| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | testmgr.h | 39 const char *plaintext; member 2401 .plaintext = "", 2405 .plaintext = "a", 2410 .plaintext = "abc", 2415 .plaintext = "message digest", 2420 .plaintext = "abcdefghijklmnopqrstuvwxyz", 2425 .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 2430 .plaintext = "123456789012345678901234567890123456789012345678901234567890123" 2440 .plaintext = "", 2446 .plaintext = "a", [all …]
|
| H A D | fips140-selftests.c | 71 const u8 *plaintext; member 83 const u8 *plaintext; member 213 aes_encrypt(&ctx, block, vec->plaintext); in fips_test_aes_library() 219 return fips_check_result(block, vec->plaintext, AES_BLOCK_SIZE, in fips_test_aes_library() 253 message = kmemdup(vec->plaintext, vec->message_size, GFP_KERNEL); in fips_test_skcipher() 289 err = fips_check_result(message, vec->plaintext, vec->message_size, in fips_test_skcipher() 337 memcpy(message, vec->plaintext, vec->plaintext_size); in fips_test_aead() 387 err = fips_check_result(message, vec->plaintext, vec->plaintext_size, in fips_test_aead() 580 .plaintext = fips_message, 653 .plaintext = fips_message, [all …]
|
| H A D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) in khazad_crypt() argument 805 const __be64 *src = (const __be64 *)plaintext; in khazad_crypt()
|
| H A D | anubis.c | 573 u8 *ciphertext, const u8 *plaintext, const int R) in anubis_crypt() argument 575 const __be32 *src = (const __be32 *)plaintext; in anubis_crypt()
|
| /OK3568_Linux_fs/kernel/drivers/gpu/arm/midgard/docs/ |
| H A D | policy_operation_diagram.dot | 29 queues_middle_sep [ label="" shape=plaintext width=0 height=0 ]; 36 call_enqueue [ shape=plaintext label="enqueue_ctx()" ]; 41 call_dequeue [ shape=plaintext label="dequeue_head_ctx()\n+ runpool_add_ctx()" ]; 42 call_ctxfinish [ shape=plaintext label="runpool_remove_ctx()" ]; 44 call_ctxdone [ shape=plaintext label="don't requeue;\n/* ctx has no more jobs */" ]; 59 call_jdequeue [ shape=plaintext label="dequeue_job()" ]; 60 sstop_dotfixup [ shape=plaintext label="" width=0 height=0 ]; 71 job_finish [ shape=plaintext label="don't requeue;\n/* job done */" ];
|
| H A D | policy_overview.dot | 27 call_enqueue [ shape=plaintext label="enqueue ctx" ];
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/ |
| H A D | aes_taf.c | 52 unsigned char *plaintext = params[1].memref.buffer; in ta_entry_aes256ecb_encrypt() local 56 &plaintext[i * (AES_BLOCK_SIZE / 8)]); in ta_entry_aes256ecb_encrypt() 93 unsigned char *plaintext = params[1].memref.buffer; in ta_entry_aes256ecb_decrypt() local 97 &plaintext[i * (AES_BLOCK_SIZE / 8)]); in ta_entry_aes256ecb_decrypt()
|
| H A D | aes_impl.c | 691 #define GETU32(plaintext) (((u32)(plaintext)[0] << 24) ^ \ argument 692 ((u32)(plaintext)[1] << 16) ^ \ 693 ((u32)(plaintext)[2] << 8) ^ \ 694 ((u32)(plaintext)[3])) 838 void rijndaelEncrypt(const u32 *rk, int nrounds, const u8 plaintext[16], in rijndaelEncrypt() 856 s0 = GETU32(plaintext) ^ rk[0]; in rijndaelEncrypt() 857 s1 = GETU32(plaintext + 4) ^ rk[1]; in rijndaelEncrypt() 858 s2 = GETU32(plaintext + 8) ^ rk[2]; in rijndaelEncrypt() 859 s3 = GETU32(plaintext + 12) ^ rk[3]; in rijndaelEncrypt() 1045 u8 plaintext[16]) in rijndaelDecrypt() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/include/ |
| H A D | aes_impl.h | 17 const unsigned char plaintext[16], 22 unsigned char plaintext[16]);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/ |
| H A D | tee_fs_key_manager.h | 68 const uint8_t *plaintext, size_t plaintext_size, 73 uint8_t *plaintext, size_t *plaintext_size,
|
| /OK3568_Linux_fs/buildroot/package/python-docutils/ |
| H A D | Config.in | 7 what-you-see-is-what-you-get plaintext markup syntax.
|
| H A D | 0001-Update-setup.py.patch | 32 @@ -123,7 +127,7 @@ what-you-see-is-what-you-get plaintext markup syntax.""", # wrap at col 60
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/classes/ |
| H A D | kernel_wireless_regdb.bbclass | 4 # This class copies the regulatory plaintext database to kernel sources before
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/python-pygpgme/ |
| H A D | 0003-handle-generic-error-when-no-passphrase-callback-pre.patch | 23 new_sigs = ctx.sign(plaintext, signature, gpgme.SIG_MODE_CLEAR)
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
| /OK3568_Linux_fs/kernel/Documentation/block/ |
| H A D | inline-encryption.rst | 243 its integrity information is calculated (using the plaintext data, since 247 must not store the integrity info that it received with the plaintext data 248 since that might reveal information about the plaintext data. As such, it must 250 instead. Another issue with storing the integrity info of the plaintext data is 254 ciphertext, not that of the plaintext).
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/blockdev/drbd/ |
| H A D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | fscrypt.rst | 90 plaintext file contents or filenames from other users on the same 241 "tweak" the encryption of each file so that the same plaintext in two 323 plaintext filenames, the KDF is also used to derive a 128-bit 407 With CTS-CBC, the IV reuse means that when the plaintext filenames 413 All supported filenames encryption modes accept any plaintext length 679 encrypted using that key appear "unlocked", i.e. in plaintext form. 804 be in plaintext form or in ciphertext form) is global. This mismatch 1069 than the plaintext due to NUL-padding and an extra 2-byte overhead. 1078 for an encrypted file contains the plaintext, not the ciphertext. 1199 plaintext must be preserved. Instead, filesystems must encrypt into a [all …]
|
| /OK3568_Linux_fs/kernel/net/bluetooth/ |
| H A D | amp.c | 128 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 158 ret = crypto_shash_digest(shash, plaintext, psize, output); in hmac_sha256()
|
| /OK3568_Linux_fs/kernel/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
| /OK3568_Linux_fs/kernel/Documentation/virt/kvm/ |
| H A D | s390-pv-boot.rst | 15 On IPL (boot) a small plaintext bootloader is started, which provides
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0085-man-add-a-man-page-for-the-VNC-backend.patch | 65 +all data is transferred in plaintext.
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0084-man-add-a-man-page-for-the-VNC-backend.patch | 65 +all data is transferred in plaintext.
|
| H A D | 0087-backend-vnc-enable-TLS-support.patch | 107 -all data is transferred in plaintext.
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.mxc_hab | 61 DCD, and Boot data, remains in plaintext.
|