| /freebsd/contrib/llvm-project/clang/lib/Headers/ |
| H A D | shaintrin.h | 1 /*===---- shaintrin.h - SHA intrinsics -------------------------------------=== 5 * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 *===-----------------------------------------------------------------------=== 18 #define __DEFAULT_FN_ATTRS __attribute__((__always_inline__, __nodebug__, __target__("sha"), __min_… 20 /// Performs four iterations of the inner loop of the SHA-1 message digest 21 /// algorithm using the starting SHA-1 state (A, B, C, D) from the 128-bit 22 /// vector of [4 x i32] in \a V1 and the next four 32-bit elements of the 23 /// message from the 128-bit vector of [4 x i32] in \a V2. Note that the 24 /// SHA-1 state variable E must have already been added to \a V2 26 /// SHA-1 state (A, B, C, D) as a 128-bit vector of [4 x i32]. [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_sha224.pod | 11 - SHA-2 For EVP 26 SHA-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions 27 standardized in NIST FIPS 180-4, first published in 2001. 38 The SHA-2 SHA-224, SHA-256, SHA-512/224, SHA512/256, SHA-384 and SHA-512 39 algorithms, which generate 224, 256, 224, 256, 384 and 512 bits 42 The two algorithms: SHA-512/224 and SHA512/256 are truncated forms of the 43 SHA-512 algorithm. They are distinct from SHA-224 and SHA-256 even though 52 L<EVP_MD_fetch(3)> with L<EVP_MD-SHA2(7)>instead. 63 NIST FIPS 180-4. 72 Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
|
| H A D | EVP_sha3_224.pod | 11 - SHA-3 For EVP 27 SHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions 38 The SHA-3 SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 algorithms 39 respectively. They produce 224, 256, 384 and 512 bits of output from a given 45 The SHAKE-128 and SHAKE-256 Extendable Output Functions (XOF) that can generate 49 B<EVP_shake256> provides that of 256 bits. 57 L<EVP_MD_fetch(3)> with L<EVP_MD-SHA3(7)> or L<EVP_MD-SHAKE(7)> instead. 77 Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
|
| H A D | OPENSSL_s390xcap.pod | 5 OPENSSL_s390xcap - the IBM z processor capabilities vector 23 The environment variable is a semicolon-separated list of tokens which is 42 The name of an instruction followed by two 64-bit masks. The part of the 44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>, 50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The 52 instruction is set to the specified 192-bit mask. 61 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is 65 rows separate the individual 64-bit masks. The bit numbers in the first 67 the numbering is continuous across 64-bit mask boundaries. 72 # 17 1<<46 message-security assist [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_MD-SHA2.pod | 5 EVP_MD-SHA2 - The SHA2 EVP_MD implementation 23 =item SHA2-224 25 Known names are "SHA2-224", "SHA-224" and "SHA224". 27 =item SHA2-256 29 Known names are "SHA2-256", "SHA-256" and "SHA256". 31 =item SHA2-384 33 Known names are "SHA2-384", "SHA-384" and "SHA384". 35 =item SHA2-512 37 Known names are "SHA2-512", "SHA-512" and "SHA512". 47 =item SHA2-256/192 [all …]
