/openbmc/qemu/target/m68k/ |
H A D | translate.c | 302 static inline TCGv gen_load(DisasContext *s, int opsize, TCGv addr, in gen_load() argument 307 switch (opsize) { in gen_load() 312 opsize | (sign ? MO_SIGN : 0) | MO_TE); in gen_load() 321 static inline void gen_store(DisasContext *s, int opsize, TCGv addr, TCGv val, in gen_store() argument 324 switch (opsize) { in gen_store() 328 tcg_gen_qemu_st_tl(val, addr, index, opsize | MO_TE); in gen_store() 345 static TCGv gen_ldst(DisasContext *s, int opsize, TCGv addr, TCGv val, in gen_ldst() argument 349 gen_store(s, opsize, addr, val, index); in gen_ldst() 352 return gen_load(s, opsize, addr, what == EA_LOADS, index); in gen_ldst() 517 static inline void gen_ext(TCGv res, TCGv val, int opsize, int sign) in gen_ext() argument [all …]
|
/openbmc/linux/drivers/crypto/starfive/ |
H A D | jh7110-rsa.c | 96 u8 opsize; in starfive_rsa_montgomery_form() local 98 opsize = (bit_len - 1) >> 5; in starfive_rsa_montgomery_form() 103 for (loop = 0; loop <= opsize; loop++) in starfive_rsa_montgomery_form() 104 writel(mod[opsize - loop], cryp->base + STARFIVE_PKA_CANR_OFFSET + loop * 4); in starfive_rsa_montgomery_form() 109 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form() 110 rctx->csr.pka.exposize = opsize; in starfive_rsa_montgomery_form() 122 for (loop = 0; loop <= opsize; loop++) in starfive_rsa_montgomery_form() 123 writel(in[opsize - loop], cryp->base + STARFIVE_PKA_CAAR_OFFSET + loop * 4); in starfive_rsa_montgomery_form() 127 for (loop = 1; loop <= opsize; loop++) in starfive_rsa_montgomery_form() 132 rctx->csr.pka.opsize = opsize; in starfive_rsa_montgomery_form() [all …]
|
H A D | jh7110-cryp.h | 121 u32 opsize :6; member
|
/openbmc/linux/net/mptcp/ |
H A D | options.c | 24 const unsigned char *ptr, int opsize, in mptcp_parse_option() argument 63 if (opsize != expected_opsize && in mptcp_parse_option() 65 opsize != TCPOLEN_MPTCP_MPC_ACK_DATA_CSUM)) in mptcp_parse_option() 70 if (opsize != TCPOLEN_MPTCP_MPC_SYN) { in mptcp_parse_option() 94 if (opsize >= TCPOLEN_MPTCP_MPC_SYNACK) { in mptcp_parse_option() 98 if (opsize >= TCPOLEN_MPTCP_MPC_ACK) { in mptcp_parse_option() 102 if (opsize >= TCPOLEN_MPTCP_MPC_ACK_DATA) { in mptcp_parse_option() 114 if (opsize == TCPOLEN_MPTCP_MPC_ACK_DATA_CSUM) { in mptcp_parse_option() 120 version, flags, opsize, mp_opt->sndr_key, in mptcp_parse_option() 125 if (opsize == TCPOLEN_MPTCP_MPJ_SYN) { in mptcp_parse_option() [all …]
|
/openbmc/linux/arch/s390/kernel/ |
H A D | dis.c | 506 int start, end, opsize, hops, i; in show_code() local 541 opsize = insn_length(code[start]); in show_code() 542 if (start + opsize == 32) in show_code() 550 if (start + opsize >= end) in show_code() 552 for (i = 0; i < opsize; i++) in show_code() 558 start += opsize; in show_code() 570 int opsize, i; in print_fn_code() local 574 opsize = insn_length(*code); in print_fn_code() 575 if (opsize > len) in print_fn_code() 578 for (i = 0; i < opsize; i++) in print_fn_code() [all …]
