/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_tls13_kdf.txt | 2530 Ctrl.digest = digest:SHA2-384 2535 Ctrl.digest = digest:SHA2-384 2544 Ctrl.digest = digest:SHA2-384 2553 Ctrl.digest = digest:SHA2-384 2562 Ctrl.digest = digest:SHA2-384 2571 Ctrl.digest = digest:SHA2-384 2580 Ctrl.digest = digest:SHA2-384 2588 Ctrl.digest = digest:SHA2-384 2597 Ctrl.digest = digest:SHA2-384 2606 Ctrl.digest = digest:SHA2-384 [all …]
|
H A D | evppkey_kas.txt | 2140 PrivateKey=KAS-ECC-CDH_P-384_C0 2148 PublicKey=KAS-ECC-CDH_P-384_C0-PUBLIC 2155 PrivPubKeyPair = KAS-ECC-CDH_P-384_C0:KAS-ECC-CDH_P-384_C0-PUBLIC 2158 PublicKey=KAS-ECC-CDH_P-384_C0-Peer-PUBLIC 2166 Derive=KAS-ECC-CDH_P-384_C0 2167 PeerKey=KAS-ECC-CDH_P-384_C0-Peer-PUBLIC 2171 PrivateKey=KAS-ECC-CDH_P-384_C1 2179 PublicKey=KAS-ECC-CDH_P-384_C1-PUBLIC 2186 PrivPubKeyPair = KAS-ECC-CDH_P-384_C1:KAS-ECC-CDH_P-384_C1-PUBLIC 2189 PublicKey=KAS-ECC-CDH_P-384_C1-Peer-PUBLIC [all …]
|
H A D | evpmd_sha.txt | 196 Digest = SHA3-384 200 Digest = SHA3-384 205 Digest = SHA3-384 209 Digest = SHA3-384
|
/freebsd/tools/regression/ccd/layout/ |
H A D | ccd0.sh | 28 foo 256k 128k 384k 128k 0 0 29 foo 256k 128k 384k 128k 0 4 30 foo 256k 128k 384k 128k 4 0 31 foo 256k 128k 384k 128k 4 2 32 foo 256k 128k 384k 128k 4 4 34 foo 256k 128k 384k 128k 16 0 35 foo 256k 128k 384k 128k 16 4 36 foo 256k 128k 384k 128k 16 0 37 foo 256k 128k 384k 128k 16 2 38 foo 256k 128k 384k 128k 16 4
|
H A D | ref.256k_128k_384k_128k_16_0 | 30 384 112 16 82 1216 384 16 83 1232 384 16
|
H A D | ref.256k_128k_384k_128k_4_0 | 102 384 112 4 310 1216 384 4 311 1220 384 4
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf | 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 105 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE] 106 ssl_conf = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-ssl 108 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-ssl] 109 server = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-server 110 client = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-client 112 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-server] 118 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-client]
|
/freebsd/sys/dev/videomode/ |
H A D | videomode.c | 93 M("512x384x87i",512,384,22450,516,604,632,384,388,408,HP|VP|DS|I), 94 M("512x384x60",512,384,32500,524,592,672,385,388,403,HN|VN|DS), 95 M("512x384x70",512,384,37500,524,592,664,385,388,403,HN|VN|DS), 96 M("512x384x75",512,384,39375,520,568,656,384,386,400,HP|VP|DS), 97 M("512x384x85",512,384,47250,536,584,688,384,386,404,HP|VP|DS), 98 M("512x384x89",512,384,50000,554,640,704,384,390,398,HP|VP|DS), 100 M("640x384x75",640,384,52820,656,856,872,391,396,403,HN|VP|DS), 120 M("576x384x54",576,384,32497,589,657,736,385,388,403,HP|VP|DS),
|
/freebsd/secure/caroot/trusted/ |
H A D | Certum_EC-384_CA.pem | 2 ## Certum EC-384 CA 20 …r: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA 24 …t: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA 27 Public-Key: (384 bit) 37 NIST CURVE: P-384
|
/freebsd/lib/libmd/tests/ |
H A D | Makefile | 140 echo 'SHA-384 test suite:' > ${.TARGET} 141 @echo 'SHA-384 ("") =' \ 143 @echo 'SHA-384 ("abc") =' \ 145 @echo 'SHA-384 ("message digest") =' \ 147 @echo 'SHA-384 ("abcdefghijklmnopqrstuvwxyz") =' \ 149 @echo 'SHA-384 ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") =' \ 151 …@echo 'SHA-384 ("12345678901234567890123456789012345678901234567890123456789012345678901234567890"…
|
/freebsd/crypto/openssl/demos/certs/apps/ |
H A D | mkxcerts.sh | 19 $OPENSSL ecparam -name P-384 -out ecp384.pem 26 CN="OpenSSL Test P-384 SHA-384 cert" $OPENSSL req \
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_MD-SHA2.pod | 31 =item SHA2-384 33 Known names are "SHA2-384", "SHA-384" and "SHA384".
