| /freebsd/contrib/wpa/src/crypto/ |
| H A D | aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES 4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> 13 #include "aes.h" 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES 37 * Returns: 0 on success, -1 on failure 39 * This is a mode for using block cipher (AES in this case) for authentication. 40 * OMAC1 was standardized with the name CMAC by NIST in a Special Publication [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 20-test_speed.t | 22 ok(run(app(['openssl', 'speed', '-testmode'])), 25 #Test various options to speed. In all cases we use the -testmode option to 34 ok(run(app(['openssl', 'speed', '-testmode', '-multi', 2])), 38 ok(run(app(['openssl', 'speed', '-testmode', '-misalign', 1])), 44 # The AES-128-CBC-HMAC-SHA1 cipher isn't available on all platforms 45 # We test its availability without the "-mb" option. We only do the 46 # multiblock test via "-mb" if the cipher seems to exist. 47 || !run(app(['openssl', 'speed', '-testmode', '-evp', 48 'AES-128-CBC-HMAC-SHA1'])); 50 ok(run(app(['openssl', 'speed', '-testmode', '-mb', '-evp', [all …]
|
| H A D | 20-test_mac.t | 2 # Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved. 20 …{ cmd => [qw{openssl mac -digest SHA1 -macopt hexkey:000102030405060708090A0B0C0D0E0F1011121314151… 25 …{ cmd => [qw{openssl mac -macopt digest:SHA1 -macopt hexkey:000102030405060708090A0B0C0D0E0F101112… 29 desc => 'HMAC SHA1 via -macopt' }, 30 …{ cmd => [qw{openssl mac -cipher AES-256-GCM -macopt hexkey:4C973DBC7364621674F8B5B89E5C15511FCED9… 35 …md => [qw{openssl mac -macopt cipher:AES-256-GCM -macopt hexkey:4C973DBC7364621674F8B5B89E5C15511F… 39 desc => 'GMAC via -macopt' }, 40 …{ cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C… 45 …{ cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C… 50 …{ cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C… [all …]
|
| /freebsd/contrib/ntp/sntp/tests/ |
| H A D | crypto.c | 8 #define CMAC "AES128CMAC" macro 23 void VerifyLocalCMAC(struct key *cmac); 24 void VerifyOpenSSLCMAC(struct key *cmac); 34 const size_t PAYLOAD_LEN = sizeof(PAYLOAD) - 1; in test_MakeMd5Mac() 38 u_char actual[sizeof(EXPECTED_DIGEST) - 1]; in test_MakeMd5Mac() 43 sk.key_len = sizeof(KEY) - 1; in test_MakeMd5Mac() 106 struct key cmac; in test_MakeCMac() 108 cmac.next = NULL; in test_MakeCMac() 109 cmac.key_id = 30; in test_MakeCMac() 110 cmac in test_MakeCMac() 97 struct key cmac; test_MakeCMac() local 178 struct key cmac; test_VerifyCMAC() local 192 VerifyOpenSSLCMAC(struct key * cmac) VerifyOpenSSLCMAC() argument 210 VerifyLocalCMAC(struct key * cmac) VerifyLocalCMAC() argument [all...] |
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmac_common.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 72 Algorithm = SHA256-192 81 Algorithm = SHA256-192 88 Algorithm = SHA256-192 178 Algorithm = SHA3-224 186 Algorithm = SHA3-224 192 Algorithm = SHA3-224 198 Algorithm = SHA3-256 206 Algorithm = SHA3-256 212 Algorithm = SHA3-256 [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-mac.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-mac - perform Message Authentication Code operations 11 [B<-help>] 12 [B<-cipher>] 13 [B<-digest>] 14 [B<-macopt>] 15 [B<-in> I<filename>] 16 [B<-out> I<filename>] 17 [B<-binary>] 18 {- $OpenSSL::safe::opt_provider_synopsis -} [all …]
