/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | gss_krb5_seqnum.c | 49 unsigned char *plain; in krb5_make_seq_num() local 52 plain = kmalloc(8, GFP_NOFS); in krb5_make_seq_num() 53 if (!plain) in krb5_make_seq_num() 56 plain[0] = (unsigned char) (seqnum & 0xff); in krb5_make_seq_num() 57 plain[1] = (unsigned char) ((seqnum >> 8) & 0xff); in krb5_make_seq_num() 58 plain[2] = (unsigned char) ((seqnum >> 16) & 0xff); in krb5_make_seq_num() 59 plain[3] = (unsigned char) ((seqnum >> 24) & 0xff); in krb5_make_seq_num() 61 plain[4] = direction; in krb5_make_seq_num() 62 plain[5] = direction; in krb5_make_seq_num() 63 plain[ in krb5_make_seq_num() 78 unsigned char *plain; krb5_get_seq_num() local [all...] |
/kernel/linux/linux-6.6/tools/testing/crypto/chacha20-s390/ |
H A D | test-cipher.c | 51 static int test_lib_chacha(u8 *revert, u8 *cipher, u8 *plain) in test_lib_chacha() argument 72 chacha_crypt_arch(chacha_state, cipher, plain, data_size, 20); in test_lib_chacha() 126 static int test_skcipher(char *name, u8 *revert, u8 *cipher, u8 *plain) in test_skcipher() argument 173 sg_init_one(&sk.sginp, plain, data_size); in test_skcipher() 238 u8 *plain = NULL, *revert = NULL; in chacha_s390_test_init() local 246 plain = vmalloc(data_size); in chacha_s390_test_init() 247 if (!plain) { in chacha_s390_test_init() 248 pr_info("could not allocate plain buffer\n"); in chacha_s390_test_init() 252 memset(plain, 'a', data_size); in chacha_s390_test_init() 253 get_random_bytes(plain, (data_siz in chacha_s390_test_init() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | local_kptr_stash.c | 26 struct plain_local __kptr *plain; member 91 res = bpf_kptr_xchg(&mapval->plain, res); in stash_plain()
|
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | fils_aead.c | 67 const u8 *plain, size_t plain_len, in aes_siv_encrypt() 81 addr[num_elem] = plain; in aes_siv_encrypt() 101 tmp = kmemdup(plain, plain_len, GFP_KERNEL); in aes_siv_encrypt() 66 aes_siv_encrypt(const u8 *key, size_t key_len, const u8 *plain, size_t plain_len, size_t num_elem, const u8 *addr[], size_t len[], u8 *out) aes_siv_encrypt() argument
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | fils_aead.c | 67 const u8 *plain, size_t plain_len, in aes_siv_encrypt() 81 addr[num_elem] = plain; in aes_siv_encrypt() 101 tmp = kmemdup(plain, plain_len, GFP_KERNEL); in aes_siv_encrypt() 66 aes_siv_encrypt(const u8 *key, size_t key_len, const u8 *plain, size_t plain_len, size_t num_elem, const u8 *addr[], size_t len[], u8 *out) aes_siv_encrypt() argument
|
/kernel/linux/linux-5.10/crypto/ |
H A D | ccm.c | 167 static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, in crypto_ccm_auth() argument 214 if (plain) in crypto_ccm_auth() 215 sg_chain(sg, 2, plain); in crypto_ccm_auth() 216 plain = sg; in crypto_ccm_auth() 220 ahash_request_set_crypt(ahreq, plain, pctx->odata, cryptlen); in crypto_ccm_auth()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | ccm.c | 168 static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, in crypto_ccm_auth() argument 215 if (plain) in crypto_ccm_auth() 216 sg_chain(sg, 2, plain); in crypto_ccm_auth() 217 plain = sg; in crypto_ccm_auth() 221 ahash_request_set_crypt(ahreq, plain, odata, cryptlen); in crypto_ccm_auth()
|
/kernel/linux/linux-5.10/arch/arm/nwfpe/ |
H A D | entry.S | 105 @ plain LDR instruction. Weird, but it seems harmless.
