pk                 95 arch/ia64/include/asm/processor.h 	__u64 pk : 1;
pk                 83 arch/s390/crypto/paes_s390.c 	struct pkey_protkey pk;
pk                 89 arch/s390/crypto/paes_s390.c 	struct pkey_protkey pk[2];
pk                 94 arch/s390/crypto/paes_s390.c 				     struct pkey_protkey *pk)
pk                100 arch/s390/crypto/paes_s390.c 		ret = pkey_keyblob2pkey(kb->key, kb->keylen, pk);
pk                112 arch/s390/crypto/paes_s390.c 	if (__paes_convert_key(&ctx->kb, &ctx->pk))
pk                116 arch/s390/crypto/paes_s390.c 	fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PAES_128 :
pk                117 arch/s390/crypto/paes_s390.c 		(ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KM_PAES_192 :
pk                118 arch/s390/crypto/paes_s390.c 		(ctx->pk.type == PKEY_KEYTYPE_AES_256) ? CPACF_KM_PAES_256 : 0;
pk                172 arch/s390/crypto/paes_s390.c 		k = cpacf_km(ctx->fc | modifier, ctx->pk.protkey,
pk                247 arch/s390/crypto/paes_s390.c 	if (__paes_convert_key(&ctx->kb, &ctx->pk))
pk                251 arch/s390/crypto/paes_s390.c 	fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KMC_PAES_128 :
pk                252 arch/s390/crypto/paes_s390.c 		(ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KMC_PAES_192 :
pk                253 arch/s390/crypto/paes_s390.c 		(ctx->pk.type == PKEY_KEYTYPE_AES_256) ? CPACF_KMC_PAES_256 : 0;
pk                292 arch/s390/crypto/paes_s390.c 	memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE);
pk                303 arch/s390/crypto/paes_s390.c 			memcpy(param.key, ctx->pk.protkey, MAXPROTKEYSIZE);
pk                376 arch/s390/crypto/paes_s390.c 	if (__paes_convert_key(&ctx->kb[0], &ctx->pk[0]) ||
pk                377 arch/s390/crypto/paes_s390.c 	    __paes_convert_key(&ctx->kb[1], &ctx->pk[1]))
pk                380 arch/s390/crypto/paes_s390.c 	if (ctx->pk[0].type != ctx->pk[1].type)
pk                384 arch/s390/crypto/paes_s390.c 	fc = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PXTS_128 :
pk                385 arch/s390/crypto/paes_s390.c 		(ctx->pk[0].type == PKEY_KEYTYPE_AES_256) ?
pk                426 arch/s390/crypto/paes_s390.c 	ckey_len = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ?
pk                428 arch/s390/crypto/paes_s390.c 	memcpy(ckey, ctx->pk[0].protkey, ckey_len);
pk                429 arch/s390/crypto/paes_s390.c 	memcpy(ckey + ckey_len, ctx->pk[1].protkey, ckey_len);
pk                452 arch/s390/crypto/paes_s390.c 	keylen = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? 48 : 64;
pk                453 arch/s390/crypto/paes_s390.c 	offset = (ctx->pk[0].type == PKEY_KEYTYPE_AES_128) ? 16 : 0;
pk                457 arch/s390/crypto/paes_s390.c 	memcpy(pcc_param.key + offset, ctx->pk[1].protkey, keylen);
pk                460 arch/s390/crypto/paes_s390.c 	memcpy(xts_param.key + offset, ctx->pk[0].protkey, keylen);
pk                543 arch/s390/crypto/paes_s390.c 	if (__paes_convert_key(&ctx->kb, &ctx->pk))
pk                547 arch/s390/crypto/paes_s390.c 	fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KMCTR_PAES_128 :
pk                548 arch/s390/crypto/paes_s390.c 		(ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KMCTR_PAES_192 :
pk                549 arch/s390/crypto/paes_s390.c 		(ctx->pk.type == PKEY_KEYTYPE_AES_256) ?
