Home
last modified time | relevance | path

Searched +full:aes +full:- +full:cmac (Results 1 – 25 of 97) sorted by relevance

1234

/freebsd/contrib/wpa/src/crypto/
H A Daes-omac1.c2 * One-key CBC MAC (OMAC1) hash with AES
4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
13 #include "aes.h"
21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx()
23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx()
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx()
30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES
37 * Returns: 0 on success, -1 on failure
39 * This is a mode for using block cipher (AES in this case) for authentication.
40 * OMAC1 was standardized with the name CMAC by NIST in a Special Publication
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D20-test_speed.t22 ok(run(app(['openssl', 'speed', '-testmode'])),
25 #Test various options to speed. In all cases we use the -testmode option to
34 ok(run(app(['openssl', 'speed', '-testmode', '-multi', 2])),
38 ok(run(app(['openssl', 'speed', '-testmode', '-misalign', 1])),
44 # The AES-128-CBC-HMAC-SHA1 cipher isn't available on all platforms
45 # We test its availability without the "-mb" option. We only do the
46 # multiblock test via "-mb" if the cipher seems to exist.
47 || !run(app(['openssl', 'speed', '-testmode', '-evp',
48 'AES-128-CBC-HMAC-SHA1']));
50 ok(run(app(['openssl', 'speed', '-testmode', '-mb', '-evp',
[all …]
H A D20-test_mac.t2 # Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved.
20 …{ cmd => [qw{openssl mac -digest SHA1 -macopt hexkey:000102030405060708090A0B0C0D0E0F1011121314151…
25 …{ cmd => [qw{openssl mac -macopt digest:SHA1 -macopt hexkey:000102030405060708090A0B0C0D0E0F101112…
29 desc => 'HMAC SHA1 via -macopt' },
30 …{ cmd => [qw{openssl mac -cipher AES-256-GCM -macopt hexkey:4C973DBC7364621674F8B5B89E5C15511FCED9…
35 …md => [qw{openssl mac -macopt cipher:AES-256-GCM -macopt hexkey:4C973DBC7364621674F8B5B89E5C15511F…
39 desc => 'GMAC via -macopt' },
40 …{ cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C…
45 …{ cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C…
50 …{ cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C…
[all …]
/freebsd/contrib/ntp/sntp/tests/
H A Dcrypto.c8 #define CMAC "AES128CMAC" macro
23 void VerifyLocalCMAC(struct key *cmac);
24 void VerifyOpenSSLCMAC(struct key *cmac);
34 const size_t PAYLOAD_LEN = sizeof(PAYLOAD) - 1; in test_MakeMd5Mac()
38 u_char actual[sizeof(EXPECTED_DIGEST) - 1]; in test_MakeMd5Mac()
43 sk.key_len = sizeof(KEY) - 1; in test_MakeMd5Mac()
106 struct key cmac; in test_MakeCMac()
108 cmac.next = NULL; in test_MakeCMac()
109 cmac.key_id = 30; in test_MakeCMac()
110 cmac in test_MakeCMac()
97 struct key cmac; test_MakeCMac() local
178 struct key cmac; test_VerifyCMAC() local
192 VerifyOpenSSLCMAC(struct key * cmac) VerifyOpenSSLCMAC() argument
210 VerifyLocalCMAC(struct key * cmac) VerifyLocalCMAC() argument
[all...]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpmac_common.txt2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved.
