pk 95 arch/ia64/include/asm/processor.h __u64 pk : 1; pk 83 arch/s390/crypto/paes_s390.c struct pkey_protkey pk; pk 89 arch/s390/crypto/paes_s390.c struct pkey_protkey pk[2]; pk 94 arch/s390/crypto/paes_s390.c struct pkey_protkey *pk) pk 100 arch/s390/crypto/paes_s390.c ret = pkey_keyblob2pkey(kb->key, kb->keylen, pk); pk 112 arch/s390/crypto/paes_s390.c if (__paes_convert_key(&ctx->kb, &ctx->pk)) pk 116 arch/s390/crypto/paes_s390.c fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PAES_128 : pk 117 arch/s390/crypto/paes_s390.c (ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KM_PAES_192 : pk 118 arch/s390/crypto/paes_s390.c (ctx->pk.type == PKEY_KEYTYPE_AES_256) ? CPACF_KM_PAES_256 : 0; pk 172 arch/s390/crypto/paes_s390.c k = cpacf_km(ctx->fc | modifier, ctx->pk.protkey, pk 247 arch/s390/crypto/paes_s390.c if (__paes_convert_key(&ctx->kb, &ctx->pk)) pk 251 arch/s390/crypto/paes_s390.c fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KMC_PAES_128 : pk 252 arch/s390/crypto/paes_s390.c (ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KMC_PAES_192 : pk 253 arch/s390/crypto/paes_s390.c (ctx->pk.type == PKEY_KEYTYPE_AES_256) ? CPACF_KMC_PAES_256 : 0; pk 292 arch/s390/crypto/paes_s390.c memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE); pk 303 arch/s390/crypto/paes_s390.c memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE); pk 376 arch/s390/crypto/paes_s390.c if (__paes_convert_key(&ctx->kb[0], &ctx->pk[0]) || pk 377 arch/s390/crypto/paes_s390.c __paes_convert_key(&ctx->kb[1], &ctx->pk[1])) pk 380 arch/s390/crypto/paes_s390.c if (ctx->pk[0].type != ctx->pk[1].type) pk 384 arch/s390/crypto/paes_s390.c fc = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PXTS_128 : pk 385 arch/s390/crypto/paes_s390.c (ctx->pk[0].type == PKEY_KEYTYPE_AES_256) ? pk 426 arch/s390/crypto/paes_s390.c ckey_len = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? pk 428 arch/s390/crypto/paes_s390.c memcpy(ckey, ctx->pk[0].protkey, ckey_len); pk 429 arch/s390/crypto/paes_s390.c memcpy(ckey + ckey_len, ctx->pk[1].protkey, ckey_len); pk 452 arch/s390/crypto/paes_s390.c keylen = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? 48 : 64; pk 453 arch/s390/crypto/paes_s390.c offset = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? 16 : 0; pk 457 arch/s390/crypto/paes_s390.c memcpy(pcc_param.key + offset, ctx->pk[1].protkey, keylen); pk 460 arch/s390/crypto/paes_s390.c memcpy(xts_param.key + offset, ctx->pk[0].protkey, keylen); pk 543 arch/s390/crypto/paes_s390.c if (__paes_convert_key(&ctx->kb, &ctx->pk)) pk 547 arch/s390/crypto/paes_s390.c fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KMCTR_PAES_128 : pk 548 arch/s390/crypto/paes_s390.c (ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KMCTR_PAES_192 : pk 549 arch/s390/crypto/paes_s390.c (ctx->pk.type == PKEY_KEYTYPE_AES_256) ? pk 607 arch/s390/crypto/paes_s390.c k = cpacf_kmctr(ctx->fc | modifier, ctx->pk.protkey, pk 633 arch/s390/crypto/paes_s390.c ctx->pk.protkey, buf, pk 79 arch/s390/kernel/suspend.c struct page_key_data *pk; pk 84 arch/s390/kernel/suspend.c pk = (struct page_key_data *) get_zeroed_page(GFP_KERNEL); pk 85 arch/s390/kernel/suspend.c if (!pk) { pk 89 arch/s390/kernel/suspend.c pk->next = page_key_data; pk 90 arch/s390/kernel/suspend.c page_key_data = pk; pk 596 arch/x86/include/asm/fpu/internal.h struct pkru_state *pk; pk 611 