pk                607 arch/s390/crypto/paes_s390.c 		k = cpacf_kmctr(ctx->fc | modifier, ctx->pk.protkey,
pk                633 arch/s390/crypto/paes_s390.c 					ctx->pk.protkey, buf,
pk                 79 arch/s390/kernel/suspend.c 	struct page_key_data *pk;
pk                 84 arch/s390/kernel/suspend.c 		pk = (struct page_key_data *) get_zeroed_page(GFP_KERNEL);
pk                 85 arch/s390/kernel/suspend.c 		if (!pk) {
pk                 89 arch/s390/kernel/suspend.c 		pk->next = page_key_data;
pk                 90 arch/s390/kernel/suspend.c 		page_key_data = pk;
pk                596 arch/x86/include/asm/fpu/internal.h 	struct pkru_state *pk;
pk                611 arch/x86/include/asm/fpu/internal.h 		pk = get_xsave_addr(&new_fpu->state.xsave, XFEATURE_PKRU);
pk                612 arch/x86/include/asm/fpu/internal.h 		if (pk)
pk                613 arch/x86/include/asm/fpu/internal.h 			pkru_val = pk->pkru;
pk                138 arch/x86/include/asm/pgtable.h 	struct pkru_state *pk;
pk                143 arch/x86/include/asm/pgtable.h 	pk = get_xsave_addr(&current->thread.fpu.state.xsave, XFEATURE_PKRU);
pk                151 arch/x86/include/asm/pgtable.h 	if (pk)
pk                152 arch/x86/include/asm/pgtable.h 		pk->pkru = pkru;
pk                447 arch/x86/kernel/cpu/common.c 	struct pkru_state *pk;
pk                459 arch/x86/kernel/cpu/common.c 	pk = get_xsave_addr(&init_fpstate.xsave, XFEATURE_PKRU);
pk                460 arch/x86/kernel/cpu/common.c 	if (pk)
pk                461 arch/x86/kernel/cpu/common.c 		pk->pkru = init_pkru_value;
pk                157 arch/x86/mm/pkeys.c 	struct pkru_state *pk;
pk                180 arch/x86/mm/pkeys.c 	pk = get_xsave_addr(&init_fpstate.xsave, XFEATURE_PKRU);
pk                181 arch/x86/mm/pkeys.c 	if (!pk)
pk                183 arch/x86/mm/pkeys.c 	pk->pkru = new_init_pkru;
pk                328 crypto/asymmetric_keys/public_key.c 	const struct public_key *pk = key->payload.data[asym_crypto];
pk                329 crypto/asymmetric_keys/public_key.c 	return public_key_verify_signature(pk, sig);
pk               1389 crypto/ecc.c   	struct ecc_point *pk;
pk               1400 crypto/ecc.c   	pk = ecc_alloc_point(ndigits);
pk               1401 crypto/ecc.c   	if (!pk) {
pk               1406 crypto/ecc.c   	ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits);
pk               1407 crypto/ecc.c   	if (ecc_point_is_zero(pk)) {
pk               1412 crypto/ecc.c   	ecc_swap_digits(pk->x, public_key, ndigits);
pk               1413 crypto/ecc.c   	ecc_swap_digits(pk->y, &public_key[ndigits], ndigits);
pk               1416 crypto/ecc.c   	ecc_free_point(pk);
pk               1424 crypto/ecc.c   				struct ecc_point *pk)
pk               1428 crypto/ecc.c   	if (WARN_ON(pk->ndigits != curve->g.ndigits))
pk               1432 crypto/ecc.c   	if (ecc_point_is_zero(pk))
pk               1436 crypto/ecc.c   	if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1)
pk               1438 crypto/ecc.c   	if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1)
pk               1442 crypto/ecc.c   	vli_mod_square_fast(yy, pk->y, curve->p, pk->ndigits); /* y^2 */
pk               1443 crypto/ecc.c   	vli_mod_square_fast(xxx, pk->x, curve->p, pk->ndigits); /* x^2 */
pk               1444 crypto/ecc.c   	vli_mod_mult_fast(xxx, xxx, pk->x, curve->p, pk->ndigits); /* x^3 */
pk               1445 crypto/ecc.c   	vli_mod_mult_fast(w, curve->a, pk->x, curve->p, pk->ndigits); /* a·x */
pk               1446 crypto/ecc.c   	vli_mod_add(w, w, curve->b, curve->p, pk->ndigits); /* a·x + b */
pk               1447 crypto/ecc.c   	vli_mod_add(w, w, xxx, curve->p, pk->ndigits); /* x^3 + a·x + b */
pk               1448 crypto/ecc.c   	if (vli_cmp(yy, w, pk->ndigits) != 0) /* Equation */
pk               1460 crypto/ecc.c   	struct ecc_point *product, *pk;
pk               1476 crypto/ecc.c   	pk = ecc_alloc_point(ndigits);
pk               1477 crypto/ecc.c   	if (!pk) {
pk               1482 crypto/ecc.c   	ecc_swap_digits(public_key, pk->x, ndigits);
pk               1483 crypto/ecc.c   	ecc_swap_digits(&public_key[ndigits], pk->y, ndigits);
pk               1484 crypto/ecc.c   	ret = ecc_is_pubkey_valid_partial(curve, pk);
pk               1496 crypto/ecc.c   	ecc_point_mult(product, pk, priv, rand_z, curve, ndigits);
pk               1505 crypto/ecc.c   	ecc_free_point(pk);
pk                148 crypto/ecc.h   				struct ecc_point *pk);
pk                 53 drivers/hid/hid-prodikeys.c 	struct pk_device		*pk;