72 Algorithm = SHA256-192
81 Algorithm = SHA256-192
88 Algorithm = SHA256-192
178 Algorithm = SHA3-224
186 Algorithm = SHA3-224
192 Algorithm = SHA3-224
198 Algorithm = SHA3-256
206 Algorithm = SHA3-256
212 Algorithm = SHA3-256
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-mac.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-mac - perform Message Authentication Code operations
11 [B<-help>]
12 [B<-cipher>]
13 [B<-digest>]
14 [B<-macopt>]
15 [B<-in> I<filename>]
16 [B<-out> I<filename>]
17 [B<-binary>]
18 {- $OpenSSL::safe::opt_provider_synopsis -}
[all …]
H A Dopenssl-speed.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-speed - test library performance
11 [B<-help>]
12 [B<-config> I<filename>]
13 [B<-elapsed>]
14 [B<-evp> I<algo>]
15 [B<-hmac> I<algo>]
16 [B<-cmac> I<algo>]
17 [B<-mb>]
18 [B<-aead>]
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-mac.11 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "OPENSSL-MAC 1ossl"
58 .TH OPENSSL-MAC 1ossl 2025-09-30 3.5.4 OpenSSL
64 openssl\-mac \- perform Message Authentication Code operations
68 [\fB\-help\fR]
69 [\fB\-cipher\fR]
70 [\fB\-digest\fR]
71 [\fB\-macopt\fR]
72 [\fB\-in\fR \fIfilename\fR]
73 [\fB\-out\fR \fIfilename\fR]
[all …]
/freebsd/crypto/krb5/src/lib/crypto/crypto_tests/
H A Dt_cmac.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
28 * Test vectors for CMAC. Inputs are taken from RFC 4493 section 4. Outputs
29 * are changed for the use of Camellia-128 in place of AES-128.
31 * Ideally we would double-check subkey values, but we have no easy way to see
34 * Ideally we would test AES-CMAC against the expected results in RFC 4493,
35 * instead of Camellia-CMAC against results we generated ourselves. This has
37 * AES-128 enc provider has no cbc_mac method and therefore cannot be used with
43 /* All examples use the following Camellia-128 key. */
61 /* Expected result of CMAC on empty input. */
67 /* Expected result of CMAC on first 16 bytes of input. */
[all …]
/freebsd/crypto/krb5/src/lib/crypto/krb/
H A Detypes.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
39 "des3-cbc-raw", { 0 }, "Triple DES cbc mode raw",
49 "des3-cbc-sha1", { "des3-hmac-sha1", "des3-cbc-sha1-kd" },
59 /* rc4-hmac uses a 128-bit key, but due to weaknesses in the RC4 cipher, we
62 "arcfour-hmac", { "rc4-hmac", "arcfour-hmac-md5" },
73 "arcfour-hmac-exp", { "rc4-hmac-exp", "arcfour-hmac-md5-exp" },
86 "aes128-cts-hmac-sha1-96", { "aes128-cts", "aes128-sha1" },
87 "AES-128 CTS mode with 96-bit SHA-1 HMAC",
96 "aes256-cts-hmac-sha1-96", { "aes256-cts", "aes256-sha1" },
97 "AES-256 CTS mode with 96-bit SHA-1 HMAC",
[all …]
/freebsd/crypto/krb5/src/lib/crypto/builtin/
H A DMakefile.in3 SUBDIRS=camellia des aes md4 md5 sha1 sha2 enc_provider hash_provider
4 LOCALINCLUDES=-I$(srcdir)/../krb $(CRYPTO_IMPL_CFLAGS)
11 cmac.o \
17 $(OUTPRE)cmac.$(OBJEXT) \
23 $(srcdir)/cmac.c \
32 aes/OBJS.ST \
39 all-unix: all-libobjs
44 clean-unix:: clean-libobjs
/freebsd/crypto/openssl/providers/implementations/macs/
H A Dcmac_prov.c2 * Copyright 2018-2024 The OpenSSL Project Authors. All Rights Reserved.
11 * CMAC low level APIs are deprecated for public use, but still ok for internal
20 #include <openssl/cmac.h>
29 #include "crypto/cmac.h"
47 /* local CMAC data */
64 || (macctx->ctx = CMAC_CTX_new()) == NULL) { in cmac_new()
68 macctx->provctx = provctx; in cmac_new()
80 CMAC_CTX_free(macctx->ctx); in cmac_free()
81 ossl_prov_cipher_reset(&macctx->cipher); in cmac_free()
94 dst = cmac_new(src->provctx); in cmac_dup()
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A DOSSL_PROVIDER-FIPS.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "OSSL_PROVIDER-FIPS 7ossl"
58 .TH OSSL_PROVIDER-FIPS 7ossl 2025-09-30 3.5.4 OpenSSL
64 OSSL_PROVIDER\-FIPS \- OpenSSL FIPS provider
68 Information Processing Standards (FIPS) specified in FIPS 140\-3. This 'module'
90 query may also include other non-crypto support operations that
92 "Asymmetric Key Management" in \fBOSSL_PROVIDER\-default\fR\|(7).
