| /lib/crypto/ |
| A D | blake2s-selftest.c | 613 memcpy(&state1, &state, sizeof(state1)); in blake2s_random_test() 614 memcpy(&state2, &state, sizeof(state2)); in blake2s_random_test() 624 memcpy(&state1, &state, sizeof(state1)); in blake2s_random_test() 627 memcpy(unaligned_block + l, blocks, in blake2s_random_test() 629 memcpy(&state2, &state, sizeof(state2)); in blake2s_random_test()
|
| A D | blake2s.c | 32 memcpy(state->buf + state->buflen, in, fill); in blake2s_update() 44 memcpy(state->buf + state->buflen, in, inlen); in blake2s_update() 57 memcpy(out, state->h, state->outlen); in blake2s_final()
|
| A D | blake2s-generic.c | 56 memcpy(m, block, BLAKE2S_BLOCK_SIZE); in blake2s_compress_generic() 58 memcpy(v, state->h, 32); in blake2s_compress_generic()
|
| A D | chacha.c | 111 memcpy(&out[0], &permuted_state.x[0], 16); in hchacha_block_generic() 112 memcpy(&out[4], &permuted_state.x[12], 16); in hchacha_block_generic()
|
| A D | curve25519-hacl64.c | 285 memcpy(output, input, 5 * sizeof(*input)); in fsquare_fsquare_times() 357 memcpy(tmp, b, 5 * sizeof(*b)); in fdifference() 473 memcpy(output, input, 5 * sizeof(*input)); in point_copy() 474 memcpy(output + 5, input + 5, 5 * sizeof(*input)); in point_copy() 497 memcpy(origx, x, 5 * sizeof(*x)); in addanddouble_fmonty() 500 memcpy(origxprime0, xprime, 5 * sizeof(*xprime)); in addanddouble_fmonty() 517 memcpy(origxprime, xxprime, 5 * sizeof(*xxprime)); in addanddouble_fmonty() 771 memcpy(e, secret, 32); in curve25519_generic()
|
| A D | sha1.c | 181 memcpy(&ctx->buf[partial], data, l); in sha1_update() 198 memcpy(&ctx->buf[partial], data, len); in sha1_update() 250 memcpy(derived_key.b, raw_key, raw_key_len); in __hmac_sha1_preparekey()
|
| /lib/ |
| A D | xxhash.c | 81 memcpy(dst, src, sizeof(*dst)); in xxh32_copy_state() 87 memcpy(dst, src, sizeof(*dst)); in xxh64_copy_state() 252 memcpy(statePtr, &state, sizeof(state)); in xxh32_reset() 266 memcpy(statePtr, &state, sizeof(state)); in xxh64_reset() 281 memcpy(((uint8_t *)state->mem64) + state->memsize, input, len); in xxh64_update() 289 memcpy(((uint8_t *)p64) + state->memsize, input, in xxh64_update() 329 memcpy(state->mem64, p, (size_t)(b_end-p)); in xxh64_update()
|
| A D | asn1_encoder.c | 311 memcpy(data, string, len); in asn1_encode_tag() 352 memcpy(data, string, len); in asn1_encode_octet_string() 412 memcpy(data, seq, len); in asn1_encode_sequence()
|
| A D | decompress_unlzo.c | 163 memcpy(in_buf_save, in_buf, in_len); in unlzo() 232 memcpy(out_buf, in_buf, src_len); in unlzo()
|
| A D | nlattr.c | 793 memcpy(dst, src, len); in nla_strscpy() 818 memcpy(dst, src, srclen); in nla_strdup() 840 memcpy(dest, nla_data(src), minlen); in nla_memcpy() 1041 memcpy(nla_data(nla), data, attrlen); in __nla_put() 1062 memcpy(nla_data(nla), data, attrlen); in __nla_put_64bit() 1080 memcpy(start, data, attrlen); in __nla_put_nohdr()
|