|
/kernel/linux/linux-5.10/lib/ |
H A D | test_printf.c | 231 pr_warn("crng possibly not yet initialized. plain 'p' buffer contains \"%s\"", in plain_format() 271 pr_warn("crng possibly not yet initialized. plain 'p' buffer contains \"%s\"", in plain_hash_to_buffer() 300 plain(void) in plain() function 306 pr_warn("plain 'p' does not appear to be hashed\n"); in plain() 313 pr_warn("hashing plain 'p' has unexpected format\n"); in plain() 326 * to be called after plain(). in test_hashed() 675 plain(); in test_pointer()
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | xfrm_policy.sh | 143 local plain=$5 145 # network $plain passes without tunnel 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | xfrm_policy.sh | 143 local plain=$5 145 # network $plain passes without tunnel 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
|
/kernel/linux/linux-6.6/lib/ |
H A D | test_printf.c | 233 pr_warn("crng possibly not yet initialized. plain 'p' buffer contains \"%s\"", in plain_format() 273 pr_warn("crng possibly not yet initialized. plain 'p' buffer contains \"%s\"", in plain_hash_to_buffer() 302 plain(void) in plain() function 307 pr_warn("skipping plain 'p' tests"); in plain() 314 pr_warn("plain 'p' does not appear to be hashed\n"); in plain() 321 pr_warn("hashing plain 'p' has unexpected format\n"); in plain() 334 * to be called after plain(). in test_hashed() 785 plain(); in test_pointer()
|
/kernel/linux/linux-6.6/arch/arm/nwfpe/ |
H A D | entry.S | 105 @ plain LDR instruction. Weird, but it seems harmless.
|
/kernel/linux/linux-5.10/scripts/ |
H A D | get_abi.pl | 561 plain text that may be violating ReST spec, so it requres some escaping
|
/kernel/linux/linux-6.6/scripts/ |
H A D | get_abi.pl | 1021 plain text that may be violating ReST spec, so it requres some escaping
|
/kernel/linux/linux-5.10/drivers/block/drbd/ |
H A D | drbd_receiver.c | 4561 /* if we had been plain connected, and the admin requested to in receive_state() 4824 unsigned int plain = in INFO_bm_xfer_stats() local 4835 if (total >= plain) in INFO_bm_xfer_stats() 4838 /* total < plain. check for overflow, still */ in INFO_bm_xfer_stats() 4839 r = (total > UINT_MAX/1000) ? (total / (plain/1000)) in INFO_bm_xfer_stats() 4840 : (1000 * total / plain); in INFO_bm_xfer_stats() 4846 drbd_info(device, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), " in INFO_bm_xfer_stats()
|
/kernel/linux/linux-6.6/drivers/block/drbd/ |
H A D | drbd_receiver.c | 4514 /* if we had been plain connected, and the admin requested to in receive_state() 4777 unsigned int plain = in INFO_bm_xfer_stats() local 4788 if (total >= plain) in INFO_bm_xfer_stats() 4791 /* total < plain. check for overflow, still */ in INFO_bm_xfer_stats() 4792 r = (total > UINT_MAX/1000) ? (total / (plain/1000)) in INFO_bm_xfer_stats() 4793 : (1000 * total / plain); in INFO_bm_xfer_stats() 4799 drbd_info(peer_device, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), " in INFO_bm_xfer_stats()
|
/kernel/linux/linux-5.10/drivers/staging/rtl8723bs/core/ |
H A D | rtw_security.c | 2233 static void aes_128_encrypt(void *ctx, u8 *plain, u8 *crypt) in aes_128_encrypt() argument 2235 rijndaelEncrypt(ctx, plain, crypt); in aes_128_encrypt()
|