/linux-6.1.9/drivers/hid/ |
D | hid-prodikeys.c | 53 struct pk_device *pk; member 103 struct pk_device *pk = hid_get_drvdata(hdev); in show_channel() local 105 dbg_hid("pcmidi sysfs read channel=%u\n", pk->pm->midi_channel); in show_channel() 107 return sprintf(buf, "%u (min:%u, max:%u)\n", pk->pm->midi_channel, in show_channel() 116 struct pk_device *pk = hid_get_drvdata(hdev); in store_channel() local 122 pk->pm->midi_channel = channel; in store_channel() 140 struct pk_device *pk = hid_get_drvdata(hdev); in show_sustain() local 142 dbg_hid("pcmidi sysfs read sustain=%u\n", pk->pm->midi_sustain); in show_sustain() 144 return sprintf(buf, "%u (off:%u, max:%u (ms))\n", pk->pm->midi_sustain, in show_sustain() 153 struct pk_device *pk = hid_get_drvdata(hdev); in store_sustain() local [all …]
|
/linux-6.1.9/drivers/crypto/keembay/ |
D | keembay-ocs-ecc.c | 356 struct ecc_point *pk) in kmb_ocs_ecc_is_pubkey_valid_partial() argument 363 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in kmb_ocs_ecc_is_pubkey_valid_partial() 367 if (ecc_point_is_zero(pk)) in kmb_ocs_ecc_is_pubkey_valid_partial() 371 if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1) in kmb_ocs_ecc_is_pubkey_valid_partial() 374 if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1) in kmb_ocs_ecc_is_pubkey_valid_partial() 381 rc = kmb_ecc_do_scalar_op(ecc_dev, yy, pk->y, pk->y, curve, pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial() 390 rc = kmb_ecc_do_scalar_op(ecc_dev, xxx, pk->x, w, curve, pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial() 396 rc = kmb_ecc_do_scalar_op(ecc_dev, w, curve->a, pk->x, curve, in kmb_ocs_ecc_is_pubkey_valid_partial() 397 pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial() 404 pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial() [all …]
|
/linux-6.1.9/arch/s390/crypto/ |
D | paes_s390.c | 113 struct pkey_protkey pk; member 120 struct pkey_protkey pk[2]; member 126 struct pkey_protkey *pk) in __paes_keyblob2pkey() argument 135 ret = pkey_keyblob2pkey(kb->key, kb->keylen, pk); in __paes_keyblob2pkey() 153 memcpy(&ctx->pk, &pkey, sizeof(pkey)); in __paes_convert_key() 186 fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PAES_128 : in __ecb_paes_set_key() 187 (ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KM_PAES_192 : in __ecb_paes_set_key() 188 (ctx->pk.type == PKEY_KEYTYPE_AES_256) ? CPACF_KM_PAES_256 : 0; in __ecb_paes_set_key() 226 memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE); in ecb_paes_crypt() 240 memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE); in ecb_paes_crypt() [all …]
|
/linux-6.1.9/security/integrity/ |
D | digsig_asymmetric.c | 87 const struct public_key *pk; in asymmetric_verify() local 110 pk = asymmetric_key_public_key(key); in asymmetric_verify() 111 pks.pkey_algo = pk->pkey_algo; in asymmetric_verify() 112 if (!strcmp(pk->pkey_algo, "rsa")) { in asymmetric_verify() 114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { in asymmetric_verify() 117 } else if (!strcmp(pk->pkey_algo, "ecrdsa") || in asymmetric_verify() 118 !strcmp(pk->pkey_algo, "sm2")) { in asymmetric_verify()
|
/linux-6.1.9/crypto/ |
D | ecc.c | 1512 struct ecc_point *pk; in ecc_make_pub_key() local 1523 pk = ecc_alloc_point(ndigits); in ecc_make_pub_key() 1524 if (!pk) { in ecc_make_pub_key() 1529 ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); in ecc_make_pub_key() 1532 if (ecc_is_pubkey_valid_full(curve, pk)) { in ecc_make_pub_key() 1537 ecc_swap_digits(pk->x, public_key, ndigits); in ecc_make_pub_key() 1538 ecc_swap_digits(pk->y, &public_key[ndigits], ndigits); in ecc_make_pub_key() 1541 ecc_free_point(pk); in ecc_make_pub_key() 1549 struct ecc_point *pk) in ecc_is_pubkey_valid_partial() argument 1553 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in ecc_is_pubkey_valid_partial() [all …]
|
/linux-6.1.9/include/crypto/internal/ |
D | ecc.h | 134 struct ecc_point *pk); 148 struct ecc_point *pk);
|
/linux-6.1.9/fs/btrfs/ |
D | file-item.c | 876 struct btrfs_key pk; in btrfs_del_csums() local 878 btrfs_item_key_to_cpu(leaf, &pk, slot); in btrfs_del_csums() 879 if (pk.offset < bytenr || in btrfs_del_csums() 880 pk.type != BTRFS_EXTENT_CSUM_KEY || in btrfs_del_csums() 881 pk.objectid != in btrfs_del_csums() 886 key.offset = pk.offset; in btrfs_del_csums()
|
/linux-6.1.9/Documentation/devicetree/bindings/interrupt-controller/ |
D | mstar,mst-intc.yaml | 10 - Mark-PK Tsai <mark-pk.tsai@mediatek.com>
|
/linux-6.1.9/crypto/asymmetric_keys/ |
D | public_key.c | 454 const struct public_key *pk = key->payload.data[asym_crypto]; in public_key_verify_signature_2() local 455 return public_key_verify_signature(pk, sig); in public_key_verify_signature_2()
|
/linux-6.1.9/arch/ia64/include/asm/ |
D | processor.h | 95 __u64 pk : 1; member
|
/linux-6.1.9/Documentation/ia64/ |
D | fsys.rst | 207 PSR.pk Unchanged.
|
/linux-6.1.9/net/bluetooth/ |
D | smp.c | 3469 u8 pk[64]; in test_debug_key() local 3476 err = generate_ecdh_public_key(tfm_ecdh, pk); in test_debug_key() 3480 if (crypto_memneq(pk, debug_pk, 64)) in test_debug_key()
|
/linux-6.1.9/ |
D | MAINTAINERS | 14010 M: Mark-PK Tsai <mark-pk.tsai@mediatek.com>
|