| /freebsd/sys/dev/qat/qat_api/firmware/include/ |
| H A D | icp_qat_fw_pke.h | 5 * @defgroup icp_qat_fw_pke ICP QAT FW PKE Processing Definitions 30 * PKE response status field structure contained 40 /**< 8-bit PKE response flags */ 47 * Definition of the QAT FW PKE request header pars field. 51 * PKE request message header pars structure 72 * Definition of the QAT FW PKE request header mid section. 76 * PKE request message header middle structure 104 * Definition of the QAT FW PKE request header. 108 * PKE request message header structure 131 * Common Request flags - PKE slice flags no longer used - slice [all …]
|
| H A D | icp_qat_fw.h | 125 ICP_QAT_FW_COMN_REQ_CPM_FW_PKE = 3, /**< CPM FW PKE Request */ 1077 * RESPONSE status field, assumed to be 8 bits wide. In the case of the PKE 1081 * with the diagram below. Please therefore refer to the service-specific PKE 1082 * header file for the appropriate macro definition to extract the PKE status 1083 * flag from the PKE response, which assumes that a word is passed to the 1088 * | Flags | Crypto | Pke | Cmp | Xlat | EOLB | UnSupReq | Rsvd | XltWaApply | 1107 * Starting bit position indicating Response for PKE service Flag */ 1111 * One bit mask used to determine PKE status mask */ 1172 crypto, pke, comp, xlat, eolb, unsupp, xlt_inv) \ argument 1175 (((pke)&QAT_COMN_RESP_PKE_STATUS_MASK) \ [all …]
|
| H A D | icp_qat_fw_mmp.h | 36 * Maximum number of input parameters in all PKE request */ 39 * Maximum number of output parameters in all PKE request */
|
| /freebsd/contrib/ntp/sntp/ |
| H A D | kod_management.c | 58 struct kod_entry *pke; in add_entry() local 60 pke = emalloc_zero(sizeof(*pke)); in add_entry() 61 pke->timestamp = time(NULL); in add_entry() 62 memcpy(pke->type, type, 4); in add_entry() 63 pke->type[sizeof(pke->type) - 1] = '\0'; in add_entry() 64 strlcpy(pke->hostname, hostname, sizeof(pke->hostname)); in add_entry() 70 if (strcmp(kod_db[n]->hostname, pke->hostname) >= 0) in add_entry() 74 0 == strcmp(kod_db[n]->hostname, pke->hostname)) { in add_entry() 75 kod_db[n]->timestamp = pke->timestamp; in add_entry() 76 free(pke); in add_entry() [all …]
|
| /freebsd/sys/dev/qat/qat_hw/qat_c4xxx/ |
| H A D | adf_c4xxx_pke_replay_stats.c | 15 "| PKE Replay Statistics for Qat Device |\n" 78 "QAT PKE Replay Statistics"); in adf_pke_replay_counters_add_c4xxx() 83 "Failed to create qat pke replay debugfs entry.\n"); in adf_pke_replay_counters_add_c4xxx()
|
| H A D | adf_c4xxx_hw_data.c | 778 * PKE/DC are enabled/disabled in c4xxx_get_hw_cap() 783 /* Disable PKE/DC cap if there are no PKE/DC-enabled AUs. */ in c4xxx_get_hw_cap()
|
| /freebsd/sys/dev/qat/qat_hw/qat_200xx/ |
| H A D | adf_200xx_hw_data.c | 251 * The device supports PKE, in adf_enable_mmp_error_correction() 258 * The device supports PKE, in adf_enable_mmp_error_correction() 268 * The device doesn't support PKE, in adf_enable_mmp_error_correction() 275 * The device doesn't support PKE, in adf_enable_mmp_error_correction()
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ml_kem.h | 79 * and the "y" vector in ML-KEM encapsulation (K-PKE encryption). 81 * encapsulation (K-PKE encryption).
|
| /freebsd/sys/dev/qat/qat_api/qat_direct/include/ |
| H A D | icp_adf_cfg.h | 44 /* Pke Service Disabled flag */
|
| /freebsd/sys/dev/qat/qat_common/ |
| H A D | adf_gen4_hw_data.c | 245 /* Enable WDT for pke */ in adf_gen4_set_ssm_wdtimer()
|
| H A D | qat_uclo.c | 1826 NULL, "QAT: PKE service is not allowed because "); in qat_uclo_wr_mimage()
|
| /freebsd/sys/arm/freescale/vybrid/ |
| H A D | vf_iomuxc.c | 65 #define PKE (1 << 3) /* Pull / Keep Enable Field. */ macro
|
| /freebsd/usr.sbin/bhyve/gdb/ |
| H A D | amd64.xml | 105 <field name="PKE" start="22" end="22"/>
|
| /freebsd/sys/dev/qat/qat_api/common/include/ |
| H A D | lac_sal_types_crypto.h | 91 /**< Flow ID for all pke requests from this instance - identifies
|
| H A D | lac_mem_pools.h | 240 * This function populates all PKE requests with instance constant parameters
|
| H A D | lac_sync.h | 46 * This is derived from the max latency of a PKE request + 1 sec
|
| H A D | lac_mem.h | 467 * PKE services)
|
| /freebsd/sys/dev/qat/qat_api/common/stubs/ |
| H A D | lac_stubs.c | 10 * All PKE and KPT API won't be supported in kernel API
|
| /freebsd/sys/contrib/device-tree/src/arm/nxp/imx/ |
| H A D | imx6qdl-mba6.dtsi | 537 /* HYS = 1, DSE = 110, PUE+PKE, SPEED = HIGH (11)*/
|
| /freebsd/crypto/openssl/crypto/ml_kem/ |
| H A D | ml_kem.c | 1463 * FIPS 203, Section 5.2, Algorithm 14: K-PKE.Encrypt. 1527 * FIPS 203, Section 5.3, Algorithm 15: K-PKE.Decrypt. 1659 * The implementation of Section 5.1, Algorithm 13, "K-PKE.KeyGen(d)" is
|
| /freebsd/sys/dev/qat_c2xxx/ |
| H A D | qat_hw15reg.h | 94 ARCH_IF_REQ_QAT_FW_PKE, /* QAT-FW PKE Request */
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | crypto_openssl.c | 5046 /* skE, pkE = GenerateKeyPair() */ in hpke_encap() 5070 /* enc = SerializePublicKey(pkE) */ in hpke_encap() 5212 /* pkE = DeserializePublicKey(enc) */ in hpke_decap() 5222 /* dh = DH(skR, pkE) */ in hpke_decap()
|
| /freebsd/contrib/tcsh/ |
| H A D | complete.tcsh | 582 pke pp)/'
|
| /freebsd/sys/contrib/edk2/Include/Library/ |
| H A D | BaseLib.h | 5527 UINT32 PKE : 1; ///< Protection-Key Enable. member
|
| /freebsd/crypto/openssh/ |
| H A D | libcrux_mlkem768_sha3.h | 9207 NIST FIPS 203 specification; this is the Kyber CPA-PKE decryption algorithm.
|