| /linux/crypto/krb5/ |
| H A D | selftest_data.c | 95 .plain = "", 103 .plain = "000102030405", 111 .plain = "000102030405060708090A0B0C0D0E0F", 119 .plain = "000102030405060708090A0B0C0D0E0F1011121314", 127 .plain = "", 135 .plain = "000102030405", 143 .plain = "000102030405060708090A0B0C0D0E0F", 151 .plain = "000102030405060708090A0B0C0D0E0F1011121314", 161 .plain = "", 169 .plain = "'1", [all …]
|
| H A D | selftest.c | 246 struct krb5_buffer conf = {}, plain = {}, ct = {}; in krb5_test_one_enc() local 258 LOAD_BUF(&plain, test->plain); in krb5_test_one_enc() 273 VALID(ct.len != krb5->conf_len + plain.len + krb5->cksum_len)) in krb5_test_one_enc() 276 data_len = plain.len; in krb5_test_one_enc() 290 memcpy(buf + data_offset, plain.data, plain.len); in krb5_test_one_enc() 325 pr_warn("PT %*phN%*phN\n", conf.len, conf.data, plain.len, plain.data); in krb5_test_one_enc() 341 CHECK(data_len != plain.len)) in krb5_test_one_enc() 353 if (memcmp(buf + conf.len, plain.data, plain.len) != 0) { in krb5_test_one_enc() 356 pr_warn("BUF %*phN\n", plain.len, buf + conf.len); in krb5_test_one_enc() 357 pr_warn("PT %*phN\n", plain.len, plain.data); in krb5_test_one_enc() [all …]
|
| H A D | internal.h | 139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member 145 const char *name, *plain, *K0, *Kc, *mic; member
|
| /linux/tools/testing/crypto/chacha20-s390/ |
| H A D | test-cipher.c | 51 static int test_lib_chacha(u8 *revert, u8 *cipher, u8 *plain) in test_lib_chacha() argument 72 chacha_crypt_arch(&chacha_state, cipher, plain, data_size, 20); in test_lib_chacha() 126 static int test_skcipher(char *name, u8 *revert, u8 *cipher, u8 *plain) in test_skcipher() argument 173 sg_init_one(&sk.sginp, plain, data_size); in test_skcipher() 238 u8 *plain = NULL, *revert = NULL; in chacha_s390_test_init() local 246 plain = vmalloc(data_size); in chacha_s390_test_init() 247 if (!plain) { in chacha_s390_test_init() 252 memset(plain, 'a', data_size); in chacha_s390_test_init() 253 get_random_bytes(plain, (data_size > 256 ? 256 : data_size)); in chacha_s390_test_init() 278 16, 1, plain, in chacha_s390_test_init() [all …]
|
| /linux/drivers/gpu/drm/ci/xfails/ |
| H A D | mediatek-mt8183-fails.txt | 17 kms_flip@basic-plain-flip,Fail 32 kms_flip@plain-flip-fb-recreate,Fail 33 kms_flip@plain-flip-fb-recreate-interruptible,Fail 34 kms_flip@plain-flip-interruptible,Fail 35 kms_flip@plain-flip-ts-check,Fail 36 kms_flip@plain-flip-ts-check-interruptible,Fail
|
| H A D | mediatek-mt8173-fails.txt | 24 kms_flip@basic-plain-flip,Fail 38 kms_flip@plain-flip-fb-recreate,Fail 39 kms_flip@plain-flip-fb-recreate-interruptible,Fail 40 kms_flip@plain-flip-interruptible,Fail 41 kms_flip@plain-flip-ts-check,Fail 42 kms_flip@plain-flip-ts-check-interruptible,Fail
|
| H A D | rockchip-rk3399-fails.txt | 51 kms_flip@plain-flip-fb-recreate,Fail 52 kms_flip@plain-flip-fb-recreate-interruptible,Fail 53 kms_flip@plain-flip-ts-check,Fail 54 kms_flip@plain-flip-ts-check-interruptible,Fail
|
| H A D | vkms-none-flakes.txt | 34 kms_flip@plain-flip-fb-recreate-interruptible 41 kms_flip@plain-flip-ts-check 48 kms_flip@plain-flip-ts-check-interruptible
|
| H A D | virtio_gpu-none-fails.txt | 153 kms_flip@plain-flip-fb-recreate,Fail 154 kms_flip@plain-flip-fb-recreate-interruptible,Fail 155 kms_flip@plain-flip-ts-check,Fail 156 kms_flip@plain-flip-ts-check-interruptible,Fail
|
| H A D | rockchip-rk3288-flakes.txt | 27 kms_flip@plain-flip-ts-check
|
| /linux/lib/ |
| H A D | Kconfig.kcsan | 37 The compiler instruments plain compound read-write operations 39 distinguish them from other plain accesses. This is currently 193 plain accesses by default (depending on !KCSAN_STRICT) reduce the 210 bool "Assume that plain aligned writes up to word size are atomic" 214 Assume that plain aligned writes up to word size are atomic by 217 races due to conflicts where the only plain accesses are aligned 218 writes up to word size: conflicts between marked reads and plain 220 notice that data races between two conflicting plain aligned writes 228 additional filtering. Conflicting marked atomic reads and plain 230 plain reads and marked writes to result in "unknown origin" reports. [all …]
|
| /linux/tools/memory-model/litmus-tests/ |
| H A D | dep+plain.litmus | 1 C dep+plain 6 * This litmus test demonstrates that in LKMM, plain accesses
|
| /linux/tools/memory-model/Documentation/ |
