Home
last modified time | relevance | path

Searched refs:plain (Results 1 – 25 of 160) sorted by relevance

1234567

/linux/crypto/krb5/
H A Dselftest_data.c95 .plain = "",
103 .plain = "000102030405",
111 .plain = "000102030405060708090A0B0C0D0E0F",
119 .plain = "000102030405060708090A0B0C0D0E0F1011121314",
127 .plain = "",
135 .plain = "000102030405",
143 .plain = "000102030405060708090A0B0C0D0E0F",
151 .plain = "000102030405060708090A0B0C0D0E0F1011121314",
161 .plain = "",
169 .plain = "'1",
[all …]
H A Dselftest.c246 struct krb5_buffer conf = {}, plain = {}, ct = {}; in krb5_test_one_enc() local
258 LOAD_BUF(&plain, test->plain); in krb5_test_one_enc()
273 VALID(ct.len != krb5->conf_len + plain.len + krb5->cksum_len)) in krb5_test_one_enc()
276 data_len = plain.len; in krb5_test_one_enc()
290 memcpy(buf + data_offset, plain.data, plain.len); in krb5_test_one_enc()
325 pr_warn("PT %*phN%*phN\n", conf.len, conf.data, plain.len, plain.data); in krb5_test_one_enc()
341 CHECK(data_len != plain.len)) in krb5_test_one_enc()
353 if (memcmp(buf + conf.len, plain.data, plain.len) != 0) { in krb5_test_one_enc()
356 pr_warn("BUF %*phN\n", plain.len, buf + conf.len); in krb5_test_one_enc()
357 pr_warn("PT %*phN\n", plain.len, plain.data); in krb5_test_one_enc()
[all …]
H A Dinternal.h139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member
145 const char *name, *plain, *K0, *Kc, *mic; member
/linux/tools/testing/crypto/chacha20-s390/
H A Dtest-cipher.c51 static int test_lib_chacha(u8 *revert, u8 *cipher, u8 *plain) in test_lib_chacha() argument
72 chacha_crypt_arch(&chacha_state, cipher, plain, data_size, 20); in test_lib_chacha()
126 static int test_skcipher(char *name, u8 *revert, u8 *cipher, u8 *plain) in test_skcipher() argument
173 sg_init_one(&sk.sginp, plain, data_size); in test_skcipher()
238 u8 *plain = NULL, *revert = NULL; in chacha_s390_test_init() local
246 plain = vmalloc(data_size); in chacha_s390_test_init()
247 if (!plain) { in chacha_s390_test_init()
252 memset(plain, 'a', data_size); in chacha_s390_test_init()
253 get_random_bytes(plain, (data_size > 256 ? 256 : data_size)); in chacha_s390_test_init()
278 16, 1, plain, in chacha_s390_test_init()
[all …]
/linux/drivers/gpu/drm/ci/xfails/
H A Dmediatek-mt8183-fails.txt17 kms_flip@basic-plain-flip,Fail
32 kms_flip@plain-flip-fb-recreate,Fail
33 kms_flip@plain-flip-fb-recreate-interruptible,Fail
34 kms_flip@plain-flip-interruptible,Fail
35 kms_flip@plain-flip-ts-check,Fail
36 kms_flip@plain-flip-ts-check-interruptible,Fail
H A Dmediatek-mt8173-fails.txt24 kms_flip@basic-plain-flip,Fail
38 kms_flip@plain-flip-fb-recreate,Fail
39 kms_flip@plain-flip-fb-recreate-interruptible,Fail
40 kms_flip@plain-flip-interruptible,Fail
41 kms_flip@plain-flip-ts-check,Fail
42 kms_flip@plain-flip-ts-check-interruptible,Fail
H A Drockchip-rk3399-fails.txt51 kms_flip@plain-flip-fb-recreate,Fail
52 kms_flip@plain-flip-fb-recreate-interruptible,Fail
53 kms_flip@plain-flip-ts-check,Fail
54 kms_flip@plain-flip-ts-check-interruptible,Fail
H A Dvkms-none-flakes.txt34 kms_flip@plain-flip-fb-recreate-interruptible
41 kms_flip@plain-flip-ts-check
48 kms_flip@plain-flip-ts-check-interruptible
H A Dvirtio_gpu-none-fails.txt153 kms_flip@plain-flip-fb-recreate,Fail
154 kms_flip@plain-flip-fb-recreate-interruptible,Fail
155 kms_flip@plain-flip-ts-check,Fail
156 kms_flip@plain-flip-ts-check-interruptible,Fail
H A Drockchip-rk3288-flakes.txt27 kms_flip@plain-flip-ts-check
/linux/lib/
H A DKconfig.kcsan37 The compiler instruments plain compound read-write operations
39 distinguish them from other plain accesses. This is currently
193 plain accesses by default (depending on !KCSAN_STRICT) reduce the
210 bool "Assume that plain aligned writes up to word size are atomic"
214 Assume that plain aligned writes up to word size are atomic by
217 races due to conflicts where the only plain accesses are aligned
218 writes up to word size: conflicts between marked reads and plain
220 notice that data races between two conflicting plain aligned writes
228 additional filtering. Conflicting marked atomic reads and plain
230 plain reads and marked writes to result in "unknown origin" reports.
[all …]
/linux/tools/memory-model/litmus-tests/
H A Ddep+plain.litmus1 C dep+plain
6 * This litmus test demonstrates that in LKMM, plain accesses
