/Linux-v5.4/crypto/ |
D | testmgr.h | 42 unsigned short ksize; member 2528 .ksize = 32, 2547 .ksize = 32, 3926 .ksize = 16, 3935 .ksize = 16, 3943 .ksize = 16, 3954 .ksize = 16, 3965 .ksize = 16, 3973 .ksize = 16, 4038 .ksize = 16, [all …]
|
D | testmgr.c | 1105 if (vec->ksize) { in test_shash_vec_cfg() 1106 err = crypto_shash_setkey(tfm, vec->key, vec->ksize); in test_shash_vec_cfg() 1292 if (vec->ksize) { in test_ahash_vec_cfg() 1293 err = crypto_ahash_setkey(tfm, vec->key, vec->ksize); in test_ahash_vec_cfg() 1521 vec->ksize = 0; in generate_random_hash_testvec() 1523 vec->ksize = maxkeysize; in generate_random_hash_testvec() 1525 vec->ksize = 1 + (prandom_u32() % maxkeysize); in generate_random_hash_testvec() 1526 generate_random_bytes((u8 *)vec->key, vec->ksize); in generate_random_hash_testvec() 1529 vec->ksize); in generate_random_hash_testvec() 1540 vec->psize, vec->ksize); in generate_random_hash_testvec() [all …]
|
/Linux-v5.4/lib/ |
D | test_user_copy.c | 110 size_t ksize, usize; in test_copy_struct_from_user() local 128 ksize = size; in test_copy_struct_from_user() 131 memcpy(expected, umem_src, ksize); in test_copy_struct_from_user() 134 ret |= test(copy_struct_from_user(kmem, ksize, umem, usize), in test_copy_struct_from_user() 136 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user() 140 ksize = size; in test_copy_struct_from_user() 144 memset(expected + usize, 0x0, ksize - usize); in test_copy_struct_from_user() 147 ret |= test(copy_struct_from_user(kmem, ksize, umem, usize), in test_copy_struct_from_user() 149 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user() 153 ksize = size / 2; in test_copy_struct_from_user() [all …]
|
D | test_kasan.c | 466 real_size = ksize(ptr); in ksize_unpoisons_memory()
|
/Linux-v5.4/tools/testing/selftests/bpf/progs/ |
D | test_get_stack_rawtp.c | 61 int max_len, max_buildid_len, usize, ksize, total_size; in bpf_prog1() local 91 ksize = bpf_get_stack(ctx, raw_data + usize, max_len - usize, 0); in bpf_prog1() 92 if (ksize < 0) in bpf_prog1() 95 total_size = usize + ksize; in bpf_prog1()
|
/Linux-v5.4/include/linux/ |
D | uaccess.h | 284 copy_struct_from_user(void *dst, size_t ksize, const void __user *src, in copy_struct_from_user() argument 287 size_t size = min(ksize, usize); in copy_struct_from_user() 288 size_t rest = max(ksize, usize) - size; in copy_struct_from_user() 291 if (usize < ksize) { in copy_struct_from_user() 293 } else if (usize > ksize) { in copy_struct_from_user()
|
D | slab.h | 192 size_t ksize(const void *);
|
/Linux-v5.4/arch/alpha/boot/ |
D | misc.c | 154 size_t ksize, in decompress_kernel() argument 162 free_mem_ptr = (ulg)output_start + ksize; in decompress_kernel() 163 free_mem_end_ptr = (ulg)output_start + ksize + 0x200000; in decompress_kernel()
|
D | Makefile | 46 $(obj)/main.o: $(obj)/ksize.h 47 $(obj)/bootp.o: $(obj)/ksize.h 50 $(obj)/ksize.h: $(obj)/vmlinux.nh FORCE
|
D | bootpz.c | 50 size_t ksize, size_t kzsize);
|
/Linux-v5.4/drivers/s390/crypto/ |
