Home
last modified time | relevance | path

Searched refs:opsize (Results 1 – 11 of 11) sorted by relevance

/linux-6.12.1/drivers/crypto/starfive/
Djh7110-rsa.c79 u8 opsize; in starfive_rsa_montgomery_form() local
81 opsize = (bit_len - 1) >> 5; in starfive_rsa_montgomery_form()
86 for (loop = 0; loop <= opsize; loop++) in starfive_rsa_montgomery_form()
87 writel(mod[opsize - loop], cryp->base + STARFIVE_PKA_CANR_OFFSET + loop * 4); in starfive_rsa_montgomery_form()
92 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form()
93 rctx->csr.pka.exposize = opsize; in starfive_rsa_montgomery_form()
104 for (loop = 0; loop <= opsize; loop++) in starfive_rsa_montgomery_form()
105 writel(in[opsize - loop], cryp->base + STARFIVE_PKA_CAAR_OFFSET + loop * 4); in starfive_rsa_montgomery_form()
109 for (loop = 1; loop <= opsize; loop++) in starfive_rsa_montgomery_form()
114 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form()
[all …]
Djh7110-cryp.h120 u32 opsize :6; member
/linux-6.12.1/net/mptcp/
Doptions.c24 const unsigned char *ptr, int opsize, in mptcp_parse_option() argument
63 if (opsize != expected_opsize && in mptcp_parse_option()
65 opsize != TCPOLEN_MPTCP_MPC_ACK_DATA_CSUM)) in mptcp_parse_option()
70 if (opsize != TCPOLEN_MPTCP_MPC_SYN) { in mptcp_parse_option()
94 if (opsize >= TCPOLEN_MPTCP_MPC_SYNACK) { in mptcp_parse_option()
98 if (opsize >= TCPOLEN_MPTCP_MPC_ACK) { in mptcp_parse_option()
102 if (opsize >= TCPOLEN_MPTCP_MPC_ACK_DATA) { in mptcp_parse_option()
115 if (opsize == TCPOLEN_MPTCP_MPC_ACK_DATA_CSUM) { in mptcp_parse_option()
121 version, flags, opsize, mp_opt->sndr_key, in mptcp_parse_option()
126 if (opsize == TCPOLEN_MPTCP_MPJ_SYN) { in mptcp_parse_option()
[all …]
/linux-6.12.1/arch/s390/kernel/
Ddis.c510 int start, end, opsize, hops, i; in show_code() local
545 opsize = insn_length(code[start]); in show_code()
546 if (start + opsize == 32) in show_code()
554 if (start + opsize >= end) in show_code()
556 for (i = 0; i < opsize; i++) in show_code()
562 start += opsize; in show_code()
574 int opsize, i; in print_fn_code() local
578 opsize = insn_length(*code); in print_fn_code()
579 if (opsize > len) in print_fn_code()
582 for (i = 0; i < opsize; i++) in print_fn_code()
[all …]
/linux-6.12.1/tools/testing/selftests/bpf/progs/
Dtest_tcp_custom_syncookie.c222 __u8 *opcode, *opsize, *wscale; in tcp_parse_option() local
238 opsize = next(ctx, 1); in tcp_parse_option()
239 if (!opsize) in tcp_parse_option()
242 if (*opsize < 2) in tcp_parse_option()
248 if (*opsize == TCPOLEN_MSS && ctx->tcp->syn && mss) in tcp_parse_option()
253 if (*opsize == TCPOLEN_WINDOW && ctx->tcp->syn && wscale) { in tcp_parse_option()
261 if (*opsize == TCPOLEN_TIMESTAMP && tsval && tsecr) { in tcp_parse_option()
272 if (*opsize == TCPOLEN_SACK_PERM && ctx->tcp->syn) in tcp_parse_option()