|
| H A D | openssl-speed.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-speed - test library performance 11 [B<-help>] 12 [B<-config> I<filename>] 13 [B<-elapsed>] 14 [B<-evp> I<algo>] 15 [B<-hmac> I<algo>] 16 [B<-cmac> I<algo>] 17 [B<-mb>] 18 [B<-aead>] [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-mac.1 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OPENSSL-MAC 1ossl" 58 .TH OPENSSL-MAC 1ossl 2025-09-30 3.5.4 OpenSSL 64 openssl\-mac \- perform Message Authentication Code operations 68 [\fB\-help\fR] 69 [\fB\-cipher\fR] 70 [\fB\-digest\fR] 71 [\fB\-macopt\fR] 72 [\fB\-in\fR \fIfilename\fR] 73 [\fB\-out\fR \fIfilename\fR] [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_cmac.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 28 * Test vectors for CMAC. Inputs are taken from RFC 4493 section 4. Outputs 29 * are changed for the use of Camellia-128 in place of AES-128. 31 * Ideally we would double-check subkey values, but we have no easy way to see 34 * Ideally we would test AES-CMAC against the expected results in RFC 4493, 35 * instead of Camellia-CMAC against results we generated ourselves. This has 37 * AES-128 enc provider has no cbc_mac method and therefore cannot be used with 43 /* All examples use the following Camellia-128 key. */ 61 /* Expected result of CMAC on empty input. */ 67 /* Expected result of CMAC on first 16 bytes of input. */ [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/krb/ |
| H A D | etypes.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 39 "des3-cbc-raw", { 0 }, "Triple DES cbc mode raw", 49 "des3-cbc-sha1", { "des3-hmac-sha1", "des3-cbc-sha1-kd" }, 59 /* rc4-hmac uses a 128-bit key, but due to weaknesses in the RC4 cipher, we 62 "arcfour-hmac", { "rc4-hmac", "arcfour-hmac-md5" }, 73 "arcfour-hmac-exp", { "rc4-hmac-exp", "arcfour-hmac-md5-exp" }, 86 "aes128-cts-hmac-sha1-96", { "aes128-cts", "aes128-sha1" }, 87 "AES-128 CTS mode with 96-bit SHA-1 HMAC", 96 "aes256-cts-hmac-sha1-96", { "aes256-cts", "aes256-sha1" }, 97 "AES-256 CTS mode with 96-bit SHA-1 HMAC", [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/ |
| H A D | Makefile.in | 3 SUBDIRS=camellia des aes md4 md5 sha1 sha2 enc_provider hash_provider 4 LOCALINCLUDES=-I$(srcdir)/../krb $(CRYPTO_IMPL_CFLAGS) 11 cmac.o \ 17 $(OUTPRE)cmac.$(OBJEXT) \ 23 $(srcdir)/cmac.c \ 32 aes/OBJS.ST \ 39 all-unix: all-libobjs 44 clean-unix:: clean-libobjs
|
| /freebsd/crypto/openssl/providers/implementations/macs/ |
| H A D | cmac_prov.c | 2 * Copyright 2018-2024 The OpenSSL Project Authors. All Rights Reserved. 11 * CMAC low level APIs are deprecated for public use, but still ok for internal 20 #include <openssl/cmac.h> 29 #include "crypto/cmac.h" 47 /* local CMAC data */ 64 || (macctx->ctx = CMAC_CTX_new()) == NULL) { in cmac_new() 68 macctx->provctx = provctx; in cmac_new() 80 CMAC_CTX_free(macctx->ctx); in cmac_free() 81 ossl_prov_cipher_reset(&macctx->cipher); in cmac_free() 94 dst = cmac_new(src->provctx); in cmac_dup() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | OSSL_PROVIDER-FIPS.