pk                103 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                105 drivers/hid/hid-prodikeys.c 	dbg_hid("pcmidi sysfs read channel=%u\n", pk->pm->midi_channel);
pk                107 drivers/hid/hid-prodikeys.c 	return sprintf(buf, "%u (min:%u, max:%u)\n", pk->pm->midi_channel,
pk                116 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                122 drivers/hid/hid-prodikeys.c 		pk->pm->midi_channel = channel;
pk                140 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                142 drivers/hid/hid-prodikeys.c 	dbg_hid("pcmidi sysfs read sustain=%u\n", pk->pm->midi_sustain);
pk                144 drivers/hid/hid-prodikeys.c 	return sprintf(buf, "%u (off:%u, max:%u (ms))\n", pk->pm->midi_sustain,
pk                153 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                159 drivers/hid/hid-prodikeys.c 		pk->pm->midi_sustain = sustain;
pk                160 drivers/hid/hid-prodikeys.c 		pk->pm->midi_sustain_mode =
pk                161 drivers/hid/hid-prodikeys.c 			(0 == sustain || !pk->pm->midi_mode) ? 0 : 1;
pk                179 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                181 drivers/hid/hid-prodikeys.c 	dbg_hid("pcmidi sysfs read octave=%d\n", pk->pm->midi_octave);
pk                183 drivers/hid/hid-prodikeys.c 	return sprintf(buf, "%d (min:%d, max:%d)\n", pk->pm->midi_octave,
pk                192 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                199 drivers/hid/hid-prodikeys.c 		pk->pm->midi_octave = octave;
pk                273 drivers/hid/hid-prodikeys.c 	struct hid_device *hdev = pm->pk->hdev;
pk                298 drivers/hid/hid-prodikeys.c 	struct hid_device *hdev = pm->pk->hdev;
pk                625 drivers/hid/hid-prodikeys.c 	err = snd_card_new(&pm->pk->hdev->dev, index[dev], id[dev],
pk                663 drivers/hid/hid-prodikeys.c 	err = device_create_file(&pm->pk->hdev->dev,
pk                671 drivers/hid/hid-prodikeys.c 	err = device_create_file(&pm->pk->hdev->dev,
pk                679 drivers/hid/hid-prodikeys.c 	err = device_create_file(&pm->pk->hdev->dev,
pk                709 drivers/hid/hid-prodikeys.c 	device_remove_file(&pm->pk->hdev->dev, sysfs_device_attr_octave);
pk                711 drivers/hid/hid-prodikeys.c 	device_remove_file(&pm->pk->hdev->dev, sysfs_device_attr_sustain);
pk                713 drivers/hid/hid-prodikeys.c 	device_remove_file(&pm->pk->hdev->dev, sysfs_device_attr_channel);
pk                727 drivers/hid/hid-prodikeys.c 		device_remove_file(&pm->pk->hdev->dev,
pk                729 drivers/hid/hid-prodikeys.c 		device_remove_file(&pm->pk->hdev->dev,
pk                731 drivers/hid/hid-prodikeys.c 		device_remove_file(&pm->pk->hdev->dev,
pk                762 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                765 drivers/hid/hid-prodikeys.c 	pm = pk->pm;
pk                780 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                783 drivers/hid/hid-prodikeys.c 	if (1 == pk->pm->ifnum) {
pk                789 drivers/hid/hid-prodikeys.c 				ret = pcmidi_handle_report(pk->pm,
pk                804 drivers/hid/hid-prodikeys.c 	struct pk_device *pk;
pk                807 drivers/hid/hid-prodikeys.c 	pk = kzalloc(sizeof(*pk), GFP_KERNEL);
pk                808 drivers/hid/hid-prodikeys.c 	if (pk == NULL) {
pk                813 drivers/hid/hid-prodikeys.c 	pk->hdev = hdev;
pk                822 drivers/hid/hid-prodikeys.c 	pm->pk = pk;
pk                823 drivers/hid/hid-prodikeys.c 	pk->pm = pm;
pk                826 drivers/hid/hid-prodikeys.c 	hid_set_drvdata(hdev, pk);
pk                854 drivers/hid/hid-prodikeys.c 	kfree(pk);
pk                861 drivers/hid/hid-prodikeys.c 	struct pk_device *pk = hid_get_drvdata(hdev);
pk                864 drivers/hid/hid-prodikeys.c 	pm = pk->pm;
pk                872 drivers/hid/hid-prodikeys.c 	kfree(pk);
pk                660 fs/btrfs/file-item.c 					struct btrfs_key pk;
pk                662 fs/btrfs/file-item.c 					btrfs_item_key_to_cpu(leaf, &pk, slot);
pk                663 fs/btrfs/file-item.c 					if (pk.offset < bytenr ||
pk                664 fs/btrfs/file-item.c 					    pk.type != BTRFS_EXTENT_CSUM_KEY ||
pk                665 fs/btrfs/file-item.c 					    pk.objectid !=
pk                670 fs/btrfs/file-item.c 					key.offset = pk.offset;
pk               3538 net/bluetooth/smp.c 	u8 pk[64];
pk               3545 net/bluetooth/smp.c 	err = generate_ecdh_public_key(tfm_ecdh, pk);
pk               3549 net/bluetooth/smp.c 	if (crypto_memneq(pk, debug_pk, 64))