/Linux-v4.19/crypto/ |
D | testmgr.h | 43 unsigned char ksize; member 3686 .ksize = 16, 3695 .ksize = 16, 3705 .ksize = 16, 3716 .ksize = 16, 3727 .ksize = 16, 3735 .ksize = 16, 3800 .ksize = 16, 3807 .ksize = 4, 3816 .ksize = 16, [all …]
|
D | testmgr.c | 322 if (template[i].ksize) { in __test_hash() 324 if (template[i].ksize > MAX_KEYLEN) { in __test_hash() 326 j, algo, template[i].ksize, MAX_KEYLEN); in __test_hash() 330 memcpy(key, template[i].key, template[i].ksize); in __test_hash() 331 ret = crypto_ahash_setkey(tfm, key, template[i].ksize); in __test_hash() 449 if (template[i].ksize) { in __test_hash() 450 if (template[i].ksize > MAX_KEYLEN) { in __test_hash() 452 j, algo, template[i].ksize, MAX_KEYLEN); in __test_hash() 457 memcpy(key, template[i].key, template[i].ksize); in __test_hash() 458 ret = crypto_ahash_setkey(tfm, key, template[i].ksize); in __test_hash() [all …]
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_get_stack_rawtp.c | 60 int max_len, max_buildid_len, usize, ksize, total_size; in bpf_prog1() local 90 ksize = bpf_get_stack(ctx, raw_data + usize, max_len - usize, 0); in bpf_prog1() 91 if (ksize < 0) in bpf_prog1() 94 total_size = usize + ksize; in bpf_prog1()
|
/Linux-v4.19/arch/alpha/boot/ |
D | misc.c | 154 size_t ksize, in decompress_kernel() argument 162 free_mem_ptr = (ulg)output_start + ksize; in decompress_kernel() 163 free_mem_end_ptr = (ulg)output_start + ksize + 0x200000; in decompress_kernel()
|
D | Makefile | 46 $(obj)/main.o: $(obj)/ksize.h 47 $(obj)/bootp.o: $(obj)/ksize.h 50 $(obj)/ksize.h: $(obj)/vmlinux.nh FORCE
|
D | bootpz.c | 50 size_t ksize, size_t kzsize);
|
/Linux-v4.19/arch/microblaze/mm/ |
D | init.c | 290 unsigned int kstart, ksize; in mmu_init() local 326 ksize = PAGE_ALIGN(((u32)_end - (u32)CONFIG_KERNEL_START)); in mmu_init() 327 memblock_reserve(kstart, ksize); in mmu_init()
|
/Linux-v4.19/net/sched/ |
D | act_pedit.c | 151 int ksize; in tcf_pedit_init() local 171 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init() 172 if (nla_len(pattr) < sizeof(*parm) + ksize) { in tcf_pedit_init() 212 keys = kmalloc(ksize, GFP_ATOMIC); in tcf_pedit_init() 222 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init()
|
/Linux-v4.19/include/linux/ |
D | kasan.h | 77 size_t ksize(const void *); 78 static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); } in kasan_unpoison_slab()
|
D | slab.h | 185 size_t ksize(const void *);
|
/Linux-v4.19/drivers/gpu/drm/ |
D | drm_ioctl.c | 785 unsigned int in_size, out_size, drv_size, ksize; in drm_ioctl() local 813 ksize = max(max(in_size, out_size), drv_size); in drm_ioctl() 829 if (ksize <= sizeof(stack_kdata)) { in drm_ioctl() 832 kdata = kmalloc(ksize, GFP_KERNEL); in drm_ioctl() 844 if (ksize > in_size) in drm_ioctl() 845 memset(kdata + in_size, 0, ksize - in_size); in drm_ioctl()
|
/Linux-v4.19/drivers/crypto/ |
D | padlock-aes.c | 47 ksize:2; member 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
|
/Linux-v4.19/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 123 int ksize; in chtls_init_kmap() local 130 ksize = sizeof(*cdev->kmap.addr) * bsize; in chtls_init_kmap() 131 cdev->kmap.addr = kvzalloc(ksize, GFP_KERNEL); in chtls_init_kmap()
|
/Linux-v4.19/net/bluetooth/ |
D | amp.c | 135 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 141 if (!ksize) in hmac_sha256() 150 ret = crypto_shash_setkey(tfm, key, ksize); in hmac_sha256()
|
/Linux-v4.19/mm/ |
D | mempool.c | 62 __check_element(pool, element, ksize(element)); in check_element() 86 __poison_element(element, ksize(element)); in poison_element()
|
D | slob.c | 507 size_t ksize(const void *block) in ksize() function 525 EXPORT_SYMBOL(ksize);
|
D | slab_common.c | 1461 ks = ksize(p); in __do_krealloc() 1541 ks = ksize(mem); in kzfree()
|
/Linux-v4.19/security/tomoyo/ |
D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok()
|
D | gc.c | 23 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= ksize(ptr); in tomoyo_memory_free()
|
/Linux-v4.19/lib/ |
D | test_kasan.c | 430 real_size = ksize(ptr); in ksize_unpoisons_memory()
|
/Linux-v4.19/arch/x86/kernel/cpu/microcode/ |
D | amd.c | 721 memcpy(amd_ucode_patch, p->data, min_t(u32, ksize(p->data), PATCH_MAX_SIZE)); in load_microcode_amd()
|
/Linux-v4.19/fs/ |
D | coredump.c | 76 cn->size = ksize(corename); in expand_corename()
|
D | dcache.c | 267 -ksize(name)); in __d_free_external_name() 1679 ksize(ext)); in __d_alloc()
|
/Linux-v4.19/net/core/ |
D | skbuff.c | 212 size = SKB_WITH_OVERHEAD(ksize(data)); in __alloc_skb() 279 unsigned int size = frag_size ? : ksize(data); in __build_skb() 1464 size = SKB_WITH_OVERHEAD(ksize(data)); in pskb_expand_head() 5331 size = SKB_WITH_OVERHEAD(ksize(data)); in pskb_carve_inside_header() 5455 size = SKB_WITH_OVERHEAD(ksize(data)); in pskb_carve_inside_nonlinear()
|
/Linux-v4.19/drivers/net/wireless/intel/iwlwifi/mvm/ |
D | scan.c | 910 memset(cmd, 0, ksize(cmd)); in iwl_mvm_scan_lmac() 1429 memset(cmd, 0, ksize(cmd)); in iwl_mvm_scan_umac()
|