|
| H A D | EVP_PKEY-SLH-DSA.pod | 5 EVP_PKEY-SLH-DSA, EVP_KEYMGMT-SLH-DSA, 6 EVP_PKEY-SLH-DSA-SHA2-128s, EVP_PKEY-SLH-DSA-SHA2-128f, 7 EVP_PKEY-SLH-DSA-SHA2-192s, EVP_PKEY-SLH-DSA-SHA2-192f, 8 EVP_PKEY-SLH-DSA-SHA2-256s, EVP_PKEY-SLH-DSA-SHA2-256f, 9 EVP_PKEY-SLH-DSA-SHAKE-128s, EVP_PKEY-SLH-DSA-SHAKE-128f, 10 EVP_PKEY-SLH-DSA-SHAKE-192s, EVP_PKEY-SLH-DSA-SHAKE-192f, 11 EVP_PKEY-SLH-DSA-SHAKE-256s, EVP_PKEY-SLH-DSA-SHAKE-256f 12 - EVP_PKEY SLH-DSA keytype and algorithm support 16 The B<SLH-DSA-SHA2-128s>, B<EVP_PKEY-SLH-DSA-SHA2-128f>, 17 B<SLH-DSA-SHA2-192s>, B<EVP_PKEY-SLH-DSA-SHA2-192f>, [all …]
|
| /freebsd/lib/libmd/tests/ |
| H A D | Makefile | 7 MDTESTS= md rmd sha skein 35 .if ${mdt} == "sha" 36 CFLAGS_${mdtc}driver= -DSHA=${mdtc:C/sha//:C/t//} 38 CFLAGS_${mdtc}driver= -D${mdt:tu}=${mdtc:C/${mdt}//} 52 @echo " atf_check -o file:\$$(atf_get_srcdir)/${_digest}.ref \\" >> \ 86 echo 'SHA-0 test suite:' > ${.TARGET} 87 @echo 'SHA-0 ("") = f96cea198ad1dd5617ac084a3d92c6107708c0ef' >> ${.TARGET} 88 @echo 'SHA-0 ("abc") = 0164b8a914cd2a5e74c4f7ff082c4d97f1edf880' >> ${.TARGET} 89 @echo 'SHA-0 ("message digest") =' \ 91 @echo 'SHA-0 ("abcdefghijklmnopqrstuvwxyz") =' \ [all …]
|
| /freebsd/contrib/bearssl/tools/ |
| H A D | names.c | 39 { "sha1", &br_sha1_vtable, "SHA-1" }, 40 { "sha224", &br_sha224_vtable, "SHA-224" }, 41 { "sha256", &br_sha256_vtable, "SHA-256" }, 42 { "sha384", &br_sha384_vtable, "SHA-384" }, 43 { "sha512", &br_sha512_vtable, "SHA-512" }, 65 "ECDHE with ECDSA, AES-128/GCM encryption (TLS 1.2+)" 71 "ECDHE with RSA, AES-128/GCM encryption (TLS 1.2+)" 77 "ECDHE with ECDSA, AES-256/GCM encryption (TLS 1.2+)" 83 "ECDHE with RSA, AES-256/GCM encryption (TLS 1.2+)" 89 "ECDHE with ECDSA, AES-128/CCM encryption (TLS 1.2+)" [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_MD-SHA2.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_MD-SHA2 7ossl" 58 .TH EVP_MD-SHA2 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_MD\-SHA2 \- The SHA2 EVP_MD implementation 74 .IP SHA2\-224 4 75 .IX Item "SHA2-224" 76 Known names are "SHA2\-224", "SHA\-224" and "SHA224". 77 .IP SHA2\-256 4 78 .IX Item "SHA2-256" 79 Known names are "SHA2\-256", "SHA\-256" and "SHA256". [all …]
|
| H A D | EVP_PKEY-SLH-DSA.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_PKEY-SLH-DSA 7ossl" 58 .TH EVP_PKEY-SLH-DSA 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_PKEY\-SLH\-DSA, EVP_KEYMGMT\-SLH\-DSA, 65 EVP_PKEY\-SLH\-DSA\-SHA2\-128s, EVP_PKEY\-SLH\-DSA\-SHA2\-128f, 66 EVP_PKEY\-SLH\-DSA\-SHA2\-192s, EVP_PKEY\-SLH\-DSA\-SHA2\-192f, 67 EVP_PKEY\-SLH\-DSA\-SHA2\-256s, EVP_PKEY\-SLH\-DSA\-SHA2\-256f, 68 EVP_PKEY\-SLH\-DSA\-SHAKE\-128s, EVP_PKEY\-SLH\-DSA\-SHAKE\-128f, 69 EVP_PKEY\-SLH\-DSA\-SHAKE\-192s, EVP_PKEY\-SLH\-DSA\-SHAKE\-192f, 70 EVP_PKEY\-SLH\-DSA\-SHAKE\-256s, EVP_PKEY\-SLH\-DSA\-SHAKE\-256f [all …]
|
| /freebsd/contrib/bearssl/inc/ |
