Searched refs:opsize (Results 1 – 11 of 11) sorted by relevance
| /linux/drivers/crypto/starfive/ |
| A D | jh7110-rsa.c | 79 u8 opsize; in starfive_rsa_montgomery_form() local 81 opsize = (bit_len - 1) >> 5; in starfive_rsa_montgomery_form() 92 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form() 114 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form() 127 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form() 148 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form() 162 out[opsize - loop] = temp; in starfive_rsa_montgomery_form() 176 int opsize, mlen, loop; in starfive_rsa_cpu_start() local 179 opsize = (key_sz - 1) >> 2; in starfive_rsa_cpu_start() 201 rctx->csr.pka.opsize = opsize; in starfive_rsa_cpu_start() [all …]
|
| A D | jh7110-cryp.h | 120 u32 opsize :6; member
|
| /linux/net/mptcp/ |
| A D | options.c | 63 if (opsize != expected_opsize && in mptcp_parse_option() 70 if (opsize != TCPOLEN_MPTCP_MPC_SYN) { in mptcp_parse_option() 196 if (opsize != expected_opsize && in mptcp_parse_option() 316 if (opsize != TCPOLEN_MPTCP_PRIO) in mptcp_parse_option() 336 if (opsize != TCPOLEN_MPTCP_RST) in mptcp_parse_option() 351 if (opsize != TCPOLEN_MPTCP_FAIL) in mptcp_parse_option() 380 int opsize; in mptcp_get_options() local 391 opsize = *ptr++; in mptcp_get_options() 394 if (opsize > length) in mptcp_get_options() 398 ptr += opsize - 2; in mptcp_get_options() [all …]
|
| /linux/arch/s390/kernel/ |
| A D | dis.c | 510 int start, end, opsize, hops, i; in show_code() local 546 if (start + opsize == 32) in show_code() 554 if (start + opsize >= end) in show_code() 556 for (i = 0; i < opsize; i++) in show_code() 562 start += opsize; in show_code() 574 int opsize, i; in print_fn_code() local 578 opsize = insn_length(*code); in print_fn_code() 579 if (opsize > len) in print_fn_code() 582 for (i = 0; i < opsize; i++) in print_fn_code() 591 code += opsize; in print_fn_code() [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| A D | test_tcp_custom_syncookie.c | 222 __u8 *opcode, *opsize, *wscale; in tcp_parse_option() local 238 opsize = next(ctx, 1); in tcp_parse_option() 239 if (!opsize) in tcp_parse_option() 242 if (*opsize < 2) in tcp_parse_option() 248 if (*opsize == TCPOLEN_MSS && ctx->tcp->syn && mss) in tcp_parse_option() 253 if (*opsize == TCPOLEN_WINDOW && ctx->tcp->syn && wscale) { in tcp_parse_option() 261 if (*opsize == TCPOLEN_TIMESTAMP && tsval && tsecr) { in tcp_parse_option() 272 if (*opsize == TCPOLEN_SACK_PERM && ctx->tcp->syn) in tcp_parse_option() 277 ctx->off = off + *opsize; in tcp_parse_option()
|
| A D | xdp_synproxy_kern.c | 220 __u8 *opcode, *opsize, *wscale, *tsecr; in tscookie_tcpopt_parse() local 232 opsize = next(ctx, 1); in tscookie_tcpopt_parse() 233 if (!opsize || *opsize < 2) in tscookie_tcpopt_parse() 241 if (*opsize == TCPOLEN_WINDOW) in tscookie_tcpopt_parse() 248 if (*opsize == TCPOLEN_TIMESTAMP) { in tscookie_tcpopt_parse() 255 if (*opsize == TCPOLEN_SACK_PERM) in tscookie_tcpopt_parse() 260 ctx->off = off + *opsize; in tscookie_tcpopt_parse()
|
| /linux/net/netfilter/ |
| A D | nf_conntrack_proto_tcp.c | 355 int opsize; in tcp_options() local 366 opsize=*ptr++; in tcp_options() 369 if (opsize > length) in tcp_options() 376 && opsize == TCPOLEN_WINDOW) { in tcp_options() 385 ptr += opsize - 2; in tcp_options() 386 length -= opsize; in tcp_options() 417 int opsize, i; in tcp_sack() local 428 opsize = *ptr++; in tcp_sack() 431 if (opsize > length) in tcp_sack() 449 ptr += opsize - 2; in tcp_sack() [all …]
|
| A D | nf_synproxy_core.c | 44 int opsize; in synproxy_parse_options() local 55 opsize = *ptr++; in synproxy_parse_options() 56 if (opsize < 2) in synproxy_parse_options() 58 if (opsize > length) in synproxy_parse_options() 63 if (opsize == TCPOLEN_MSS) { in synproxy_parse_options() 69 if (opsize == TCPOLEN_WINDOW) { in synproxy_parse_options() 77 if (opsize == TCPOLEN_TIMESTAMP) { in synproxy_parse_options() 84 if (opsize == TCPOLEN_SACK_PERM) in synproxy_parse_options() 89 ptr += opsize - 2; in synproxy_parse_options() 90 length -= opsize; in synproxy_parse_options()
|
| /linux/net/sched/ |
| A D | sch_cake.c | 949 int opsize; in cake_get_tcpopt() local 959 opsize = *ptr++; in cake_get_tcpopt() 960 if (opsize < 2 || opsize > length) in cake_get_tcpopt() 964 *oplen = opsize; in cake_get_tcpopt() 968 ptr += opsize - 2; in cake_get_tcpopt() 969 length -= opsize; in cake_get_tcpopt() 1056 int opsize; in cake_tcph_get_tstamp() local 1088 int opsize; in cake_tcph_may_drop() local 1098 opsize = *ptr++; in cake_tcph_may_drop() 1099 if (opsize < 2 || opsize > length) in cake_tcph_may_drop() [all …]
|
| /linux/net/ipv4/ |
| A D | tcp_input.c | 4120 int opsize) in smc_parse_options() argument 4146 int opsize; in tcp_parse_mss_option() local 4157 opsize = *ptr++; in tcp_parse_mss_option() 4172 length -= opsize; in tcp_parse_mss_option() 4198 int opsize; in tcp_parse_options() local 4209 opsize = *ptr++; in tcp_parse_options() 4307 ptr += opsize-2; in tcp_parse_options() 4379 int opsize; in tcp_do_parse_auth_options() local 4388 opsize = *ptr++; in tcp_do_parse_auth_options() 4389 if (opsize < 2 || opsize > length) in tcp_do_parse_auth_options() [all …]
|
| /linux/arch/m68k/ifpsp060/src/ |
| A D | pfpsp.S | 3925 cmpi.b %d0,&0xc # is opsize ext or packed?
|
Completed in 52 milliseconds