105 See "Provider parameters" in \fBprovider\-base\fR\|(7) for a list of base parameters.
113 .IP "SHA1, see \fBEVP_MD\-SHA1\fR\|(7)" 4
114 .IX Item "SHA1, see EVP_MD-SHA1"
[all …]
H A DOSSL_PROVIDER-default.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "OSSL_PROVIDER-DEFAULT 7ossl"
58 .TH OSSL_PROVIDER-DEFAULT 7ossl 2025-09-30 3.5.4 OpenSSL
64 OSSL_PROVIDER\-default \- OpenSSL default provider
103 .IP "SHA1, see \fBEVP_MD\-SHA1\fR\|(7)" 4
104 .IX Item "SHA1, see EVP_MD-SHA1"
106 .IP "SHA2, see \fBEVP_MD\-SHA2\fR\|(7)" 4
107 .IX Item "SHA2, see EVP_MD-SHA2"
108 .IP "SHA3, see \fBEVP_MD\-SHA3\fR\|(7)" 4
109 .IX Item "SHA3, see EVP_MD-SHA3"
[all …]
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/
H A Dlac_sym_hash_defs.h1 /* SPDX-License-Identifier: BSD-3-Clause */
2 /* Copyright(c) 2007-2025 Intel Corporation */
156 * The Pre-compute operation involves deriving 3 128-bit
167 /* Constants for AES CMAC algorithm */
170 * AES CMAC block size in bytes */
173 * AES CMAC digest length in bytes */
175 /* constants for AES CCM */
178 * block size for CBC-MAC part of CCM */
183 /* constants for AES GCM */
207 /* constants for AES CBC MAC */
[all …]
/freebsd/sys/contrib/device-tree/Bindings/crypto/
H A Dnvidia,tegra234-se-aes.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-aes.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: NVIDIA Tegra Security Engine for AES algorithms
10 The Tegra Security Engine accelerates the following AES encryption/decryption
11 algorithms - AES-ECB, AES-CBC, AES-OFB, AES-XTS, AES-CTR, AES-GCM, AES-CCM,
12 AES-CMAC
15 - Akhil R <akhilrajeev@nvidia.com>
19 const: nvidia,tegra234-se-aes
[all …]
/freebsd/crypto/krb5/src/lib/crypto/openssl/
H A DMakefile.in4 LOCALINCLUDES=-I$(srcdir)/../krb $(CRYPTO_IMPL_CFLAGS)
7 cmac.o \
14 $(OUTPRE)cmac.$(OBJEXT) \
21 $(srcdir)/cmac.c \
31 aes/OBJS.ST
35 all-unix: all-libobjs
40 clean-unix:: clean-libobjs
/freebsd/crypto/openssl/providers/
H A Dfips.module.sources1 crypto/aes/aes_cbc.c
2 crypto/aes/aes_core.c
3 crypto/aes/aes_ecb.c
4 crypto/aes/aes_local.h
5 crypto/aes/aes_misc.c
6 crypto/aes/asm/aes-586.pl
7 crypto/aes/asm/aes-armv4.pl
8 crypto/aes/asm/aes-c64xplus.pl
9 crypto/aes/asm/aes-ia64.S
10 crypto/aes/asm/aes-mips.pl
[all …]
H A Dfips-sources.checksums1 0e22ea0cf34ef3871e30df0bc302dc29352d38001d1622ddb78a27a374b6aee8 crypto/aes/aes_cbc.c
2 c049a936d74100fcced225f575d46662792a6a0039777d2d4df0cf61eff90a68 crypto/aes/aes_core.c
3 3fac41ce96acb9189eac2d5571425c3ff33a34c884ae7e275e1fd3068b5fc662 crypto/aes/aes_ecb.c
4 c1e674d08683a25bc053f6233f73a0d0b3a90aafe591ff57b702c7da1582e4a5 crypto/aes/aes_local.h
5 a2466f18da5847c7d9fbced17524633c10ce024671a72f53f9c9c55b9b9923dd crypto/aes/aes_misc.c
6 6979c133f76f4623e62e6e970deae70fa025e713a72b71aead5a048d49e47f6f crypto/aes/asm/aes-586.pl
7 92be9ff608331a432e95247a8f4fb9e46897d0cb76f2b6db809b61d44287964a crypto/aes/asm/aes-armv4.pl
8 953897f86e2de9fa27ef411155ab3aed133af94885f1507e76449c142da78656 crypto/aes/asm/aes-c64xplus.pl
9 00196f01f5218ad731e6a058d406078f7228a9756d9d73f51c0d0c2a68f885af crypto/aes/asm/aes-ia64.S
10 88b6f8396cd9d86004743d5c3b0f72b7b8c3d5a2b00b0bbb761ba91ae5a7cdc8 crypto/aes/asm/aes-mips.pl
[all …]
/freebsd/crypto/openssl/demos/mac/
H A Dcmac-aes256.c1 /*-
2 * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
12 * a CMAC of static buffers
21 #include <openssl/cmac.h>
42 "The heart-ache, and the thousand natural shocks\n"
55 /* The known value of the CMAC/AES256 MAC of the above soliloqy */
75 char cipher_name[] = "AES-256-CBC"; in main()
83 /* Fetch the CMAC implementation */ in main()
84 mac = EVP_MAC_fetch(library_context, "CMAC", propq); in main()
90 /* Create a context for the CMAC operation */ in main()
[all …]
/freebsd/crypto/openssl/crypto/aes/asm/
H A Daesni-x86.pl2 # Copyright 2009-2020 The OpenSSL Project Authors. All Rights Reserved.