/linux/tools/memory-model/Documentation/
H A Daccess-marking.txt39 Neither plain C-language accesses nor data_race() (#1 and #2 above) place
45 preferable to data_race(), which in turn is usually preferable to plain
50 KCSAN will complain about many types of data races involving plain
60 data_race() and even plain C-language accesses is preferable to
91 concurrently with updates to x. Then using plain C-language writes
101 In theory, plain C-language loads can also be used for this use case.
125 In theory, plain C-language loads can also be used for this use case.
146 In theory, plain C-language loads can also be used for this use case.
172 Here are some example situations where plain C-language accesses should
196 by default, refraining from flagging plain C-language stores:
[all …]
H A Dexplanation.txt933 Plain-coherence: This requires that plain memory accesses
940 "rcu" and "plain-coherence" axioms are specific to the LKMM.
2171 accesses such as x or y = 0 are simply called "plain" accesses.
2173 Early versions of the LKMM had nothing to say about plain accesses.
2175 by plain accesses are not concurrently read or written by any other
2177 of transformations or optimizations of code containing plain accesses,
2203 But since P0's load from x is a plain access, the compiler may decide
2225 doesn't try to predict all possible outcomes of code containing plain
2238 3. at least one of them is plain,
2350 are plain. Now, although we have not said so explicitly, up to this
[all …]
/linux/Documentation/fb/
H A Ds3fb.rst19 I tested s3fb on Trio64 (plain, V+ and V2/DX) and Virge (plain, VX, DX),
40 hardware, i get best results from plain S3 Trio32 card - about 75 MHz). This
/linux/net/mac80211/
H A Dfils_aead.c67 const u8 *plain, size_t plain_len, in aes_siv_encrypt() argument
81 addr[num_elem] = plain; in aes_siv_encrypt()
101 tmp = kmemdup(plain, plain_len, GFP_KERNEL); in aes_siv_encrypt()
/linux/tools/memory-model/
H A Dlinux-kernel.cat186 (* Warn about plain writes and marked accesses in the same region *)
196 (* Boundaries for lifetimes of plain accesses *)
204 (* Visibility and executes-before for plain accesses *)
214 (* Coherence requirements for plain accesses *)
218 empty (wr-incoh | rw-incoh | ww-incoh) as plain-coherence
H A Dlinux-kernel.bell87 (* Compute marked and plain memory accesses *)
92 (* Redefine dependencies to include those carried through plain accesses *)
/linux/Documentation/networking/
H A Dpsp.rst80 and plain text TCP packets.
106 | Rx plain | accept | accept | drop | drop |
109 | Rx plain | accept | accept | accept | drop |
117 | Tx | plain text | plain text | encrypted | encrypted |
/linux/tools/testing/selftests/bpf/progs/
H A Dlocal_kptr_stash.c53 struct plain_local __kptr *plain; member
146 res = bpf_kptr_xchg(&mapval->plain, res); in stash_plain()
/linux/Documentation/dev-tools/
H A Dkcsan.rst134 * ``CONFIG_KCSAN_ASSUME_PLAIN_WRITES_ATOMIC``: Assume that plain aligned writes
137 causes KCSAN to not report data races due to conflicts where the only plain
202 *plain access*; they *conflict* if both access the same memory location, and at
263 compiler instrumenting plain accesses. For each instrumented plain access:
274 To detect data races between plain and marked accesses, KCSAN also annotates
286 Each plain memory access for which a watchpoint is set up, is also selected for
322 "prefetch" accesses. Also recall that watchpoints are only set up for plain
/linux/Documentation/dev-tools/lkmm/
H A Dindex.rst9 the *pure* plain text form.
/linux/fs/erofs/
H A Dxattr.c495 bool plain = erofs_sb_has_plain_xattr_pfx(sbi); in erofs_xattr_prefixes_init() local
504 if (!plain) { in erofs_xattr_prefixes_init()
510 plain = true; in erofs_xattr_prefixes_init()
512 if (plain) in erofs_xattr_prefixes_init()
/linux/crypto/
H A Dccm.c165 static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, in crypto_ccm_auth() argument
212 if (plain) in crypto_ccm_auth()
213 sg_chain(sg, 2, plain); in crypto_ccm_auth()
214 plain = sg; in crypto_ccm_auth()
218 ahash_request_set_crypt(ahreq, plain, odata, cryptlen); in crypto_ccm_auth()
/linux/Documentation/core-api/
H A Dprotection-keys.rst93 behavior of a plain mprotect(). For instance if you do this::
116 the plain mprotect() permissions are violated.

1234567