deterministic_automata.rst | 117 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
/linux-6.3-rc2/arch/x86/crypto/ |
A D | aesni-intel_asm.S | 370 # (r13 is the number of bytes in plaintext mod 16) 662 # r16-r13 is the number of bytes in plaintext mod 16) 833 # write back plaintext/ciphertext for num_initial_blocks 841 # prepare plaintext/ciphertext for GHASH computation 1327 movdqu \XMM1, (%arg3,%r11,1) # Write to plaintext buffer 1331 movdqu \XMM2, 16(%arg3,%r11,1) # Write to plaintext buffer 1335 movdqu \XMM3, 32(%arg3,%r11,1) # Write to plaintext buffer 1339 movdqu \XMM4, 48(%arg3,%r11,1) # Write to plaintext buffer
|
A D | aesni-intel_avx-x86_64.S | 299 mov arg5, %r13 # save the number of bytes of plaintext/ciphertext 441 # number of bytes in plaintext mod 16) 457 # (r13 is the number of bytes in plaintext mod 16) 765 # r16-r13 is the number of bytes in plaintext mod 16) 984 ## if a = number of total plaintext bytes 1932 ## if a = number of total plaintext bytes
|
/linux-6.3-rc2/Documentation/virt/kvm/x86/ |
A D | hypercalls.rst | 185 * bit 4 - plaintext = 0, encrypted = 1
|
/linux-6.3-rc2/Documentation/admin-guide/cifs/ |
A D | usage.rst | 644 does not work with lanman or plaintext authentication. 735 plaintext, ntlm, ntlmv2, signing allowed). Some 737 options to be enabled. Enabling plaintext 756 may use plaintext passwords 0x00020 757 must use plaintext passwords 0x20020
|
/linux-6.3-rc2/Documentation/power/ |
A D | swsusp.rst | 329 your sensitive data are then stored in plaintext on disk. This means
|
/linux-6.3-rc2/Documentation/virt/kvm/ |
A D | api.rst | 4700 engine uses a tweak such that two identical plaintext pages, each at 4702 moving ciphertext of those pages will not result in plaintext being
|