| /OK3568_Linux_fs/kernel/drivers/dma/ |
| H A D | dma-axi-dmac.c | 99 unsigned int x_len; member 269 axi_dmac_write(dmac, AXI_DMAC_REG_X_LENGTH, sg->x_len - 1); in axi_dmac_start_transfer() 285 return sg->x_len * sg->y_len; in axi_dmac_total_sg_bytes() 287 return sg->x_len; in axi_dmac_total_sg_bytes() 515 sg->x_len = segment_size; in axi_dmac_fill_linear_sg() 526 sg->x_len = len; in axi_dmac_fill_linear_sg() 668 desc->sg[0].x_len = xt->sgl[0].size; in axi_dmac_prep_interleaved() 671 desc->sg[0].x_len = xt->sgl[0].size * xt->numf; in axi_dmac_prep_interleaved()
|
| /OK3568_Linux_fs/kernel/drivers/input/touchscreen/ |
| H A D | usbtouchscreen.c | 910 __be16 x_len; /* bytes for X axis */ member 1050 unsigned int x_len = be16_to_cpu(packet->x_len); in nexio_read_data() local 1060 if (x_len > 0xff) in nexio_read_data() 1061 x_len -= 0x80; in nexio_read_data() 1067 usbtouch->type->max_xc = 2 * x_len; in nexio_read_data() 1082 for (x = 0; x < x_len; x++) { in nexio_read_data() 1089 for (y = x_len; y < data_len; y++) { in nexio_read_data() 1091 begin_y = y - x_len; in nexio_read_data() 1096 end_y = y - 1 - x_len; in nexio_read_data()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/ |
| H A D | rk_crypto_api.c | 219 ec_key->x_len = key_size_bytes; in rk_gen_ec_key() 1865 key->d_len, key->x_len, key->y_len); in rk_ecdsa_sign() 1872 TEE_InitRefAttribute(&attr[0], TEE_ATTR_ECC_PUBLIC_VALUE_X, key->x, key->x_len); in rk_ecdsa_sign() 1948 key->d_len, key->x_len, key->y_len); in rk_sm2_pke() 1969 TEE_InitRefAttribute(&attr[0], TEE_ATTR_ECC_PUBLIC_VALUE_X, key->x, key->x_len); in rk_sm2_pke() 2044 key->d_len, key->x_len, key->y_len); in rk_sm2_dsa_sm3() 2065 TEE_InitRefAttribute(&attr[0], TEE_ATTR_ECC_PUBLIC_VALUE_X, key->x, key->x_len); in rk_sm2_dsa_sm3() 2170 my_key->x, my_key->x_len); in rk_sm2_kep_genkey() 2200 my_eph_key->x, my_eph_key->x_len); in rk_sm2_kep_genkey() 2237 pub_B->x, pub_B->x_len); in rk_sm2_kep_genkey() [all …]
|
| H A D | rk_crypto_api.h | 62 uint32_t x_len; member 72 uint32_t x_len; member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/ta/rk_public_api/ |
| H A D | rk_crypto_api.h | 60 uint32_t x_len; member 70 uint32_t x_len; member
|
| H A D | rk_crypto_api.c | 219 ec_key->x_len = key_size_bytes; in rk_gen_ec_key() 1789 key->d_len, key->x_len, key->y_len); in rk_ecdsa_sign() 1796 TEE_InitRefAttribute(&attr[0], TEE_ATTR_ECC_PUBLIC_VALUE_X, key->x, key->x_len); in rk_ecdsa_sign() 1874 key->d_len, key->x_len, key->y_len); in rk_ecdsa_begin() 1881 TEE_InitRefAttribute(&attr[0], TEE_ATTR_ECC_PUBLIC_VALUE_X, key->x, key->x_len); in rk_ecdsa_begin()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/caam/ |
| H A D | pdb.h | 401 u8 x_len; member 416 u8 x_len; member
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/include/c_mode/ |
| H A D | ecp.h | 58 unsigned int x_len; member
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | ccp.h | 529 unsigned int x_len; /* In bytes */ member
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/ |
| H A D | ecdsa.c | 541 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.X, key->x, key->x_len) ); in rk_ecdsa_verify() 640 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &pub_key.X, key->x, key->x_len) ); in rk_ecdsa_verify2()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ccp/ |
| H A D | ccp-ops.c | 2276 (ecc->u.pm.point_1.x_len > CCP_ECC_MODULUS_BYTES) || in ccp_run_ecc_pm_cmd() 2283 (ecc->u.pm.point_2.x_len > CCP_ECC_MODULUS_BYTES) || in ccp_run_ecc_pm_cmd() 2299 (ecc->u.pm.result.x_len < CCP_ECC_MODULUS_BYTES) || in ccp_run_ecc_pm_cmd() 2331 ecc->u.pm.point_1.x_len); in ccp_run_ecc_pm_cmd() 2348 ecc->u.pm.point_2.x_len); in ccp_run_ecc_pm_cmd()
|