/openbmc/qemu/tests/unit/ |
H A D | test-crypto-cipher.c | 33 const char *plaintext; member 49 .plaintext = 66 .plaintext = 85 .plaintext = 103 .plaintext = 121 .plaintext = 141 .plaintext = 162 .plaintext = "70617373776f7264", 172 .plaintext = "70617373776f7264", 180 .plaintext = [all …]
|
H A D | test-crypto-akcipher.c | 682 const uint8_t *plaintext; member 798 .plaintext = test_plaintext, 819 .plaintext = test_plaintext, 843 .plaintext = test_plaintext, 864 .plaintext = test_plaintext, 879 g_autofree uint8_t *plaintext = NULL; in test_akcipher() local 898 if (data->plaintext != NULL) { in test_akcipher() 901 g_assert(qcrypto_akcipher_encrypt(pub_key, data->plaintext, data->plen, in test_akcipher() 910 plaintext = g_new0(uint8_t, data->clen); in test_akcipher() 912 data->clen, plaintext, in test_akcipher() [all …]
|
/openbmc/linux/crypto/ |
H A D | testmgr.h | 40 const char *plaintext; member 4410 .plaintext = "", 4414 .plaintext = "a", 4419 .plaintext = "abc", 4424 .plaintext = "message digest", 4429 .plaintext = "abcdefghijklmnopqrstuvwxyz", 4434 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 4439 .plaintext = "123456789012345678901234567890123456789012345678901234567890123" 4449 .plaintext = "", 4455 .plaintext = "a", [all …]
|
H A D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
|
H A D | anubis.c | 573 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 575 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
|
/openbmc/linux/net/sunrpc/auth_gss/ |
H A D | gss_krb5_test.c | 30 const struct xdr_netobj *plaintext; member 76 .head[0].iov_len = param->plaintext->len, in checksum_case() 77 .len = param->plaintext->len, in checksum_case() 103 memcpy(buf.head[0].iov_base, param->plaintext->data, buf.head[0].iov_len); in checksum_case() 235 .plaintext = &nfold_test1_plaintext, 241 .plaintext = &nfold_test2_plaintext, 247 .plaintext = &nfold_test3_plaintext, 253 .plaintext = &nfold_test4_plaintext, 259 .plaintext = &nfold_test5_plaintext, 265 .plaintext = &nfold_test6_plaintext, [all …]
|
/openbmc/qemu/crypto/ |
H A D | secret_common.c | 43 g_autofree uint8_t *plaintext = NULL; in qcrypto_secret_decrypt() local 94 plaintext = g_new0(uint8_t, ciphertextlen + 1); in qcrypto_secret_decrypt() 97 plaintext = g_new0(uint8_t, inputlen + 1); in qcrypto_secret_decrypt() 101 plaintext, in qcrypto_secret_decrypt() 107 if (plaintext[ciphertextlen - 1] > 16 || in qcrypto_secret_decrypt() 108 plaintext[ciphertextlen - 1] > ciphertextlen) { in qcrypto_secret_decrypt() 111 (int)plaintext[ciphertextlen - 1]); in qcrypto_secret_decrypt() 119 ciphertextlen -= plaintext[ciphertextlen - 1]; in qcrypto_secret_decrypt() 120 plaintext[ciphertextlen] = '\0'; in qcrypto_secret_decrypt() 122 *output = g_steal_pointer(&plaintext); in qcrypto_secret_decrypt()
|
H A D | akcipher-gcrypt.c.inc | 247 error_setg(errp, "Failed to build plaintext: %s/%s", 350 /* S-expression of plaintext: (value plaintext) */ 354 error_setg(errp, "Invalid plaintext result"); 377 error_setg(errp, "Invalid plaintext result");
|
/openbmc/qemu/tests/bench/ |
H A D | benchmark-crypto-cipher.c | 25 uint8_t *plaintext = NULL, *ciphertext = NULL; in test_cipher_speed() local 49 plaintext = g_new0(uint8_t, chunk_size); in test_cipher_speed() 50 memset(plaintext, g_test_rand_int(), chunk_size); in test_cipher_speed() 65 plaintext, in test_cipher_speed() 82 plaintext, in test_cipher_speed() 96 g_free(plaintext); in test_cipher_speed()
|
/openbmc/linux/tools/verification/models/ |