| A D | buildid.c | 133 memcpy(r->buf, r->addr + (file_off - r->folio_off), part_sz); in freader_fetch() 141 memcpy(r->buf + part_sz, r->addr, sz - part_sz); in freader_fetch() 200 memcpy(build_id, data, desc_sz); in parse_build_id()
|
| A D | test_hexdump.c | 102 memcpy(p, q, amount); in test_hexdump_prepare_test() 116 memcpy(p, data_a, l); in test_hexdump_prepare_test()
|
| A D | kfifo.c | 105 memcpy(fifo->data + off, src, l); in kfifo_copy_in() 106 memcpy(fifo->data, src + l, len - l); in kfifo_copy_in() 144 memcpy(dst, fifo->data + off, l); in kfifo_copy_out() 145 memcpy(dst + l, fifo->data, len - l); in kfifo_copy_out()
|
| /lib/tests/ |
| A D | memcpy_kunit.c | 89 memcpy(dest.data, zero.data, sizeof(dest.data)); in memcpy_test() 94 memcpy(dest.data + 12, zero.data, 7); in memcpy_test() 101 memcpy(ptr++, zero.data, count++); in memcpy_test() 103 memcpy(ptr++, zero.data, count++); in memcpy_test() 342 memcpy(large_dst + offset, large_src, bytes); in copy_large_test() 403 memcpy(&large_dst[s_off], large_src, bytes); in inner_loop()
|
| A D | string_helpers_kunit.c | 73 memcpy(&in[p], s, len); in test_string_unescape() 81 memcpy(&out_test[q_test], s, len); in test_string_unescape() 88 memcpy(out_real, in, p); in test_string_unescape() 443 memcpy(&in[p], s2->in, len); in test_string_escape() 448 memcpy(&out_test[q_test], out, len); in test_string_escape() 489 memcpy(dst, from, len); in __strchrcut()
|
| A D | usercopy_kunit.c | 130 memcpy(expected, umem_src, ksize); in usercopy_test_copy_struct_from_user() 142 memcpy(expected, umem_src, usize); in usercopy_test_copy_struct_from_user() 163 memcpy(expected, umem_src, ksize); in usercopy_test_copy_struct_from_user()
|
| A D | seq_buf_kunit.c | 161 memcpy(buf, "hello", 5); in seq_buf_get_buf_commit_test() 172 memcpy(buf, " worlds!", 8); in seq_buf_get_buf_commit_test()
|
| /lib/crypto/riscv/ |
| A D | chacha-riscv64-glue.c | 45 memcpy(block_buffer, src, tail_bytes); in chacha_crypt_arch() 47 memcpy(dst, block_buffer, tail_bytes); in chacha_crypt_arch()
|
| /lib/crypto/arm64/ |
| A D | chacha-neon-glue.c | 50 memcpy(buf, src, l); in chacha_doneon() 52 memcpy(dst, buf, l); in chacha_doneon()
|
| /lib/test_fortify/ |
| A D | read_overflow2-memcpy.c | 3 memcpy(large, instance.buf, sizeof(large))
|
| A D | write_overflow-memcpy.c | 3 memcpy(instance.buf, large_src, sizeof(large_src))
|
| A D | read_overflow2_field-memcpy.c | 3 memcpy(large, instance.buf, sizeof(instance.buf) + 1)
|
| A D | write_overflow_field-memcpy.c | 3 memcpy(instance.buf, large, sizeof(instance.buf) + 1)
|
| /lib/crypto/arm/ |
| A D | chacha-glue.c | 59 s = d = memcpy(buf, src, bytes); in chacha_doneon() 62 memcpy(dst, buf, bytes); in chacha_doneon()
|
| /lib/raid6/ |
| A D | algos.c | 265 memcpy(p, raid6_gfmul, 65536); in raid6_select_algo() 270 memcpy(p, raid6_gfmul, (disks - 2) * PAGE_SIZE % 65536); in raid6_select_algo()
|