/linux-6.1.9/crypto/ |
D | testmgr.h | 43 unsigned short ksize; member 5595 .ksize = 32, 5614 .ksize = 32, 5766 .ksize = 32, 5780 .ksize = 37, 5794 .ksize = 32, 5803 .ksize = 4, 6982 .ksize = 16, 6991 .ksize = 16, 6999 .ksize = 16, [all …]
|
D | testmgr.c | 816 static int prepare_keybuf(const u8 *key, unsigned int ksize, in prepare_keybuf() argument 827 keybuf = kmalloc(key_offset + ksize, GFP_KERNEL); in prepare_keybuf() 831 memcpy(keyptr, key, ksize); in prepare_keybuf() 839 #define do_setkey(setkey_f, tfm, key, ksize, cfg, alignmask) \ argument 844 err = prepare_keybuf((key), (ksize), (cfg), (alignmask), \ 847 err = setkey_f((tfm), keyptr, (ksize)); \ 1237 if (vec->ksize) { in test_shash_vec_cfg() 1238 err = do_setkey(crypto_shash_setkey, tfm, vec->key, vec->ksize, in test_shash_vec_cfg() 1425 if (vec->ksize) { in test_ahash_vec_cfg() 1426 err = do_setkey(crypto_ahash_setkey, tfm, vec->key, vec->ksize, in test_ahash_vec_cfg() [all …]
|
/linux-6.1.9/lib/ |
D | test_user_copy.c | 110 size_t ksize, usize; in test_copy_struct_from_user() local 128 ksize = size; in test_copy_struct_from_user() 131 memcpy(expected, umem_src, ksize); in test_copy_struct_from_user() 134 ret |= test(copy_struct_from_user(kmem, ksize, umem, usize), in test_copy_struct_from_user() 136 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user() 140 ksize = size; in test_copy_struct_from_user() 144 memset(expected + usize, 0x0, ksize - usize); in test_copy_struct_from_user() 147 ret |= test(copy_struct_from_user(kmem, ksize, umem, usize), in test_copy_struct_from_user() 149 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user() 153 ksize = size / 2; in test_copy_struct_from_user() [all …]
|
/linux-6.1.9/arch/powerpc/platforms/powernv/ |
D | opal-secvar.c | 57 static int opal_get_variable(const char *key, uint64_t ksize, in opal_get_variable() argument 67 rc = opal_secvar_get(key, ksize, data, dsize); in opal_get_variable() 91 static int opal_set_variable(const char *key, uint64_t ksize, u8 *data, in opal_set_variable() argument 99 rc = opal_secvar_enqueue_update(key, ksize, data, dsize); in opal_set_variable()
|
/linux-6.1.9/tools/testing/selftests/bpf/progs/ |
D | test_get_stack_rawtp.c | 62 long usize, ksize; in bpf_prog1() local 91 ksize = bpf_get_stack(ctx, raw_data + usize, max_len - usize, 0); in bpf_prog1() 92 if (ksize < 0) in bpf_prog1() 95 total_size = usize + ksize; in bpf_prog1()
|
/linux-6.1.9/drivers/dma-buf/ |
D | dma-heap.c | 132 unsigned int in_size, out_size, drv_size, ksize; in dma_heap_ioctl() local 151 ksize = max(max(in_size, out_size), drv_size); in dma_heap_ioctl() 154 if (ksize > sizeof(stack_kdata)) { in dma_heap_ioctl() 155 kdata = kmalloc(ksize, GFP_KERNEL); in dma_heap_ioctl() 166 if (ksize > in_size) in dma_heap_ioctl() 167 memset(kdata + in_size, 0, ksize - in_size); in dma_heap_ioctl()
|
/linux-6.1.9/include/linux/ |
D | uaccess.h | 326 copy_struct_from_user(void *dst, size_t ksize, const void __user *src, in copy_struct_from_user() argument 329 size_t size = min(ksize, usize); in copy_struct_from_user() 330 size_t rest = max(ksize, usize) - size; in copy_struct_from_user() 333 if (usize < ksize) { in copy_struct_from_user() 335 } else if (usize > ksize) { in copy_struct_from_user()
|
/linux-6.1.9/arch/alpha/boot/ |
D | misc.c | 154 size_t ksize, in decompress_kernel() argument 162 free_mem_ptr = (ulg)output_start + ksize; in decompress_kernel() 163 free_mem_end_ptr = (ulg)output_start + ksize + 0x200000; in decompress_kernel()
|
D | Makefile | 46 $(obj)/main.o: $(obj)/ksize.h 47 $(obj)/bootp.o: $(obj)/ksize.h 50 $(obj)/ksize.h: $(obj)/vmlinux.nh FORCE
|
D | bootpz.c | 49 size_t ksize, size_t kzsize);
|
/linux-6.1.9/security/landlock/ |
D | syscalls.c | 47 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user() argument 57 BUILD_BUG_ON(ksize <= 0); in copy_min_struct_from_user() 58 BUILD_BUG_ON(ksize < ksize_min); in copy_min_struct_from_user() 65 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
|
/linux-6.1.9/arch/microblaze/mm/ |
D | init.c | 194 unsigned int kstart, ksize; in mmu_init() local 230 ksize = PAGE_ALIGN(((u32)_end - (u32)CONFIG_KERNEL_START)); in mmu_init() 231 memblock_reserve(kstart, ksize); in mmu_init()
|
/linux-6.1.9/drivers/s390/crypto/ |
