in2                67 crypto/ansi_cprng.c static void xor_vectors(unsigned char *in1, unsigned char *in2,
in2                73 crypto/ansi_cprng.c 		out[i] = in1[i] ^ in2[i];
in2               563 crypto/asymmetric_keys/asymmetric_type.c 					   const void *in, const void *in2)
in2               571 crypto/asymmetric_keys/asymmetric_type.c 		.s		= (void *)in2,
in2               400 drivers/hwmon/smm665.c SMM665_ATTR(in2, input, SMM665_MISC16_ADC_DATA_VDD);
in2               412 drivers/hwmon/smm665.c SMM665_ATTR(in2, min, SMM665_MISC16_ADC_DATA_VDD);
in2               424 drivers/hwmon/smm665.c SMM665_ATTR(in2, max, SMM665_MISC16_ADC_DATA_VDD);
in2               436 drivers/hwmon/smm665.c SMM665_ATTR(in2, lcrit, SMM665_MISC16_ADC_DATA_VDD);
in2               448 drivers/hwmon/smm665.c SMM665_ATTR(in2, crit, SMM665_MISC16_ADC_DATA_VDD);
in2               460 drivers/hwmon/smm665.c SMM665_ATTR(in2, crit_alarm, SMM665_FAULT_VDD);
in2               156 include/linux/key-type.h 				     const void *in, const void *in2);
in2               288 security/keys/keyctl_pkey.c 	void *in, *in2;
in2               306 security/keys/keyctl_pkey.c 	in2 = memdup_user(_in2, params.in2_len);
in2               307 security/keys/keyctl_pkey.c 	if (IS_ERR(in2)) {
in2               308 security/keys/keyctl_pkey.c 		ret = PTR_ERR(in2);
in2               313 security/keys/keyctl_pkey.c 	ret = params.key->type->asym_verify_signature(&params, in, in2);
in2               315 security/keys/keyctl_pkey.c 	kfree(in2);