kdfcopy            20 security/keys/compat_dh.c 	struct keyctl_kdf_params kdfcopy;
kdfcopy            29 security/keys/compat_dh.c 	kdfcopy.hashname = compat_ptr(compat_kdfcopy.hashname);
kdfcopy            30 security/keys/compat_dh.c 	kdfcopy.otherinfo = compat_ptr(compat_kdfcopy.otherinfo);
kdfcopy            31 security/keys/compat_dh.c 	kdfcopy.otherinfolen = compat_kdfcopy.otherinfolen;
kdfcopy            32 security/keys/compat_dh.c 	memcpy(kdfcopy.__spare, compat_kdfcopy.__spare,
kdfcopy            33 security/keys/compat_dh.c 	       sizeof(kdfcopy.__spare));
kdfcopy            35 security/keys/compat_dh.c 	return __keyctl_dh_compute(params, buffer, buflen, &kdfcopy);
kdfcopy           229 security/keys/dh.c 			 struct keyctl_kdf_params *kdfcopy)
kdfcopy           254 security/keys/dh.c 	if (kdfcopy) {
kdfcopy           257 security/keys/dh.c 		if (memchr_inv(kdfcopy->__spare, 0, sizeof(kdfcopy->__spare))) {
kdfcopy           263 security/keys/dh.c 		    kdfcopy->otherinfolen > KEYCTL_KDF_MAX_OI_LEN) {
kdfcopy           269 security/keys/dh.c 		hashname = strndup_user(kdfcopy->hashname, CRYPTO_MAX_ALG_NAME);
kdfcopy           327 security/keys/dh.c 	if (!kdfcopy) {
kdfcopy           341 security/keys/dh.c 	outbuf = kzalloc(kdfcopy ? (outlen + kdfcopy->otherinfolen) : outlen,
kdfcopy           375 security/keys/dh.c 	if (kdfcopy) {
kdfcopy           380 security/keys/dh.c 		if (copy_from_user(outbuf + req->dst_len, kdfcopy->otherinfo,
kdfcopy           381 security/keys/dh.c 				   kdfcopy->otherinfolen) != 0) {
kdfcopy           387 security/keys/dh.c 					    req->dst_len + kdfcopy->otherinfolen,
kdfcopy           414 security/keys/dh.c 	struct keyctl_kdf_params kdfcopy;
kdfcopy           419 security/keys/dh.c 	if (copy_from_user(&kdfcopy, kdf, sizeof(kdfcopy)) != 0)
kdfcopy           422 security/keys/dh.c 	return __keyctl_dh_compute(params, buffer, buflen, &kdfcopy);