17 # This module implements support for Intel AES-NI extension. In
19 # drop-in replacement for crypto/aes/asm/aes-586.pl [see below for
24 # To start with see corresponding paragraph in aesni-x86_64.pl...
27 # The simplified table below represents 32-bit performance relative
28 # to 64-bit one in every given point. Ratios vary for different
31 # 16-byte 64-byte 256-byte 1-KB 8-KB
32 # 53-67% 67-84% 91-94% 95-98% 97-99.5%
35 # because function call overhead is higher in 32-bit mode. Largest
36 # 8-KB block performance is virtually same: 32-bit code is less than
[all …]
/freebsd/crypto/openssl/include/openssl/
H A Dcore_names.h.in2 * {- join("\n * ", @autowarntext) -}
4 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
11 {-
13 -}
29 # define OSSL_CIPHER_NAME_AES_128_GCM_SIV "AES-128-GCM-SIV"
30 # define OSSL_CIPHER_NAME_AES_192_GCM_SIV "AES-192-GCM-SIV"
31 # define OSSL_CIPHER_NAME_AES_256_GCM_SIV "AES-256-GCM-SIV"
35 # define OSSL_DIGEST_NAME_MD5_SHA1 "MD5-SHA1"
37 # define OSSL_DIGEST_NAME_SHA2_224 "SHA2-224"
38 # define OSSL_DIGEST_NAME_SHA2_256 "SHA2-256"
[all …]
/freebsd/crypto/openssl/crypto/objects/
H A Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi…
[all …]
/freebsd/contrib/ntp/sntp/
H A Dcrypto.c3 * - OpenSSL versions, if we are building with them
4 * - our versions
40 /* Check if CMAC key type specific code required */ in compute_mac()
49 (AES_128_KEY_SIZE - key_size)); in compute_mac()
54 msyslog(LOG_ERR, "make_mac: CMAC %s CTX new failed.", CMAC); in compute_mac()
58 msyslog(LOG_ERR, "make_mac: CMAC %s Init failed.", CMAC); in compute_mac()
61 msyslog(LOG_ERR, "make_mac: CMAC %s Update failed.", CMAC); in compute_mac()
[all...]
/freebsd/crypto/openssl/doc/man7/
H A DOSSL_PROVIDER-default.pod5 OSSL_PROVIDER-default - OpenSSL default provider
54 =item SHA1, see L<EVP_MD-SHA1(7)>
56 =item SHA2, see L<EVP_MD-SHA2(7)>
58 =item SHA3, see L<EVP_MD-SHA3(7)>
60 =item KECCAK, see L<EVP_MD-KECCAK(7)>
62 =item KECCAK-KMAC, see L<EVP_MD-KECCAK-KMAC(7)>
64 =item SHAKE, see L<EVP_MD-SHAKE(7)>
66 =item BLAKE2, see L<EVP_MD-BLAKE2(7)>
68 =item SM3, see L<EVP_MD-SM3(7)>
70 =item MD5, see L<EVP_MD-MD5(7)>
[all …]

1234