277 ctx->off = off + *opsize; in tcp_parse_option()
Dxdp_synproxy_kern.c220 __u8 *opcode, *opsize, *wscale, *tsecr; in tscookie_tcpopt_parse() local
232 opsize = next(ctx, 1); in tscookie_tcpopt_parse()
233 if (!opsize || *opsize < 2) in tscookie_tcpopt_parse()
241 if (*opsize == TCPOLEN_WINDOW) in tscookie_tcpopt_parse()
248 if (*opsize == TCPOLEN_TIMESTAMP) { in tscookie_tcpopt_parse()
255 if (*opsize == TCPOLEN_SACK_PERM) in tscookie_tcpopt_parse()
260 ctx->off = off + *opsize; in tscookie_tcpopt_parse()
/linux-6.12.1/net/netfilter/
Dnf_conntrack_proto_tcp.c355 int opsize; in tcp_options() local
366 opsize=*ptr++; in tcp_options()
367 if (opsize < 2) /* "silly options" */ in tcp_options()
369 if (opsize > length) in tcp_options()
373 && opsize == TCPOLEN_SACK_PERM) in tcp_options()
376 && opsize == TCPOLEN_WINDOW) { in tcp_options()
385 ptr += opsize - 2; in tcp_options()
386 length -= opsize; in tcp_options()
417 int opsize, i; in tcp_sack() local
428 opsize = *ptr++; in tcp_sack()
[all …]
Dnf_synproxy_core.c44 int opsize; in synproxy_parse_options() local
55 opsize = *ptr++; in synproxy_parse_options()
56 if (opsize < 2) in synproxy_parse_options()
58 if (opsize > length) in synproxy_parse_options()
63 if (opsize == TCPOLEN_MSS) { in synproxy_parse_options()
69 if (opsize == TCPOLEN_WINDOW) { in synproxy_parse_options()
77 if (opsize == TCPOLEN_TIMESTAMP) { in synproxy_parse_options()
84 if (opsize == TCPOLEN_SACK_PERM) in synproxy_parse_options()
89 ptr += opsize - 2; in synproxy_parse_options()
90 length -= opsize; in synproxy_parse_options()
/linux-6.12.1/net/sched/
Dsch_cake.c949 int opsize; in cake_get_tcpopt() local
959 opsize = *ptr++; in cake_get_tcpopt()
960 if (opsize < 2 || opsize > length) in cake_get_tcpopt()
964 *oplen = opsize; in cake_get_tcpopt()
968 ptr += opsize - 2; in cake_get_tcpopt()
969 length -= opsize; in cake_get_tcpopt()
1056 int opsize; in cake_tcph_get_tstamp() local
1058 ptr = cake_get_tcpopt(tcph, TCPOPT_TIMESTAMP, &opsize); in cake_tcph_get_tstamp()
1060 if (ptr && opsize == TCPOLEN_TIMESTAMP) { in cake_tcph_get_tstamp()
1088 int opsize; in cake_tcph_may_drop() local
[all …]
/linux-6.12.1/net/ipv4/
Dtcp_input.c4120 int opsize) in smc_parse_options() argument
4124 if (th->syn && !(opsize & 1) && in smc_parse_options()
4125 opsize >= TCPOLEN_EXP_SMC_BASE && in smc_parse_options()
4146 int opsize; in tcp_parse_mss_option() local
4157 opsize = *ptr++; in tcp_parse_mss_option()
4158 if (opsize < 2) /* "silly options" */ in tcp_parse_mss_option()
4160 if (opsize > length) in tcp_parse_mss_option()
4162 if (opcode == TCPOPT_MSS && opsize == TCPOLEN_MSS) { in tcp_parse_mss_option()
4171 ptr += opsize - 2; in tcp_parse_mss_option()
4172 length -= opsize; in tcp_parse_mss_option()
[all …]
/linux-6.12.1/arch/m68k/ifpsp060/src/
Dpfpsp.S3925 cmpi.b %d0,&0xc # is opsize ext or packed?