| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_test.c | 30 const struct xdr_netobj *plaintext; member 76 .head[0].iov_len = param->plaintext->len, in checksum_case() 77 .len = param->plaintext->len, in checksum_case() 103 memcpy(buf.head[0].iov_base, param->plaintext->data, buf.head[0].iov_len); in checksum_case() 235 .plaintext = &nfold_test1_plaintext, 241 .plaintext = &nfold_test2_plaintext, 247 .plaintext = &nfold_test3_plaintext, 253 .plaintext = &nfold_test4_plaintext, 259 .plaintext = &nfold_test5_plaintext, 265 .plaintext = &nfold_test6_plaintext, [all …]
|
| /linux/tools/verification/models/ |
| H A D | wwnr.dot | 2 {node [shape = plaintext, style=invis, label=""] "__init_not_running"}; 4 {node [shape = plaintext] "not_running"}; 5 {node [shape = plaintext] "running"};
|
| H A D | wip.dot | 3 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
| /linux/tools/verification/models/sched/ |
| H A D | snroc.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_other_context"}; 6 {node [shape = plaintext] "other_context"}; 7 {node [shape = plaintext] "own_context"};
|
| H A D | snep.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_non_scheduling_context"}; 6 {node [shape = plaintext] "non_scheduling_context"}; 7 {node [shape = plaintext] "scheduling_contex"};
|
| H A D | scpd.dot | 4 {node [shape = plaintext] "can_sched"}; 5 {node [shape = plaintext, style=invis, label=""] "__init_cant_sched"}; 7 {node [shape = plaintext] "cant_sched"};
|
| H A D | sco.dot | 4 {node [shape = plaintext] "scheduling_context"}; 5 {node [shape = plaintext, style=invis, label=""] "__init_thread_context"}; 7 {node [shape = plaintext] "thread_context"};
|
| H A D | nrp.dot | 7 {node [shape = plaintext, style=invis, label=""] "__init_preempt_irq"};
|
| H A D | sssw.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_runnable"};
|
| H A D | opid.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_disabled"};
|
| H A D | sts.dot | 4 {node [shape = plaintext, style=invis, label=""] "__init_can_sched"};
|
| /linux/Documentation/admin-guide/blockdev/drbd/ |
| H A D | drbd-connection-state-overview.dot | 6 node [shape=plaintext]
|
| /linux/Documentation/crypto/ |
| H A D | userspace-if.rst | 93 If a consumer on the other hand wants to maintain the plaintext and the 237 with the plaintext / ciphertext. See below for the memory structure. 263 - plaintext or ciphertext 277 - AEAD encryption input: AAD \|\| plaintext 286 - AEAD decryption output: plaintext
|
| H A D | devel-algos.rst | 132 contains the plaintext and will contain the ciphertext. Please refer
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 28 In order to avoid known-plaintext attacks, the datablob obtained through
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 15 On IPL (boot) a small plaintext bootloader is started, which provides
|
| /linux/Documentation/trace/rv/ |
| H A D | deterministic_automata.rst | 117 {node [shape = plaintext, style=invis, label=""] "__init_preemptive"};
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | hypercalls.rst | 185 * bit 4 - plaintext = 0, encrypted = 1
|
| /linux/crypto/ |
| H A D | testmgr.c | 1250 kv.iov_base = (void *)vec->plaintext; in build_hash_sglist() 1713 generate_random_bytes(rng, (u8 *)vec->plaintext, vec->psize); in generate_random_hash_testvec() 1736 crypto_ahash_reqtfm(req), vec->plaintext, in generate_random_hash_testvec() 1834 vec.plaintext = kmalloc(maxdatasize, GFP_KERNEL); in test_hash_vs_generic_impl() 1836 if (!vec.key || !vec.plaintext || !vec.digest) { in test_hash_vs_generic_impl() 1858 kfree(vec.plaintext); in test_hash_vs_generic_impl()
|
| /linux/Documentation/power/ |
| H A D | swsusp.rst | 329 your sensitive data are then stored in plaintext on disk. This means
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 646 does not work with lanman or plaintext authentication.
|
| /linux/Documentation/virt/kvm/ |
| H A D | api.rst | 4843 engine uses a tweak such that two identical plaintext pages, each at 4845 moving ciphertext of those pages will not result in plaintext being
|