arch/x86/include/asm/fpu/internal.h pk = get_xsave_addr(&new_fpu->state.xsave, XFEATURE_PKRU); pk 612 arch/x86/include/asm/fpu/internal.h if (pk) pk 613 arch/x86/include/asm/fpu/internal.h pkru_val = pk->pkru; pk 138 arch/x86/include/asm/pgtable.h struct pkru_state *pk; pk 143 arch/x86/include/asm/pgtable.h pk = get_xsave_addr(¤t->thread.fpu.state.xsave, XFEATURE_PKRU); pk 151 arch/x86/include/asm/pgtable.h if (pk) pk 152 arch/x86/include/asm/pgtable.h pk->pkru = pkru; pk 447 arch/x86/kernel/cpu/common.c struct pkru_state *pk; pk 459 arch/x86/kernel/cpu/common.c pk = get_xsave_addr(&init_fpstate.xsave, XFEATURE_PKRU); pk 460 arch/x86/kernel/cpu/common.c if (pk) pk 461 arch/x86/kernel/cpu/common.c pk->pkru = init_pkru_value; pk 157 arch/x86/mm/pkeys.c struct pkru_state *pk; pk 180 arch/x86/mm/pkeys.c pk = get_xsave_addr(&init_fpstate.xsave, XFEATURE_PKRU); pk 181 arch/x86/mm/pkeys.c if (!pk) pk 183 arch/x86/mm/pkeys.c pk->pkru = new_init_pkru; pk 328 crypto/asymmetric_keys/public_key.c const struct public_key *pk = key->payload.data[asym_crypto]; pk 329 crypto/asymmetric_keys/public_key.c return public_key_verify_signature(pk, sig); pk 1389 crypto/ecc.c struct ecc_point *pk; pk 1400 crypto/ecc.c pk = ecc_alloc_point(ndigits); pk 1401 crypto/ecc.c if (!pk) { pk 1406 crypto/ecc.c ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); pk 1407 crypto/ecc.c if (ecc_point_is_zero(pk)) { pk 1412 crypto/ecc.c ecc_swap_digits(pk->x, public_key, ndigits); pk 1413 crypto/ecc.c ecc_swap_digits(pk->y, &public_key[ndigits], ndigits); pk 1416 crypto/ecc.c ecc_free_point(pk); pk 1424 crypto/ecc.c struct ecc_point *pk) pk 1428 crypto/ecc.c if (WARN_ON(pk->ndigits != curve->g.ndigits)) pk 1432 crypto/ecc.c if (ecc_point_is_zero(pk)) pk 1436 crypto/ecc.c if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1) pk 1438 crypto/ecc.c if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1) pk 1442 crypto/ecc.c vli_mod_square_fast(yy, pk->y, curve->p, pk->ndigits); /* y^2 */ pk 1443 crypto/ecc.c vli_mod_square_fast(xxx, pk->x, curve->p, pk->ndigits); /* x^2 */ pk 1444 crypto/ecc.c vli_mod_mult_fast(xxx, xxx, pk->x, curve->p, pk->ndigits); /* x^3 */ pk 1445 crypto/ecc.c vli_mod_mult_fast(w, curve->a, pk->x, curve->p, pk->ndigits); /* a·x */ pk 1446 crypto/ecc.c vli_mod_add(w, w, curve->b, curve->p, pk->ndigits); /* a·x + b */ pk 1447 crypto/ecc.c vli_mod_add(w, w, xxx, curve->p, pk->ndigits); /* x^3 + a·x + b */ pk 1448 crypto/ecc.c if (vli_cmp(yy, w, pk->ndigits) != 0) /* Equation */ pk 1460 crypto/ecc.c struct ecc_point *product, *pk; pk 1476 crypto/ecc.c pk = ecc_alloc_point(ndigits); pk 1477 crypto/ecc.c if (!pk) { pk 1482 crypto/ecc.c ecc_swap_digits(public_key, pk->x, ndigits); pk 1483 crypto/ecc.c ecc_swap_digits(&public_key[ndigits], pk->y, ndigits); pk 1484 crypto/ecc.c ret = ecc_is_pubkey_valid_partial(curve, pk); pk 1496 crypto/ecc.c ecc_point_mult(product, pk, priv, rand_z, curve, ndigits); pk 1505 crypto/ecc.c ecc_free_point(pk); pk 148 crypto/ecc.h struct ecc_point *pk); pk 53 drivers/hid/hid-prodikeys.c struct pk_device *pk; pk 103 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 105 drivers/hid/hid-prodikeys.c dbg_hid("pcmidi sysfs read channel=%u\n", pk->pm->midi_channel); pk 107 drivers/hid/hid-prodikeys.c return sprintf(buf, "%u (min:%u, max:%u)\n", pk->pm->midi_channel, pk 116 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 122 