H A D | wwnr.dot | 2 {node [shape = plaintext, style=invis, label=""] "__init_not_running"}; 4 {node [shape = plaintext] "not_running"}; 5 {node [shape = plaintext] "running"};
|
H A D | wip.dot | 3 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
/openbmc/openbmc/meta-openembedded/meta-networking/classes/ |
H A D | kernel_wireless_regdb.bbclass | 4 # This class copies the regulatory plaintext database to kernel sources before
|
/openbmc/google-misc/subprojects/ncsid/doc/ |
H A D | ncsid_test_arch.dot | 4 node [shape=plaintext];
|
H A D | ncsid_arch.dot | 4 node [shape=plaintext];
|
/openbmc/linux/drivers/virt/coco/sev-guest/ |
H A D | sev-guest.c | 255 void *plaintext, size_t len) in __enc_payload() argument 263 return enc_dec_message(crypto, msg, plaintext, msg->payload, len, true); in __enc_payload() 267 void *plaintext, size_t len) in dec_payload() argument 276 return enc_dec_message(crypto, msg, msg->payload, plaintext, len, false); in dec_payload()
|
/openbmc/linux/Documentation/admin-guide/blockdev/drbd/ |
H A D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
/openbmc/linux/Documentation/crypto/ |
H A D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
/openbmc/u-boot/doc/imx/habv4/guides/ |
H A D | encrypted_boot.txt | 7 DCD, and Boot data, remains in plaintext.
|
/openbmc/linux/Documentation/block/ |
H A D | inline-encryption.rst | 283 its integrity information is calculated (using the plaintext data, since 287 must not store the integrity info that it received with the plaintext data 288 since that might reveal information about the plaintext data. As such, it must 290 instead. Another issue with storing the integrity info of the plaintext data is 294 ciphertext, not that of the plaintext).
|
/openbmc/linux/Documentation/security/keys/ |
H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv-boot.rst | 15 On IPL (boot) a small plaintext bootloader is started, which provides
|
/openbmc/linux/Documentation/filesystems/ |
H A D | fscrypt.rst | 90 plaintext file contents or filenames from other users on the same 241 "tweak" the encryption of each file so that the same plaintext in two 323 plaintext filenames, the KDF is also used to derive a 128-bit 493 With CTS-CBC, the IV reuse means that when the plaintext filenames share a 499 All supported filenames encryption modes accept any plaintext length 772 encrypted using that key appear "unlocked", i.e. in plaintext form. 897 be in plaintext form or in ciphertext form) is global. This mismatch 1166 for an encrypted file contains the plaintext, not the ciphertext. 1359 plaintext must be preserved. Instead, filesystems must encrypt into a 1376 plaintext filenames, since the plaintext filenames are unavailable [all …]
|
/openbmc/qemu/docs/system/i386/ |
H A D | amd-memory-encryption.rst | 46 The guest policy is passed as plaintext. A hypervisor may choose to read it, 128 GCTX.LD is finalized, producing the hash digest of all plaintext data
|
/openbmc/linux/Documentation/trace/rv/ |
H A D | deterministic_automata.rst | 117 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
/openbmc/linux/arch/x86/crypto/ |
H A D | aesni-intel_asm.S | 370 # (r13 is the number of bytes in plaintext mod 16) 662 # r16-r13 is the number of bytes in plaintext mod 16) 833 # write back plaintext/ciphertext for num_initial_blocks 841 # prepare plaintext/ciphertext for GHASH computation 1327 movdqu \XMM1, (%arg3,%r11,1) # Write to plaintext buffer 1331 movdqu \XMM2, 16(%arg3,%r11,1) # Write to plaintext buffer 1335 movdqu \XMM3, 32(%arg3,%r11,1) # Write to plaintext buffer 1339 movdqu \XMM4, 48(%arg3,%r11,1) # Write to plaintext buffer
|