D | pkey_api.c | 548 enum pkey_key_type ktype, enum pkey_key_size ksize, in pkey_genseckey2() argument 571 switch (ksize) { in pkey_genseckey2() 585 rc = ep11_genaeskey(card, dom, ksize, kflags, in pkey_genseckey2() 588 rc = cca_genseckey(card, dom, ksize, keybuf); in pkey_genseckey2() 592 rc = cca_gencipherkey(card, dom, ksize, kflags, in pkey_genseckey2() 603 enum pkey_key_type ktype, enum pkey_key_size ksize, in pkey_clr2seckey2() argument 627 switch (ksize) { in pkey_clr2seckey2() 643 rc = ep11_clr2keyblob(card, dom, ksize, kflags, in pkey_clr2seckey2() 646 rc = cca_clr2seckey(card, dom, ksize, in pkey_clr2seckey2() 651 rc = cca_clr2cipherkey(card, dom, ksize, kflags, in pkey_clr2seckey2() [all …]
|
/linux-6.1.9/drivers/nvmem/ |
D | core.c | 106 unsigned int kend, ksize; in nvmem_access_with_keepouts() local 122 ksize = kend - offset; in nvmem_access_with_keepouts() 124 rc = __nvmem_reg_write(nvmem, offset, val, ksize); in nvmem_access_with_keepouts() 126 rc = __nvmem_reg_read(nvmem, offset, val, ksize); in nvmem_access_with_keepouts() 131 offset += ksize; in nvmem_access_with_keepouts() 132 val += ksize; in nvmem_access_with_keepouts() 140 ksize = kend - offset; in nvmem_access_with_keepouts() 142 memset(val, keepout->value, ksize); in nvmem_access_with_keepouts() 144 val += ksize; in nvmem_access_with_keepouts() 145 offset += ksize; in nvmem_access_with_keepouts() [all …]
|
/linux-6.1.9/net/sched/ |
D | act_pedit.c | 151 int i, ksize; in tcf_pedit_init() local 177 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init() 178 if (nla_len(pattr) < sizeof(*parm) + ksize) { in tcf_pedit_init() 219 keys = kmalloc(ksize, GFP_ATOMIC); in tcf_pedit_init() 229 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init()
|
/linux-6.1.9/drivers/gpu/drm/ |
D | drm_ioctl.c | 822 unsigned int in_size, out_size, drv_size, ksize; in drm_ioctl() local 857 ksize = max(max(in_size, out_size), drv_size); in drm_ioctl() 873 if (ksize <= sizeof(stack_kdata)) { in drm_ioctl() 876 kdata = kmalloc(ksize, GFP_KERNEL); in drm_ioctl() 888 if (ksize > in_size) in drm_ioctl() 889 memset(kdata + in_size, 0, ksize - in_size); in drm_ioctl()
|
D | drm_managed.c | 133 WARN_ON(dev + 1 > (struct drm_device *) (container + ksize(container))); in drmm_add_final_kfree()
|
/linux-6.1.9/arch/x86/kernel/fpu/ |
D | xstate.c | 1494 static int fpstate_realloc(u64 xfeatures, unsigned int ksize, in fpstate_realloc() argument 1502 fpsize = ksize + ALIGN(offsetof(struct fpstate, regs), 64); in fpstate_realloc() 1507 newfps->size = ksize; in fpstate_realloc() 1595 unsigned int ksize, usize; in __xstate_request_perm() local 1608 ksize = xstate_calculate_size(mask, compacted); in __xstate_request_perm() 1624 perm->__state_size = ksize; in __xstate_request_perm() 1678 unsigned int ksize, usize; in __xfd_enable_feature() local 1698 ksize = perm->__state_size; in __xfd_enable_feature() 1713 if (fpstate_realloc(xfd_event, ksize, usize, guest_fpu)) in __xfd_enable_feature()
|
/linux-6.1.9/drivers/crypto/ |
D | padlock-aes.c | 50 ksize:2; member 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
|
/linux-6.1.9/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
D | chtls_hw.c | 161 int ksize; in chtls_init_kmap() local 168 ksize = sizeof(*cdev->kmap.addr) * bsize; in chtls_init_kmap() 169 cdev->kmap.addr = kvzalloc(ksize, GFP_KERNEL); in chtls_init_kmap()
|
/linux-6.1.9/tools/testing/selftests/net/mptcp/ |
D | mptcp_connect.sh | 585 local ksize 595 ksize=$((SIZE / 1024)) 596 rem=$((SIZE - (ksize * 1024))) 598 dd if=/dev/urandom of="$name" bs=1024 count=$ksize 2> /dev/null
|
/linux-6.1.9/net/bluetooth/ |
D | amp.c | 128 static int hmac_sha256(u8 *key, u8 ksize, char *plaintext, u8 psize, u8 *output) in hmac_sha256() argument 134 if (!ksize) in hmac_sha256() 143 ret = crypto_shash_setkey(tfm, key, ksize); in hmac_sha256()
|
/linux-6.1.9/mm/ |
D | mempool.c | 61 __check_element(pool, element, ksize(element)); in check_element() 84 __poison_element(element, ksize(element)); in poison_element()
|
/linux-6.1.9/security/tomoyo/ |
D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok()
|
/linux-6.1.9/mm/kfence/ |
D | kfence_test.c | 703 KUNIT_EXPECT_EQ(test, ksize(buf), size); /* Precise size match after KFENCE alloc. */ in test_krealloc() 710 KUNIT_EXPECT_GE(test, ksize(buf), size * 3); in test_krealloc() 717 KUNIT_EXPECT_GE(test, ksize(buf), size * 2); in test_krealloc()
|