D | pkey_api.c | 390 enum pkey_key_type ktype, enum pkey_key_size ksize, in pkey_genseckey2() argument 409 switch (ksize) { in pkey_genseckey2() 423 rc = cca_genseckey(card, dom, ksize, keybuf); in pkey_genseckey2() 426 rc = cca_gencipherkey(card, dom, ksize, kflags, in pkey_genseckey2() 436 enum pkey_key_type ktype, enum pkey_key_size ksize, in pkey_clr2seckey2() argument 456 switch (ksize) { in pkey_clr2seckey2() 470 rc = cca_clr2seckey(card, dom, ksize, in pkey_clr2seckey2() 474 rc = cca_clr2cipherkey(card, dom, ksize, kflags, in pkey_clr2seckey2() 486 enum pkey_key_size *ksize, u32 *flags) in pkey_verifykey2() argument 504 if (ksize) in pkey_verifykey2() [all …]
|
/Linux-v5.4/arch/microblaze/mm/ |
D | init.c | 277 unsigned int kstart, ksize; in mmu_init() local 313 ksize = PAGE_ALIGN(((u32)_end - (u32)CONFIG_KERNEL_START)); in mmu_init() 314 memblock_reserve(kstart, ksize); in mmu_init()
|
/Linux-v5.4/net/sched/ |
D | act_pedit.c | 151 int ksize; in tcf_pedit_init() local 177 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init() 178 if (nla_len(pattr) < sizeof(*parm) + ksize) { in tcf_pedit_init() 219 keys = kmalloc(ksize, GFP_ATOMIC); in tcf_pedit_init() 229 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init()
|
/Linux-v5.4/drivers/gpu/drm/ |
D | drm_ioctl.c | 820 unsigned int in_size, out_size, drv_size, ksize; in drm_ioctl() local 852 ksize = max(max(in_size, out_size), drv_size); in drm_ioctl() 868 if (ksize <= sizeof(stack_kdata)) { in drm_ioctl() 871 kdata = kmalloc(ksize, GFP_KERNEL); in drm_ioctl() 883 if (ksize > in_size) in drm_ioctl() 884 memset(kdata + in_size, 0, ksize - in_size); in drm_ioctl()
|
/Linux-v5.4/drivers/crypto/ |
D | padlock-aes.c | 48 ksize:2; member 137 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 138 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
|
/Linux-v5.4/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 120 int ksize; in chtls_init_kmap() local 127 ksize = sizeof(*cdev->kmap.addr) * bsize; in chtls_init_kmap() 128 cdev->kmap.addr = kvzalloc(ksize, GFP_KERNEL); in chtls_init_kmap()
|
/Linux-v5.4/net/bluetooth/ |
D | amp.c | 128 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 134 if (!ksize) in hmac_sha256() 143 ret = crypto_shash_setkey(tfm, key, ksize); in hmac_sha256()
|
/Linux-v5.4/mm/ |
D | mempool.c | 62 __check_element(pool, element, ksize(element)); in check_element() 86 __poison_element(element, ksize(element)); in poison_element()
|
D | slab_common.c | 1645 ks = ksize(p); in __do_krealloc() 1729 ks = ksize(mem); in kzfree() 1749 size_t ksize(const void *objp) in ksize() function 1779 EXPORT_SYMBOL(ksize);
|
/Linux-v5.4/security/tomoyo/ |
D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok()
|
D | gc.c | 23 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= ksize(ptr); in tomoyo_memory_free()
|
/Linux-v5.4/drivers/dma-buf/ |
D | dma-resv.c | 73 list->shared_max = (ksize(list) - offsetof(typeof(*list), shared)) / in dma_resv_list_alloc()
|
/Linux-v5.4/arch/x86/kernel/cpu/microcode/ |
D | amd.c | 867 memcpy(amd_ucode_patch, p->data, min_t(u32, ksize(p->data), PATCH_MAX_SIZE)); in load_microcode_amd()
|
/Linux-v5.4/fs/ |
D | coredump.c | 77 cn->size = ksize(corename); in expand_corename()
|
/Linux-v5.4/net/core/ |
D | skbuff.c | 216 size = SKB_WITH_OVERHEAD(ksize(data)); in __alloc_skb() 265 unsigned int size = frag_size ? : ksize(data); in __build_skb_around() 1632 size = SKB_WITH_OVERHEAD(ksize(data)); in pskb_expand_head() 5722 size = SKB_WITH_OVERHEAD(ksize(data)); in pskb_carve_inside_header() 5846 size = SKB_WITH_OVERHEAD(ksize(data)); in pskb_carve_inside_nonlinear()
|