| H A D | access-marking.txt | 39 Neither plain C-language accesses nor data_race() (#1 and #2 above) place 45 preferable to data_race(), which in turn is usually preferable to plain 50 KCSAN will complain about many types of data races involving plain 60 data_race() and even plain C-language accesses is preferable to 91 concurrently with updates to x. Then using plain C-language writes 101 In theory, plain C-language loads can also be used for this use case. 125 In theory, plain C-language loads can also be used for this use case. 146 In theory, plain C-language loads can also be used for this use case. 172 Here are some example situations where plain C-language accesses should 196 by default, refraining from flagging plain C-language stores: [all …]
|
| H A D | explanation.txt | 933 Plain-coherence: This requires that plain memory accesses 940 "rcu" and "plain-coherence" axioms are specific to the LKMM. 2171 accesses such as x or y = 0 are simply called "plain" accesses. 2173 Early versions of the LKMM had nothing to say about plain accesses. 2175 by plain accesses are not concurrently read or written by any other 2177 of transformations or optimizations of code containing plain accesses, 2203 But since P0's load from x is a plain access, the compiler may decide 2225 doesn't try to predict all possible outcomes of code containing plain 2238 3. at least one of them is plain, 2350 are plain. Now, although we have not said so explicitly, up to this [all …]
|
| /linux/Documentation/fb/ |
| H A D | s3fb.rst | 19 I tested s3fb on Trio64 (plain, V+ and V2/DX) and Virge (plain, VX, DX), 40 hardware, i get best results from plain S3 Trio32 card - about 75 MHz). This
|
| /linux/net/mac80211/ |
| H A D | fils_aead.c | 67 const u8 *plain, size_t plain_len, in aes_siv_encrypt() argument 81 addr[num_elem] = plain; in aes_siv_encrypt() 101 tmp = kmemdup(plain, plain_len, GFP_KERNEL); in aes_siv_encrypt()
|
| /linux/tools/memory-model/ |
| H A D | linux-kernel.cat | 186 (* Warn about plain writes and marked accesses in the same region *) 196 (* Boundaries for lifetimes of plain accesses *) 204 (* Visibility and executes-before for plain accesses *) 214 (* Coherence requirements for plain accesses *) 218 empty (wr-incoh | rw-incoh | ww-incoh) as plain-coherence
|
| H A D | linux-kernel.bell | 87 (* Compute marked and plain memory accesses *) 92 (* Redefine dependencies to include those carried through plain accesses *)
|
| /linux/Documentation/networking/ |
| H A D | psp.rst | 80 and plain text TCP packets. 106 | Rx plain | accept | accept | drop | drop | 109 | Rx plain | accept | accept | accept | drop | 117 | Tx | plain text | plain text | encrypted | encrypted |
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | local_kptr_stash.c | 53 struct plain_local __kptr *plain; member 146 res = bpf_kptr_xchg(&mapval->plain, res); in stash_plain()
|
| /linux/Documentation/dev-tools/ |
| H A D | kcsan.rst | 134 * ``CONFIG_KCSAN_ASSUME_PLAIN_WRITES_ATOMIC``: Assume that plain aligned writes 137 causes KCSAN to not report data races due to conflicts where the only plain 202 *plain access*; they *conflict* if both access the same memory location, and at 263 compiler instrumenting plain accesses. For each instrumented plain access: 274 To detect data races between plain and marked accesses, KCSAN also annotates 286 Each plain memory access for which a watchpoint is set up, is also selected for 322 "prefetch" accesses. Also recall that watchpoints are only set up for plain
|
| /linux/Documentation/dev-tools/lkmm/ |
| H A D | index.rst | 9 the *pure* plain text form.
|
| /linux/fs/erofs/ |
| H A D | xattr.c | 495 bool plain = erofs_sb_has_plain_xattr_pfx(sbi); in erofs_xattr_prefixes_init() local 504 if (!plain) { in erofs_xattr_prefixes_init() 510 plain = true; in erofs_xattr_prefixes_init() 512 if (plain) in erofs_xattr_prefixes_init()
|
| /linux/crypto/ |
| H A D | ccm.c | 165 static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, in crypto_ccm_auth() argument 212 if (plain) in crypto_ccm_auth() 213 sg_chain(sg, 2, plain); in crypto_ccm_auth() 214 plain = sg; in crypto_ccm_auth() 218 ahash_request_set_crypt(ahreq, plain, odata, cryptlen); in crypto_ccm_auth()
|
| /linux/Documentation/core-api/ |
| H A D | protection-keys.rst | 93 behavior of a plain mprotect(). For instance if you do this:: 116 the plain mprotect() permissions are violated.
|