Home
last modified time | relevance | path

Searched refs:pk (Results 1 – 13 of 13) sorted by relevance

/linux-6.1.9/drivers/hid/
Dhid-prodikeys.c53 struct pk_device *pk; member
103 struct pk_device *pk = hid_get_drvdata(hdev); in show_channel() local
105 dbg_hid("pcmidi sysfs read channel=%u\n", pk->pm->midi_channel); in show_channel()
107 return sprintf(buf, "%u (min:%u, max:%u)\n", pk->pm->midi_channel, in show_channel()
116 struct pk_device *pk = hid_get_drvdata(hdev); in store_channel() local
122 pk->pm->midi_channel = channel; in store_channel()
140 struct pk_device *pk = hid_get_drvdata(hdev); in show_sustain() local
142 dbg_hid("pcmidi sysfs read sustain=%u\n", pk->pm->midi_sustain); in show_sustain()
144 return sprintf(buf, "%u (off:%u, max:%u (ms))\n", pk->pm->midi_sustain, in show_sustain()
153 struct pk_device *pk = hid_get_drvdata(hdev); in store_sustain() local
[all …]
/linux-6.1.9/drivers/crypto/keembay/
Dkeembay-ocs-ecc.c356 struct ecc_point *pk) in kmb_ocs_ecc_is_pubkey_valid_partial() argument
363 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in kmb_ocs_ecc_is_pubkey_valid_partial()
367 if (ecc_point_is_zero(pk)) in kmb_ocs_ecc_is_pubkey_valid_partial()
371 if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1) in kmb_ocs_ecc_is_pubkey_valid_partial()
374 if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1) in kmb_ocs_ecc_is_pubkey_valid_partial()
381 rc = kmb_ecc_do_scalar_op(ecc_dev, yy, pk->y, pk->y, curve, pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial()
390 rc = kmb_ecc_do_scalar_op(ecc_dev, xxx, pk->x, w, curve, pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial()
396 rc = kmb_ecc_do_scalar_op(ecc_dev, w, curve->a, pk->x, curve, in kmb_ocs_ecc_is_pubkey_valid_partial()
397 pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial()
404 pk->ndigits, in kmb_ocs_ecc_is_pubkey_valid_partial()
[all …]
/linux-6.1.9/arch/s390/crypto/
Dpaes_s390.c113 struct pkey_protkey pk; member
120 struct pkey_protkey pk[2]; member
126 struct pkey_protkey *pk) in __paes_keyblob2pkey() argument
135 ret = pkey_keyblob2pkey(kb->key, kb->keylen, pk); in __paes_keyblob2pkey()
153 memcpy(&ctx->pk, &pkey, sizeof(pkey)); in __paes_convert_key()
186 fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PAES_128 : in __ecb_paes_set_key()
187 (ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KM_PAES_192 : in __ecb_paes_set_key()
188 (ctx->pk.type == PKEY_KEYTYPE_AES_256) ? CPACF_KM_PAES_256 : 0; in __ecb_paes_set_key()
226 memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE); in ecb_paes_crypt()
240 memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE); in ecb_paes_crypt()
[all …]
/linux-6.1.9/security/integrity/
Ddigsig_asymmetric.c87 const struct public_key *pk; in asymmetric_verify() local
110 pk = asymmetric_key_public_key(key); in asymmetric_verify()
111 pks.pkey_algo = pk->pkey_algo; in asymmetric_verify()
112 if (!strcmp(pk->pkey_algo, "rsa")) { in asymmetric_verify()
114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { in asymmetric_verify()
117 } else if (!strcmp(pk->pkey_algo, "ecrdsa") || in asymmetric_verify()
118 !strcmp(pk->pkey_algo, "sm2")) { in asymmetric_verify()
/linux-6.1.9/crypto/
Decc.c1512 struct ecc_point *pk; in ecc_make_pub_key() local
1523 pk = ecc_alloc_point(ndigits); in ecc_make_pub_key()
1524 if (!pk) { in ecc_make_pub_key()
1529 ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); in ecc_make_pub_key()
1532 if (ecc_is_pubkey_valid_full(curve, pk)) { in ecc_make_pub_key()
1537 ecc_swap_digits(pk->x, public_key, ndigits); in ecc_make_pub_key()
1538 ecc_swap_digits(pk->y, &public_key[ndigits], ndigits); in ecc_make_pub_key()
1541 ecc_free_point(pk); in ecc_make_pub_key()
1549 struct ecc_point *pk) in ecc_is_pubkey_valid_partial() argument
1553 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in ecc_is_pubkey_valid_partial()
[all …]
/linux-6.1.9/include/crypto/internal/
Decc.h134 struct ecc_point *pk);
148 struct ecc_point *pk);
/linux-6.1.9/fs/btrfs/
Dfile-item.c876 struct btrfs_key pk; in btrfs_del_csums() local
878 btrfs_item_key_to_cpu(leaf, &pk, slot); in btrfs_del_csums()
879 if (pk.offset < bytenr || in btrfs_del_csums()
880 pk.type != BTRFS_EXTENT_CSUM_KEY || in btrfs_del_csums()
881 pk.objectid != in btrfs_del_csums()
886 key.offset = pk.offset; in btrfs_del_csums()
/linux-6.1.9/Documentation/devicetree/bindings/interrupt-controller/
Dmstar,mst-intc.yaml10 - Mark-PK Tsai <mark-pk.tsai@mediatek.com>
/linux-6.1.9/crypto/asymmetric_keys/
Dpublic_key.c454 const struct public_key *pk = key->payload.data[asym_crypto]; in public_key_verify_signature_2() local
455 return public_key_verify_signature(pk, sig); in public_key_verify_signature_2()
/linux-6.1.9/arch/ia64/include/asm/
Dprocessor.h95 __u64 pk : 1; member
/linux-6.1.9/Documentation/ia64/
Dfsys.rst207 PSR.pk Unchanged.
/linux-6.1.9/net/bluetooth/
Dsmp.c3469 u8 pk[64]; in test_debug_key() local
3476 err = generate_ecdh_public_key(tfm_ecdh, pk); in test_debug_key()
3480 if (crypto_memneq(pk, debug_pk, 64)) in test_debug_key()
/linux-6.1.9/
DMAINTAINERS14010 M: Mark-PK Tsai <mark-pk.tsai@mediatek.com>