|
/openbmc/linux/net/netfilter/ |
H A D | nf_conntrack_proto_tcp.c | 355 int opsize; in tcp_options() local 366 opsize=*ptr++; in tcp_options() 367 if (opsize < 2) /* "silly options" */ in tcp_options() 369 if (opsize > length) in tcp_options() 373 && opsize == TCPOLEN_SACK_PERM) in tcp_options() 376 && opsize == TCPOLEN_WINDOW) { in tcp_options() 385 ptr += opsize - 2; in tcp_options() 386 length -= opsize; in tcp_options() 417 int opsize, i; in tcp_sack() local 428 opsize = *ptr++; in tcp_sack() [all …]
|
H A D | nf_synproxy_core.c | 44 int opsize; in synproxy_parse_options() local 55 opsize = *ptr++; in synproxy_parse_options() 56 if (opsize < 2) in synproxy_parse_options() 58 if (opsize > length) in synproxy_parse_options() 63 if (opsize == TCPOLEN_MSS) { in synproxy_parse_options() 69 if (opsize == TCPOLEN_WINDOW) { in synproxy_parse_options() 77 if (opsize == TCPOLEN_TIMESTAMP) { in synproxy_parse_options() 84 if (opsize == TCPOLEN_SACK_PERM) in synproxy_parse_options() 89 ptr += opsize - 2; in synproxy_parse_options() 90 length -= opsize; in synproxy_parse_options()
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | xdp_synproxy_kern.c | 217 __u8 *opcode, *opsize, *wscale, *tsecr; in tscookie_tcpopt_parse() local 229 opsize = next(ctx, 1); in tscookie_tcpopt_parse() 230 if (!opsize || *opsize < 2) in tscookie_tcpopt_parse() 238 if (*opsize == TCPOLEN_WINDOW) in tscookie_tcpopt_parse() 245 if (*opsize == TCPOLEN_TIMESTAMP) { in tscookie_tcpopt_parse() 252 if (*opsize == TCPOLEN_SACK_PERM) in tscookie_tcpopt_parse() 257 ctx->off = off + *opsize; in tscookie_tcpopt_parse()
|
/openbmc/linux/net/sched/ |
H A D | sch_cake.c | 1023 int opsize; in cake_get_tcpopt() local 1033 opsize = *ptr++; in cake_get_tcpopt() 1034 if (opsize < 2 || opsize > length) in cake_get_tcpopt() 1038 *oplen = opsize; in cake_get_tcpopt() 1042 ptr += opsize - 2; in cake_get_tcpopt() 1043 length -= opsize; in cake_get_tcpopt() 1130 int opsize; in cake_tcph_get_tstamp() local 1132 ptr = cake_get_tcpopt(tcph, TCPOPT_TIMESTAMP, &opsize); in cake_tcph_get_tstamp() 1134 if (ptr && opsize == TCPOLEN_TIMESTAMP) { in cake_tcph_get_tstamp() 1162 int opsize; in cake_tcph_may_drop() local [all …]
|
/openbmc/linux/net/ipv4/ |
H A D | tcp_input.c | 4080 int opsize) in smc_parse_options() argument 4084 if (th->syn && !(opsize & 1) && in smc_parse_options() 4085 opsize >= TCPOLEN_EXP_SMC_BASE && in smc_parse_options() 4106 int opsize; in tcp_parse_mss_option() local 4117 opsize = *ptr++; in tcp_parse_mss_option() 4118 if (opsize < 2) /* "silly options" */ in tcp_parse_mss_option() 4120 if (opsize > length) in tcp_parse_mss_option() 4122 if (opcode == TCPOPT_MSS && opsize == TCPOLEN_MSS) { in tcp_parse_mss_option() 4131 ptr += opsize - 2; in tcp_parse_mss_option() 4132 length -= opsize; in tcp_parse_mss_option() [all …]
|
/openbmc/linux/arch/m68k/ifpsp060/src/ |
H A D | pfpsp.S | 3925 cmpi.b %d0,&0xc # is opsize ext or packed?
|