| H A D | bearssl_hash.h | 48 * - `br_xxx_vtable` 52 * - `br_xxx_SIZE` 57 * - `br_xxx_ID` 64 * standard](https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1), 66 * 1 to 6 for MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, 69 * - `br_xxx_context` 80 * - `br_xxx_init(br_xxx_context *ctx)` 88 * - `br_xxx_update(br_xxx_context *ctx, const void *data, size_t len)` 93 * - `br_xxx_out(const br_xxx_context *ctx, void *out)` 101 * - `br_xxx_state(const br_xxx_context *ctx, void *out)` [all …]
|
| H A D | bearssl_prf.h | 44 * TLS 1.0 and 1.1 define a PRF that is based on both MD5 and SHA-1. This 49 * PRF with, respectively, SHA-256 and SHA-384. Most standard cipher suites 50 * rely on the SHA-256 based PRF, but some use SHA-384. 81 * MD5 and SHA-1. 87 * \param label PRF label (zero-terminated ASCII string). 89 * \param seed seed chnks for this computation (usually non-secret). 96 * \brief PRF implementation for TLS 1.2, with SHA-256. 99 * function is SHA-256. 105 * \param label PRF label (zero-terminated ASCII string). 107 * \param seed seed chnks for this computation (usually non-secret). [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_sha224.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH EVP_SHA224 3ossl 2025-09-30 3.5.4 OpenSSL 70 \&\- SHA\-2 For EVP 85 SHA\-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions 86 standardized in NIST FIPS 180\-4, first published in 2001. 89 The SHA\-2 SHA\-224, SHA\-256, SHA\-512/224, SHA512/256, SHA\-384 and SHA\-512 90 algorithms, which generate 224, 256, 224, 256, 384 and 512 bits 93 The two algorithms: SHA\-512/224 and SHA512/256 are truncated forms of the 94 SHA\-512 algorithm. They are distinct from SHA\-224 and SHA\-256 even though 100 \&\fBEVP_MD_fetch\fR\|(3) with \fBEVP_MD\-SHA2\fR\|(7)instead. [all …]
|
| H A D | OPENSSL_s390xcap.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH OPENSSL_S390XCAP 3ossl 2025-09-30 3.5.4 OpenSSL 64 OPENSSL_s390xcap \- the IBM z processor capabilities vector 82 The environment variable is a semicolon-separated list of tokens which is 99 The name of an instruction followed by two 64\-bit masks. The part of the 101 set to the specified 128\-bit mask. Possible values are \fBkimd\fR, \fBklmd\fR, 106 Store-facility-list-extended (stfle) followed by three 64\-bit masks. The 108 instruction is set to the specified 192\-bit mask. 114 The 64\-bit masks are specified in hexadecimal notation. The 0x prefix is 118 rows separate the individual 64\-bit masks. The bit numbers in the first [all …]
|
| H A D | EVP_sha3_224.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH EVP_SHA3_224 3ossl 2025-09-30 3.5.4 OpenSSL 70 \&\- SHA\-3 For EVP 86 SHA\-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions 91 The SHA\-3 SHA\-3\-224, SHA\-3\-256, SHA\-3\-384, and SHA\-3\-512 algorithms 92 respectively. They produce 224, 256, 384 and 512 bits of output from a given 96 The SHAKE\-128 and SHAKE\-256 Extendable Output Functions (XOF) that can generate 100 \&\fBEVP_shake256\fR provides that of 256 bits. 105 \&\fBEVP_MD_fetch\fR\|(3) with \fBEVP_MD\-SHA3\fR\|(7) or \fBEVP_MD\-SHAKE\fR\|(7) instead. 121 Copyright 2017\-2023 The OpenSSL Project Authors. All Rights Reserved.
