Home
last modified time | relevance | path

Searched refs:ksize (Results 1 – 25 of 42) sorted by relevance

12

/Linux-v5.15/crypto/
Dtestmgr.h42 unsigned short ksize; member
4050 .ksize = 32,
4069 .ksize = 32,
4221 .ksize = 32,
4235 .ksize = 37,
4249 .ksize = 32,
4258 .ksize = 4,
5437 .ksize = 16,
5446 .ksize = 16,
5454 .ksize = 16,
[all …]
Dtestmgr.c779 static int prepare_keybuf(const u8 *key, unsigned int ksize, in prepare_keybuf() argument
790 keybuf = kmalloc(key_offset + ksize, GFP_KERNEL); in prepare_keybuf()
794 memcpy(keyptr, key, ksize); in prepare_keybuf()
802 #define do_setkey(setkey_f, tfm, key, ksize, cfg, alignmask) \ argument
807 err = prepare_keybuf((key), (ksize), (cfg), (alignmask), \
810 err = setkey_f((tfm), keyptr, (ksize)); \
1190 if (vec->ksize) { in test_shash_vec_cfg()
1191 err = do_setkey(crypto_shash_setkey, tfm, vec->key, vec->ksize, in test_shash_vec_cfg()
1378 if (vec->ksize) { in test_ahash_vec_cfg()
1379 err = do_setkey(crypto_ahash_setkey, tfm, vec->key, vec->ksize, in test_ahash_vec_cfg()
[all …]
/Linux-v5.15/lib/
Dtest_user_copy.c110 size_t ksize, usize; in test_copy_struct_from_user() local
128 ksize = size; in test_copy_struct_from_user()
131 memcpy(expected, umem_src, ksize); in test_copy_struct_from_user()
134 ret |= test(copy_struct_from_user(kmem, ksize, umem, usize), in test_copy_struct_from_user()
136 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user()
140 ksize = size; in test_copy_struct_from_user()
144 memset(expected + usize, 0x0, ksize - usize); in test_copy_struct_from_user()
147 ret |= test(copy_struct_from_user(kmem, ksize, umem, usize), in test_copy_struct_from_user()
149 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user()
153 ksize = size / 2; in test_copy_struct_from_user()
[all …]
/Linux-v5.15/tools/testing/selftests/bpf/progs/
Dtest_get_stack_rawtp.c62 long usize, ksize; in bpf_prog1() local
91 ksize = bpf_get_stack(ctx, raw_data + usize, max_len - usize, 0); in bpf_prog1()
92 if (ksize < 0) in bpf_prog1()
95 total_size = usize + ksize; in bpf_prog1()
/Linux-v5.15/arch/powerpc/platforms/powernv/
Dopal-secvar.c57 static int opal_get_variable(const char *key, uint64_t ksize, in opal_get_variable() argument
67 rc = opal_secvar_get(key, ksize, data, dsize); in opal_get_variable()
91 static int opal_set_variable(const char *key, uint64_t ksize, u8 *data, in opal_set_variable() argument
99 rc = opal_secvar_enqueue_update(key, ksize, data, dsize); in opal_set_variable()
/Linux-v5.15/drivers/dma-buf/
Ddma-heap.c131 unsigned int in_size, out_size, drv_size, ksize; in dma_heap_ioctl() local
149 ksize = max(max(in_size, out_size), drv_size); in dma_heap_ioctl()
152 if (ksize > sizeof(stack_kdata)) { in dma_heap_ioctl()
153 kdata = kmalloc(ksize, GFP_KERNEL); in dma_heap_ioctl()
164 if (ksize > in_size) in dma_heap_ioctl()
165 memset(kdata + in_size, 0, ksize - in_size); in dma_heap_ioctl()
/Linux-v5.15/include/linux/
Duaccess.h335 copy_struct_from_user(void *dst, size_t ksize, const void __user *src, in copy_struct_from_user() argument
338 size_t size = min(ksize, usize); in copy_struct_from_user()
339 size_t rest = max(ksize, usize) - size; in copy_struct_from_user()
342 if (usize < ksize) { in copy_struct_from_user()
344 } else if (usize > ksize) { in copy_struct_from_user()
/Linux-v5.15/arch/alpha/boot/
Dmisc.c154 size_t ksize, in decompress_kernel() argument
162 free_mem_ptr = (ulg)output_start + ksize; in decompress_kernel()
163 free_mem_end_ptr = (ulg)output_start + ksize + 0x200000; in decompress_kernel()
DMakefile46 $(obj)/main.o: $(obj)/ksize.h
47 $(obj)/bootp.o: $(obj)/ksize.h
50 $(obj)/ksize.h: $(obj)/vmlinux.nh FORCE
Dbootpz.c49 size_t ksize, size_t kzsize);
/Linux-v5.15/arch/microblaze/mm/
Dinit.c193 unsigned int kstart, ksize; in mmu_init() local
229 ksize = PAGE_ALIGN(((u32)_end - (u32)CONFIG_KERNEL_START)); in mmu_init()
230 memblock_reserve(kstart, ksize); in mmu_init()
/Linux-v5.15/security/landlock/
