kdfcopy 20 security/keys/compat_dh.c struct keyctl_kdf_params kdfcopy; kdfcopy 29 security/keys/compat_dh.c kdfcopy.hashname = compat_ptr(compat_kdfcopy.hashname); kdfcopy 30 security/keys/compat_dh.c kdfcopy.otherinfo = compat_ptr(compat_kdfcopy.otherinfo); kdfcopy 31 security/keys/compat_dh.c kdfcopy.otherinfolen = compat_kdfcopy.otherinfolen; kdfcopy 32 security/keys/compat_dh.c memcpy(kdfcopy.__spare, compat_kdfcopy.__spare, kdfcopy 33 security/keys/compat_dh.c sizeof(kdfcopy.__spare)); kdfcopy 35 security/keys/compat_dh.c return __keyctl_dh_compute(params, buffer, buflen, &kdfcopy); kdfcopy 229 security/keys/dh.c struct keyctl_kdf_params *kdfcopy) kdfcopy 254 security/keys/dh.c if (kdfcopy) { kdfcopy 257 security/keys/dh.c if (memchr_inv(kdfcopy->__spare, 0, sizeof(kdfcopy->__spare))) { kdfcopy 263 security/keys/dh.c kdfcopy->otherinfolen > KEYCTL_KDF_MAX_OI_LEN) { kdfcopy 269 security/keys/dh.c hashname = strndup_user(kdfcopy->hashname, CRYPTO_MAX_ALG_NAME); kdfcopy 327 security/keys/dh.c if (!kdfcopy) { kdfcopy 341 security/keys/dh.c outbuf = kzalloc(kdfcopy ? (outlen + kdfcopy->otherinfolen) : outlen, kdfcopy 375 security/keys/dh.c if (kdfcopy) { kdfcopy 380 security/keys/dh.c if (copy_from_user(outbuf + req->dst_len, kdfcopy->otherinfo, kdfcopy 381 security/keys/dh.c kdfcopy->otherinfolen) != 0) { kdfcopy 387 security/keys/dh.c req->dst_len + kdfcopy->otherinfolen, kdfcopy 414 security/keys/dh.c struct keyctl_kdf_params kdfcopy; kdfcopy 419 security/keys/dh.c if (copy_from_user(&kdfcopy, kdf, sizeof(kdfcopy)) != 0) kdfcopy 422 security/keys/dh.c return __keyctl_dh_compute(params, buffer, buflen, &kdfcopy);