drivers/hid/hid-prodikeys.c pk->pm->midi_channel = channel; pk 140 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 142 drivers/hid/hid-prodikeys.c dbg_hid("pcmidi sysfs read sustain=%u\n", pk->pm->midi_sustain); pk 144 drivers/hid/hid-prodikeys.c return sprintf(buf, "%u (off:%u, max:%u (ms))\n", pk->pm->midi_sustain, pk 153 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 159 drivers/hid/hid-prodikeys.c pk->pm->midi_sustain = sustain; pk 160 drivers/hid/hid-prodikeys.c pk->pm->midi_sustain_mode = pk 161 drivers/hid/hid-prodikeys.c (0 == sustain || !pk->pm->midi_mode) ? 0 : 1; pk 179 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 181 drivers/hid/hid-prodikeys.c dbg_hid("pcmidi sysfs read octave=%d\n", pk->pm->midi_octave); pk 183 drivers/hid/hid-prodikeys.c return sprintf(buf, "%d (min:%d, max:%d)\n", pk->pm->midi_octave, pk 192 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 199 drivers/hid/hid-prodikeys.c pk->pm->midi_octave = octave; pk 273 drivers/hid/hid-prodikeys.c struct hid_device *hdev = pm->pk->hdev; pk 298 drivers/hid/hid-prodikeys.c struct hid_device *hdev = pm->pk->hdev; pk 625 drivers/hid/hid-prodikeys.c err = snd_card_new(&pm->pk->hdev->dev, index[dev], id[dev], pk 663 drivers/hid/hid-prodikeys.c err = device_create_file(&pm->pk->hdev->dev, pk 671 drivers/hid/hid-prodikeys.c err = device_create_file(&pm->pk->hdev->dev, pk 679 drivers/hid/hid-prodikeys.c err = device_create_file(&pm->pk->hdev->dev, pk 709 drivers/hid/hid-prodikeys.c device_remove_file(&pm->pk->hdev->dev, sysfs_device_attr_octave); pk 711 drivers/hid/hid-prodikeys.c device_remove_file(&pm->pk->hdev->dev, sysfs_device_attr_sustain); pk 713 drivers/hid/hid-prodikeys.c device_remove_file(&pm->pk->hdev->dev, sysfs_device_attr_channel); pk 727 drivers/hid/hid-prodikeys.c device_remove_file(&pm->pk->hdev->dev, pk 729 drivers/hid/hid-prodikeys.c device_remove_file(&pm->pk->hdev->dev, pk 731 drivers/hid/hid-prodikeys.c device_remove_file(&pm->pk->hdev->dev, pk 762 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 765 drivers/hid/hid-prodikeys.c pm = pk->pm; pk 780 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 783 drivers/hid/hid-prodikeys.c if (1 == pk->pm->ifnum) { pk 789 drivers/hid/hid-prodikeys.c ret = pcmidi_handle_report(pk->pm, pk 804 drivers/hid/hid-prodikeys.c struct pk_device *pk; pk 807 drivers/hid/hid-prodikeys.c pk = kzalloc(sizeof(*pk), GFP_KERNEL); pk 808 drivers/hid/hid-prodikeys.c if (pk == NULL) { pk 813 drivers/hid/hid-prodikeys.c pk->hdev = hdev; pk 822 drivers/hid/hid-prodikeys.c pm->pk = pk; pk 823 drivers/hid/hid-prodikeys.c pk->pm = pm; pk 826 drivers/hid/hid-prodikeys.c hid_set_drvdata(hdev, pk); pk 854 drivers/hid/hid-prodikeys.c kfree(pk); pk 861 drivers/hid/hid-prodikeys.c struct pk_device *pk = hid_get_drvdata(hdev); pk 864 drivers/hid/hid-prodikeys.c pm = pk->pm; pk 872 drivers/hid/hid-prodikeys.c kfree(pk); pk 660 fs/btrfs/file-item.c struct btrfs_key pk; pk 662 fs/btrfs/file-item.c btrfs_item_key_to_cpu(leaf, &pk, slot); pk 663 fs/btrfs/file-item.c if (pk.offset < bytenr || pk 664 fs/btrfs/file-item.c pk.type != BTRFS_EXTENT_CSUM_KEY || pk 665 fs/btrfs/file-item.c pk.objectid != pk 670 fs/btrfs/file-item.c key.offset = pk.offset; pk 3538 net/bluetooth/smp.c u8 pk[64]; pk 3545 net/bluetooth/smp.c err = generate_ecdh_public_key(tfm_ecdh, pk); pk 3549 net/bluetooth/smp.c if (crypto_memneq(pk, debug_pk, 64))