Home
last modified time | relevance | path

Searched full:pke (Results 1 – 25 of 25) sorted by relevance

/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_fw_pke.h5 * @defgroup icp_qat_fw_pke ICP QAT FW PKE Processing Definitions
30 * PKE response status field structure contained
40 /**< 8-bit PKE response flags */
47 * Definition of the QAT FW PKE request header pars field.
51 * PKE request message header pars structure
72 * Definition of the QAT FW PKE request header mid section.
76 * PKE request message header middle structure
104 * Definition of the QAT FW PKE request header.
108 * PKE request message header structure
131 * Common Request flags - PKE slice flags no longer used - slice
[all …]
H A Dicp_qat_fw.h125 ICP_QAT_FW_COMN_REQ_CPM_FW_PKE = 3, /**< CPM FW PKE Request */
1077 * RESPONSE status field, assumed to be 8 bits wide. In the case of the PKE
1081 * with the diagram below. Please therefore refer to the service-specific PKE
1082 * header file for the appropriate macro definition to extract the PKE status
1083 * flag from the PKE response, which assumes that a word is passed to the
1088 * | Flags | Crypto | Pke | Cmp | Xlat | EOLB | UnSupReq | Rsvd | XltWaApply |
1107 * Starting bit position indicating Response for PKE service Flag */
1111 * One bit mask used to determine PKE status mask */
1172 crypto, pke, comp, xlat, eolb, unsupp, xlt_inv) \ argument
1175 (((pke)&QAT_COMN_RESP_PKE_STATUS_MASK) \
[all …]
H A Dicp_qat_fw_mmp.h36 * Maximum number of input parameters in all PKE request */
39 * Maximum number of output parameters in all PKE request */
/freebsd/contrib/ntp/sntp/
H A Dkod_management.c58 struct kod_entry *pke; in add_entry() local
60 pke = emalloc_zero(sizeof(*pke)); in add_entry()
61 pke->timestamp = time(NULL); in add_entry()
62 memcpy(pke->type, type, 4); in add_entry()
63 pke->type[sizeof(pke->type) - 1] = '\0'; in add_entry()
64 strlcpy(pke->hostname, hostname, sizeof(pke->hostname)); in add_entry()
70 if (strcmp(kod_db[n]->hostname, pke->hostname) >= 0) in add_entry()
74 0 == strcmp(kod_db[n]->hostname, pke->hostname)) { in add_entry()
75 kod_db[n]->timestamp = pke->timestamp; in add_entry()
76 free(pke); in add_entry()
[all …]
/freebsd/sys/dev/qat/qat_hw/qat_c4xxx/
H A Dadf_c4xxx_pke_replay_stats.c15 "| PKE Replay Statistics for Qat Device |\n"
78 "QAT PKE Replay Statistics"); in adf_pke_replay_counters_add_c4xxx()
83 "Failed to create qat pke replay debugfs entry.\n"); in adf_pke_replay_counters_add_c4xxx()
H A Dadf_c4xxx_hw_data.c778 * PKE/DC are enabled/disabled in c4xxx_get_hw_cap()
783 /* Disable PKE/DC cap if there are no PKE/DC-enabled AUs. */ in c4xxx_get_hw_cap()
/freebsd/sys/dev/qat/qat_hw/qat_200xx/
H A Dadf_200xx_hw_data.c251 * The device supports PKE, in adf_enable_mmp_error_correction()
258 * The device supports PKE, in adf_enable_mmp_error_correction()
268 * The device doesn't support PKE, in adf_enable_mmp_error_correction()
275 * The device doesn't support PKE, in adf_enable_mmp_error_correction()
/freebsd/crypto/openssl/include/crypto/
H A Dml_kem.h79 * and the "y" vector in ML-KEM encapsulation (K-PKE encryption).
81 * encapsulation (K-PKE encryption).
/freebsd/sys/dev/qat/qat_api/qat_direct/include/
H A Dicp_adf_cfg.h44 /* Pke Service Disabled flag */
/freebsd/sys/dev/qat/qat_common/
H A Dadf_gen4_hw_data.c245 /* Enable WDT for pke */ in adf_gen4_set_ssm_wdtimer()
H A Dqat_uclo.c1826 NULL, "QAT: PKE service is not allowed because "); in qat_uclo_wr_mimage()
/freebsd/sys/arm/freescale/vybrid/
H A Dvf_iomuxc.c65 #define PKE (1 << 3) /* Pull / Keep Enable Field. */ macro
/freebsd/usr.sbin/bhyve/gdb/
H A Damd64.xml105 <field name="PKE" start="22" end="22"/>
/freebsd/sys/dev/qat/qat_api/common/include/
H A Dlac_sal_types_crypto.h91 /**< Flow ID for all pke requests from this instance - identifies
H A Dlac_mem_pools.h240 * This function populates all PKE requests with instance constant parameters
H A Dlac_sync.h46 * This is derived from the max latency of a PKE request + 1 sec
H A Dlac_mem.h467 * PKE services)
/freebsd/sys/dev/qat/qat_api/common/stubs/
H A Dlac_stubs.c10 * All PKE and KPT API won't be supported in kernel API
/freebsd/sys/contrib/device-tree/src/arm/nxp/imx/
H A Dimx6qdl-mba6.dtsi537 /* HYS = 1, DSE = 110, PUE+PKE, SPEED = HIGH (11)*/
/freebsd/crypto/openssl/crypto/ml_kem/
H A Dml_kem.c1463 * FIPS 203, Section 5.2, Algorithm 14: K-PKE.Encrypt.
1527 * FIPS 203, Section 5.3, Algorithm 15: K-PKE.Decrypt.
1659 * The implementation of Section 5.1, Algorithm 13, "K-PKE.KeyGen(d)" is
/freebsd/sys/dev/qat_c2xxx/
H A Dqat_hw15reg.h94 ARCH_IF_REQ_QAT_FW_PKE, /* QAT-FW PKE Request */
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto_openssl.c5046 /* skE, pkE = GenerateKeyPair() */ in hpke_encap()
5070 /* enc = SerializePublicKey(pkE) */ in hpke_encap()
5212 /* pkE = DeserializePublicKey(enc) */ in hpke_decap()
5222 /* dh = DH(skR, pkE) */ in hpke_decap()
/freebsd/contrib/tcsh/
H A Dcomplete.tcsh582 pke pp)/'
/freebsd/sys/contrib/edk2/Include/Library/
H A DBaseLib.h5527 UINT32 PKE : 1; ///< Protection-Key Enable. member
/freebsd/crypto/openssh/
H A Dlibcrux_mlkem768_sha3.h9207 NIST FIPS 203 specification; this is the Kyber CPA-PKE decryption algorithm.