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OSSL_PROVIDER-FIPS 7ossl" 58 .TH OSSL_PROVIDER-FIPS 7ossl 2025-09-30 3.5.4 OpenSSL 64 OSSL_PROVIDER\-FIPS \- OpenSSL FIPS provider 68 Information Processing Standards (FIPS) specified in FIPS 140\-3. This 'module' 90 query may also include other non-crypto support operations that 92 "Asymmetric Key Management" in \fBOSSL_PROVIDER\-default\fR\|(7). 105 See "Provider parameters" in \fBprovider\-base\fR\|(7) for a list of base parameters. 113 .IP "SHA1, see \fBEVP_MD\-SHA1\fR\|(7)" 4 114 .IX Item "SHA1, see EVP_MD-SHA1" [all …]
|
| H A D | OSSL_PROVIDER-default.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OSSL_PROVIDER-DEFAULT 7ossl" 58 .TH OSSL_PROVIDER-DEFAULT 7ossl 2025-09-30 3.5.4 OpenSSL 64 OSSL_PROVIDER\-default \- OpenSSL default provider 103 .IP "SHA1, see \fBEVP_MD\-SHA1\fR\|(7)" 4 104 .IX Item "SHA1, see EVP_MD-SHA1" 106 .IP "SHA2, see \fBEVP_MD\-SHA2\fR\|(7)" 4 107 .IX Item "SHA2, see EVP_MD-SHA2" 108 .IP "SHA3, see \fBEVP_MD\-SHA3\fR\|(7)" 4 109 .IX Item "SHA3, see EVP_MD-SHA3" [all …]
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_sym_hash_defs.h | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 2 /* Copyright(c) 2007-2025 Intel Corporation */ 156 * The Pre-compute operation involves deriving 3 128-bit 167 /* Constants for AES CMAC algorithm */ 170 * AES CMAC block size in bytes */ 173 * AES CMAC digest length in bytes */ 175 /* constants for AES CCM */ 178 * block size for CBC-MAC part of CCM */ 183 /* constants for AES GCM */ 207 /* constants for AES CBC MAC */ [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/crypto/ |
| H A D | nvidia,tegra234-se-aes.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-aes.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: NVIDIA Tegra Security Engine for AES algorithms 10 The Tegra Security Engine accelerates the following AES encryption/decryption 11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM, 12 AES-CMAC 15 - Akhil R <akhilrajeev@nvidia.com> 19 const: nvidia,tegra234-se-aes [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/openssl/ |
| H A D | Makefile.in | 4 LOCALINCLUDES=-I$(srcdir)/../krb $(CRYPTO_IMPL_CFLAGS) 7 cmac.o \ 14 $(OUTPRE)cmac.$(OBJEXT) \ 21 $(srcdir)/cmac.c \ 31 aes/OBJS.ST 35 all-unix: all-libobjs 40 clean-unix:: clean-libobjs
|
| /freebsd/crypto/openssl/providers/ |
| H A D | fips.module.sources | 1 crypto/aes/aes_cbc.c 2 crypto/aes/aes_core.c 3 crypto/aes/aes_ecb.c 4 crypto/aes/aes_local.h 5 crypto/aes/aes_misc.c 6 crypto/aes/asm/aes-586.pl 7 crypto/aes/asm/aes-armv4.pl 8 crypto/aes/asm/aes-c64xplus.pl 9 crypto/aes/asm/aes-ia64.S 10 crypto/aes/asm/aes-mips.pl [all …]
|
| H A D | fips-sources.checksums | 1 0e22ea0cf34ef3871e30df0bc302dc29352d38001d1622ddb78a27a374b6aee8 crypto/aes/aes_cbc.c 2 c049a936d74100fcced225f575d46662792a6a0039777d2d4df0cf61eff90a68 crypto/aes/aes_core.c 3 3fac41ce96acb9189eac2d5571425c3ff33a34c884ae7e275e1fd3068b5fc662 crypto/aes/aes_ecb.c 4 c1e674d08683a25bc053f6233f73a0d0b3a90aafe591ff57b702c7da1582e4a5 crypto/aes/aes_local.h 5 a2466f18da5847c7d9fbced17524633c10ce024671a72f53f9c9c55b9b9923dd crypto/aes/aes_misc.c 6 6979c133f76f4623e62e6e970deae70fa025e713a72b71aead5a048d49e47f6f crypto/aes/asm/aes-586.pl 7 92be9ff608331a432e95247a8f4fb9e46897d0cb76f2b6db809b61d44287964a crypto/aes/asm/aes-armv4.pl 8 953897f86e2de9fa27ef411155ab3aed133af94885f1507e76449c142da78656 crypto/aes/asm/aes-c64xplus.pl 9 00196f01f5218ad731e6a058d406078f7228a9756d9d73f51c0d0c2a68f885af crypto/aes/asm/aes-ia64.S 10 88b6f8396cd9d86004743d5c3b0f72b7b8c3d5a2b00b0bbb761ba91ae5a7cdc8 crypto/aes/asm/aes-mips.pl [all …]
