| /freebsd/contrib/libfido2/regress/ |
| H A D | eddsa.c | 69 EVP_PKEY *pkA = NULL; in eddsa_pk_cmp() local 74 if ((pkA = EVP_PKEY_from_PEM(ptr, len)) == NULL) { in eddsa_pk_cmp() 82 if ((r = eddsa_pk_from_EVP_PKEY(k, pkA)) != FIDO_OK) { in eddsa_pk_cmp() 90 if ((r = EVP_PKEY_cmp(pkA, pkB)) != 1) { in eddsa_pk_cmp() 97 EVP_PKEY_free(pkA); in eddsa_pk_cmp() 123 eddsa_pk_t *pkA = NULL; in valid_key() local 135 ASSERT_NOT_NULL((pkA = eddsa_pk_new())); in valid_key() 137 ASSERT_OK(eddsa_pk_from_EVP_PKEY(pkA, pkeyA)); in valid_key() 146 eddsa_pk_free(&pkA); in valid_key()
|
| H A D | es256.c | 99 EVP_PKEY *pkA = NULL; in es256_pk_cmp() local 104 if ((pkA = EVP_PKEY_from_PEM(ptr, len)) == NULL) { in es256_pk_cmp() 112 if ((r = es256_pk_from_EVP_PKEY(k, pkA)) != FIDO_OK) { in es256_pk_cmp() 120 if ((r = EVP_PKEY_cmp(pkA, pkB)) != 1) { in es256_pk_cmp() 127 EVP_PKEY_free(pkA); in es256_pk_cmp() 168 es256_pk_t *pkA; in valid_curve() local 172 ASSERT_NOT_NULL((pkA = es256_pk_new())); in valid_curve() 174 ASSERT_OK(es256_pk_from_EVP_PKEY(pkA, pkeyA)); in valid_curve() 181 es256_pk_free(&pkA); in valid_curve()
|
| H A D | es384.c | 111 EVP_PKEY *pkA = NULL; in es384_pk_cmp() local 116 if ((pkA = EVP_PKEY_from_PEM(ptr, len)) == NULL) { in es384_pk_cmp() 124 if ((r = es384_pk_from_EVP_PKEY(k, pkA)) != FIDO_OK) { in es384_pk_cmp() 132 if ((r = EVP_PKEY_cmp(pkA, pkB)) != 1) { in es384_pk_cmp() 139 EVP_PKEY_free(pkA); in es384_pk_cmp() 182 es384_pk_t *pkA; in valid_curve() local 186 ASSERT_NOT_NULL((pkA = es384_pk_new())); in valid_curve() 188 ASSERT_OK(es384_pk_from_EVP_PKEY(pkA, pkeyA)); in valid_curve() 195 es384_pk_free(&pkA); in valid_curve()
|
| H A D | rs256.c | 119 EVP_PKEY *pkA = NULL; in rs256_pk_cmp() local 124 if ((pkA = EVP_PKEY_from_PEM(ptr, len)) == NULL) { in rs256_pk_cmp() 132 if ((r = rs256_pk_from_EVP_PKEY(k, pkA)) != FIDO_OK) { in rs256_pk_cmp() 140 if ((r = EVP_PKEY_cmp(pkA, pkB)) != 1) { in rs256_pk_cmp() 147 EVP_PKEY_free(pkA); in rs256_pk_cmp() 173 rs256_pk_t *pkA; in valid_size() local 177 ASSERT_NOT_NULL((pkA = rs256_pk_new())); in valid_size() 179 ASSERT_OK(rs256_pk_from_EVP_PKEY(pkA, pkeyA)); in valid_size() 187 rs256_pk_free(&pkA); in valid_size()
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | sra.c | 53 char pka[HEXKEYBYTES+1], ska[HEXKEYBYTES+1], pkb[HEXKEYBYTES+1]; variable 127 genkeys(pka,ska); in sra_init() 135 /* send PKA */ in sra_send() 138 printf("Sent PKA to server.\r\n" ); in sra_send() 140 if (!Data(ap, SRA_KEY, (void *)pka, HEXKEYBYTES)) { in sra_send() 170 printf("Sent pka\r\n"); in sra_is() 171 if (!Data(ap, SRA_KEY, (void *)pka, HEXKEYBYTES)) { in sra_is()
|
| /freebsd/sys/contrib/device-tree/Bindings/remoteproc/ |
| H A D | qcom,sc7280-mss-pil.yaml | 63 - description: RPMH PKA clock 71 - const: pka 238 clock-names = "iface", "offline", "snoc_axi", "pka", "xo";
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_srv.c | 431 krb5_pk_authenticator *pka; in pkinit_server_verify_padata() local 528 pka = &auth_pack->pkAuthenticator; in pkinit_server_verify_padata() 530 retval = krb5_check_clockskew(context, pka->ctime); in pkinit_server_verify_padata() 554 retval = crypto_verify_checksums(context, der_req, &pka->paChecksum, in pkinit_server_verify_padata() 555 pka->paChecksum2); in pkinit_server_verify_padata() 559 if (pka->freshnessToken != NULL) { in pkinit_server_verify_padata() 560 retval = cb->check_freshness_token(context, rock, pka->freshnessToken); in pkinit_server_verify_padata()
|
| /freebsd/sys/contrib/device-tree/Bindings/crypto/ |
| H A D | samsung-sss.yaml | 17 -- Public Key Accelerator (PKA)
|
| H A D | ti,sa2ul.yaml | 50 - description: Clock used by PKA
|
| /freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
| H A D | sc7280-herobrine-lte-sku.dtsi | 39 clock-names = "iface", "offline", "snoc_axi", "pka", "xo";
|
| /freebsd/sys/contrib/device-tree/include/dt-bindings/clock/ |
| H A D | stm32mp13-clks.h | 102 #define PKA 74 macro
|
| /freebsd/crypto/openssh/contrib/ |
| H A D | ssh-copy-id.1 | 66 .Ql set ssh pka-dsa key ...
|
| H A D | ssh-copy-id | 369 …[ "$DRY_RUN" ] || printf 'set ssh pka-dsa key %s\nsave\nexit\n' "$KEY" | $SSH -T "$@" >/dev/null 2…
|
| /freebsd/sys/contrib/device-tree/src/arm/ti/omap/ |
| H A D | omap34xx-omap36xx-clocks.dtsi | 55 pka_ick: clock-pka-ick@4 {
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/SystemZ/ |
| H A D | SystemZInstrInfo.td | 1940 def PKA : SideEffectBinarySSf<"pka", 0xE9>;
|
| H A D | SystemZScheduleZEC12.td | 632 def : InstRW<[WLat1, LSU5, GroupAlone], (instregex "(PACK|PKA|PKU)$")>;
|
| H A D | SystemZScheduleZ196.td | 619 def : InstRW<[WLat1, LSU5, GroupAlone], (instregex "(PACK|PKA|PKU)$")>;
|
| H A D | SystemZScheduleZ14.td | 682 def : InstRW<[WLat1, LSU5, GroupAlone], (instregex "(PACK|PKA|PKU)$")>;
|
| H A D | SystemZScheduleZ13.td | 662 def : InstRW<[WLat1, LSU5, GroupAlone], (instregex "(PACK|PKA|PKU)$")>;
|
| H A D | SystemZScheduleZ15.td | 697 def : InstRW<[WLat1, LSU5, GroupAlone], (instregex "(PACK|PKA|PKU)$")>;
|
| H A D | SystemZScheduleZ16.td | 697 def : InstRW<[WLat1, LSU5, GroupAlone], (instregex "(PACK|PKA|PKU)$")>;
|