Dsyscalls.c47 const size_t ksize, const size_t ksize_min, in copy_min_struct_from_user() argument
56 BUILD_BUG_ON(ksize <= 0); in copy_min_struct_from_user()
57 BUILD_BUG_ON(ksize < ksize_min); in copy_min_struct_from_user()
64 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
/Linux-v5.15/drivers/s390/crypto/
Dpkey_api.c549 enum pkey_key_type ktype, enum pkey_key_size ksize, in pkey_genseckey2() argument
572 switch (ksize) { in pkey_genseckey2()
586 rc = ep11_genaeskey(card, dom, ksize, kflags, in pkey_genseckey2()
589 rc = cca_genseckey(card, dom, ksize, keybuf); in pkey_genseckey2()
592 rc = cca_gencipherkey(card, dom, ksize, kflags, in pkey_genseckey2()
602 enum pkey_key_type ktype, enum pkey_key_size ksize, in pkey_clr2seckey2() argument
626 switch (ksize) { in pkey_clr2seckey2()
642 rc = ep11_clr2keyblob(card, dom, ksize, kflags, in pkey_clr2seckey2()
645 rc = cca_clr2seckey(card, dom, ksize, in pkey_clr2seckey2()
649 rc = cca_clr2cipherkey(card, dom, ksize, kflags, in pkey_clr2seckey2()
[all …]
/Linux-v5.15/drivers/nvmem/
Dcore.c101 unsigned int kend, ksize; in nvmem_access_with_keepouts() local
117 ksize = kend - offset; in nvmem_access_with_keepouts()
119 rc = __nvmem_reg_write(nvmem, offset, val, ksize); in nvmem_access_with_keepouts()
121 rc = __nvmem_reg_read(nvmem, offset, val, ksize); in nvmem_access_with_keepouts()
126 offset += ksize; in nvmem_access_with_keepouts()
127 val += ksize; in nvmem_access_with_keepouts()
135 ksize = kend - offset; in nvmem_access_with_keepouts()
137 memset(val, keepout->value, ksize); in nvmem_access_with_keepouts()
139 val += ksize; in nvmem_access_with_keepouts()
140 offset += ksize; in nvmem_access_with_keepouts()
[all …]
/Linux-v5.15/net/sched/
Dact_pedit.c152 int ksize; in tcf_pedit_init() local
178 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init()
179 if (nla_len(pattr) < sizeof(*parm) + ksize) { in tcf_pedit_init()
220 keys = kmalloc(ksize, GFP_ATOMIC); in tcf_pedit_init()
230 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init()
/Linux-v5.15/drivers/gpu/drm/
Ddrm_ioctl.c829 unsigned int in_size, out_size, drv_size, ksize; in drm_ioctl() local
864 ksize = max(max(in_size, out_size), drv_size); in drm_ioctl()
880 if (ksize <= sizeof(stack_kdata)) { in drm_ioctl()
883 kdata = kmalloc(ksize, GFP_KERNEL); in drm_ioctl()
895 if (ksize > in_size) in drm_ioctl()
896 memset(kdata + in_size, 0, ksize - in_size); in drm_ioctl()
Ddrm_managed.c132 WARN_ON(dev + 1 > (struct drm_device *) (container + ksize(container))); in drmm_add_final_kfree()
/Linux-v5.15/drivers/crypto/
Dpadlock-aes.c50 ksize:2; member
136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
/Linux-v5.15/tools/testing/selftests/net/mptcp/
Dmptcp_connect.sh579 local ksize
589 ksize=$((SIZE / 1024))
590 rem=$((SIZE - (ksize * 1024)))
592 dd if=/dev/urandom of="$name" bs=1024 count=$ksize 2> /dev/null
/Linux-v5.15/drivers/net/ethernet/chelsio/inline_crypto/chtls/
Dchtls_hw.c161 int ksize; in chtls_init_kmap() local
168 ksize = sizeof(*cdev->kmap.addr) * bsize; in chtls_init_kmap()
169 cdev->kmap.addr = kvzalloc(ksize, GFP_KERNEL); in chtls_init_kmap()
/Linux-v5.15/net/bluetooth/
Damp.c128 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument
134 if (!ksize) in hmac_sha256()
143 ret = crypto_shash_setkey(tfm, key, ksize); in hmac_sha256()
/Linux-v5.15/mm/
Dmempool.c62 __check_element(pool, element, ksize(element)); in check_element()
85 __poison_element(element, ksize(element)); in poison_element()
Dslab_common.c1265 ks = ksize(mem); in kfree_sensitive()
1286 size_t ksize(const void *objp) in ksize() function
1316 EXPORT_SYMBOL(ksize);
/Linux-v5.15/security/tomoyo/
Dmemory.c50 const size_t s = ksize(ptr); in tomoyo_memory_ok()
/Linux-v5.15/mm/kfence/
Dkfence_test.c701 KUNIT_EXPECT_EQ(test, ksize(buf), size); /* Precise size match after KFENCE alloc. */ in test_krealloc()
708 KUNIT_EXPECT_GE(test, ksize(buf), size * 3); in test_krealloc()
715 KUNIT_EXPECT_GE(test, ksize(buf), size * 2); in test_krealloc()

12