|
| /freebsd/crypto/openssl/demos/mac/ |
| H A D | cmac-aes256.c | 1 /*- 2 * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved. 12 * a CMAC of static buffers 21 #include <openssl/cmac.h> 42 "The heart-ache, and the thousand natural shocks\n" 55 /* The known value of the CMAC/AES256 MAC of the above soliloqy */ 75 char cipher_name[] = "AES-256-CBC"; in main() 83 /* Fetch the CMAC implementation */ in main() 84 mac = EVP_MAC_fetch(library_context, "CMAC", propq); in main() 90 /* Create a context for the CMAC operation */ in main() [all …]
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | aesni-x86.pl | 2 # Copyright 2009-2020 The OpenSSL Project Authors. All Rights Reserved. 17 # This module implements support for Intel AES-NI extension. In 19 # drop-in replacement for crypto/aes/asm/aes-586.pl [see below for 24 # To start with see corresponding paragraph in aesni-x86_64.pl... 27 # The simplified table below represents 32-bit performance relative 28 # to 64-bit one in every given point. Ratios vary for different 31 # 16-byte 64-byte 256-byte 1-KB 8-KB 32 # 53-67% 67-84% 91-94% 95-98% 97-99.5% 35 # because function call overhead is higher in 32-bit mode. Largest 36 # 8-KB block performance is virtually same: 32-bit code is less than [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | core_names.h.in | 2 * {- join("\n * ", @autowarntext) -} 4 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved. 11 {- 13 -} 29 # define OSSL_CIPHER_NAME_AES_128_GCM_SIV "AES-128-GCM-SIV" 30 # define OSSL_CIPHER_NAME_AES_192_GCM_SIV "AES-192-GCM-SIV" 31 # define OSSL_CIPHER_NAME_AES_256_GCM_SIV "AES-256-GCM-SIV" 35 # define OSSL_DIGEST_NAME_MD5_SHA1 "MD5-SHA1" 37 # define OSSL_DIGEST_NAME_SHA2_224 "SHA2-224" 38 # define OSSL_DIGEST_NAME_SHA2_256 "SHA2-256" [all …]
|
| /freebsd/crypto/openssl/crypto/objects/ |
| H A D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi… [all …]
|
| /freebsd/contrib/ntp/sntp/ |
| H A D | crypto.c | 3 * - OpenSSL versions, if we are building with them 4 * - our versions 40 /* Check if CMAC key type specific code required */ in compute_mac() 49 (AES_128_KEY_SIZE - key_size)); in compute_mac() 54 msyslog(LOG_ERR, "make_mac: CMAC %s CTX new failed.", CMAC); in compute_mac() 58 msyslog(LOG_ERR, "make_mac: CMAC %s Init failed.", CMAC); in compute_mac() 61 msyslog(LOG_ERR, "make_mac: CMAC %s Update failed.", CMAC); in compute_mac() [all...] |
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | OSSL_PROVIDER-default.pod | 5 OSSL_PROVIDER-default - OpenSSL default provider 54 =item SHA1, see L<EVP_MD-SHA1(7)> 56 =item SHA2, see L<EVP_MD-SHA2(7)> 58 =item SHA3, see L<EVP_MD-SHA3(7)> 60 =item KECCAK, see L<EVP_MD-KECCAK(7)> 62 =item KECCAK-KMAC, see L<EVP_MD-KECCAK-KMAC(7)> 64 =item SHAKE, see L<EVP_MD-SHAKE(7)> 66 =item BLAKE2, see L<EVP_MD-BLAKE2(7)> 68 =item SM3, see L<EVP_MD-SM3(7)> 70 =item MD5, see L<EVP_MD-MD5(7)> [all …]
|