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_hash.h | 66 * 1 to 6 for MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, 165 * | SHA-384 | sha384 | 48 | 64 | 186 * Only the standard hash functions (MD5, SHA-1, SHA-224, SHA-256, SHA-384 252 * SHA-384 and SHA-512, this is 7, corresponding to their 362 * -- SHA-384 and SHA-512 contexts are identical. 762 * \brief Symbolic identifier for SHA-384. 767 * \brief SHA-384 output size (in bytes). 772 * \brief Constant vtable for SHA-384. 777 * \brief SHA-384 context. 795 * \brief SHA-384 context initialisation. [all …]
|
H A D | bearssl_prf.h | 49 * PRF with, respectively, SHA-256 and SHA-384. Most standard cipher suites 50 * rely on the SHA-256 based PRF, but some use SHA-384. 114 * \brief PRF implementation for TLS 1.2, with SHA-384. 117 * function is SHA-384.
|
/freebsd/share/man/man4/ |
H A D | ccr.4 | 52 SHA1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, 53 SHA1-HMAC, SHA2-224-HMAC, SHA2-256-HMAC, SHA2-384-HMAC, and SHA2-512-HMAC 62 SHA1-HMAC, SHA2-224-HMAC, SHA2-256-HMAC, SHA2-384-HMAC, or SHA2-512-HMAC for
|
H A D | ossl.4 | 97 SHA2-384 99 SHA2-384-HMAC
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_MD-SHA2.7 | 156 .IP "\s-1SHA2\-384\s0" 4 157 .IX Item "SHA2-384" 158 Known names are \*(L"\s-1SHA2\-384\*(R", \*(L"SHA\-384\*(R"\s0 and \*(L"\s-1SHA384\*(R".\s0
|
/freebsd/contrib/unbound/compat/ |
H A D | sha512.c | 66 /*** SHA-256/384/512 Machine Architecture Definitions *****************/ 106 /*** SHA-256/384/512 Various Length Definitions ***********************/ 180 * S is a ROTATION) because the SHA-256/384/512 description document 181 * (see http://csrc.nist.gov/cryptval/shs/sha256-384-512.pdf) uses this 184 /* Shift-right (used in SHA-256, SHA-384, and SHA-512): */ 186 /* 64-bit Rotate-right (used in SHA-384 and SHA-512): */ 189 /* Two of six logical functions used in SHA-256, SHA-384, and SHA-512: */ 193 /* Four of six logical functions used in SHA-384 and SHA-512: */ 200 /* Hash constant words K for SHA-384 and SHA-512: */
|
/freebsd/contrib/ldns/ldns/ |
H A D | sha2.h | 61 /*** SHA-256/384/512 Various Length Definitions ***********************/ 73 /*** SHA-256/384/512 Context Structures *******************************/ 89 /*** SHA-256/384/512 Function Prototypes ******************************/
|
/freebsd/crypto/libecc/src/hash/ |
H A D | bash.c | 18 * This is an implementation of the BASH hash functions family (for sizes 224, 256, 384 and 512) 30 * mapped on instances (224, 256, 384, 512). in _bash_init() 33 (digest_size == (384/8)) || (digest_size == (512/8))), ret, err); in _bash_init()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_sha224.pod | 38 The SHA-2 SHA-224, SHA-256, SHA-512/224, SHA512/256, SHA-384 and SHA-512 39 algorithms, which generate 224, 256, 224, 256, 384 and 512 bits
|
H A D | EVP_sha3_224.pod | 38 The SHA-3 SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 algorithms 39 respectively. They produce 224, 256, 384 and 512 bits of output from a given
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | sha2.c | 69 /*** SHA-224/256/384/512 Machine Architecture Definitions *****************/ 102 /*** SHA-224/256/384/512 Various Length Definitions ***********************/ 157 * S is a ROTATION) because the SHA-224/256/384/512 description document 158 * (see http://csrc.nist.gov/cryptval/shs/sha256-384-512.pdf) uses this 161 /* Shift-right (used in SHA-224, SHA-256, SHA-384, and SHA-512): */ 165 /* 64-bit Rotate-right (used in SHA-384 and SHA-512): */ 168 /* Two of six logical functions used in SHA-224, SHA-256, SHA-384, and SHA-512: */ 178 /* Four of six logical functions used in SHA-384 and SHA-512: */ 218 /* Hash constant words K for SHA-384 and SHA-512: */ 289 /* Initial hash value H for SHA-384 */ [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/ |
H A D | AMDGPUGenRegisterBankInfo.def | 90 {0, 384, SGPRRegBank}, 91 {0, 384, VGPRRegBank}, 92 {0, 384, AGPRRegBank}, 256 case 384:
|
/freebsd/contrib/libfido2/man/ |
H A D | es384_pk_new.3 | 56 (COSE) RFC to ECDSA over P-384 with SHA-384.
|