|
| /freebsd/crypto/openssl/demos/certs/apps/ |
| H A D | mkxcerts.sh | 3 # Create certificates using various algorithms to test multi-certificate 12 CN="OpenSSL Test RSA SHA-1 cert" opensslcmd req \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 14 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1 15 CN="OpenSSL Test RSA SHA-256 cert" opensslcmd req \ 16 -config apps.cnf -extensions usr_cert -x509 -nodes \ 17 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256 18 CN="OpenSSL Test RSA SHA-512 cert" opensslcmd req \ 19 -config apps.cnf -extensions usr_cert -x509 -nodes \ 20 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512 [all …]
|
| /freebsd/sys/cddl/boot/zfs/ |
| H A D | sha256.c | 32 * SHA-256 and SHA-512/256 hashes, as specified in FIPS 180-4, available at: 35 * This is a very compact implementation of SHA-256 and SHA-512/256. 40 * The literal definitions according to FIPS180-4 would be: 49 #define ROTR(x, n) (((x) >> (n)) | ((x) << ((sizeof (x) * NBBY)-(n)))) 51 /* SHA-224/256 operations */ 57 /* SHA-384/512 operations */ 63 /* SHA-256 round constants */ 83 /* SHA-512 round constants */ 138 W[t] = SIGMA1_256(W[t - 2]) + W[t - 7] + in SHA256Transform() 139 SIGMA0_256(W[t - 15]) + W[t - 16]; in SHA256Transform() [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-ciphers.1 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "OPENSSL-CIPHERS 1ossl" 58 .TH OPENSSL-CIPHERS 1ossl 2025-09-30 3.5.4 OpenSSL 64 openssl\-ciphers \- SSL cipher display and cipher list command 68 [\fB\-help\fR] 69 [\fB\-s\fR] 70 [\fB\-v\fR] 71 [\fB\-V\fR] 72 [\fB\-ssl3\fR] 73 [\fB\-tls1\fR] [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-ciphers.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-ciphers - SSL cipher display and cipher list command 11 [B<-help>] 12 [B<-s>] 13 [B<-v>] 14 [B<-V>] 15 [B<-ssl3>] 16 [B<-tls1>] 17 [B<-tls1_1>] 18 [B<-tls1_2>] [all …]
|
| /freebsd/contrib/xz/src/liblzma/check/ |
| H A D | check.h | 1 // SPDX-License-Identifier: 0BSD 17 // If the function for external SHA-256 is missing, use the internal SHA-256 39 /// State for the internal SHA-256 implementation 88 /// Check-specific data 105 /// Finish the check calculation and store the result to check->buffer.u8. 111 /// Prepare SHA-256 state for new input. 114 /// Update the SHA-256 hash state 118 /// Finish the SHA-256 calculation and store the result to check->buffer.u8. 127 LZMA_SHA256FUNC(Init)(&check->state.sha256); in lzma_sha256_init() 138 LZMA_SHA256FUNC(Update)(&check->state.sha256, buf, UINT32_MAX); in lzma_sha256_update() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | sha2.c | 7 * Copyright (c) 2000-2001, Aaron D. Gifford 44 /* no-op out, similar to DEF_WEAK but only needed here */ 48 #include "openbsd-compat/sha2.h" 56 * cc -DSHA2_UNROLL_TRANSFORM -o sha2 sha2.c sha2prog.c 69 /*** SHA-224/256/384/512 Machine Architecture Definitions *****************/ 74 * architecture is little-endian, make sure it also defines 84 * And for little-endian machines, add: 88 * Or for big-endian machines: 102 /*** SHA-224/256/384/512 Various Length Definitions ***********************/ 104 #define SHA224_SHORT_BLOCK_LENGTH (SHA224_BLOCK_LENGTH - 8) [all …]
|
| /freebsd/sbin/md5/ |
| H A D | md5.1 | 12 .Nd calculate a message-digest fingerprint (checksum) for a file 22 .Op Fl -binary 23 .Op Fl -check 24 .Op Fl -help 25 .Op Fl -ignore-missing 26 .Op Fl -quiet 27 .Op Fl -status 28 .Op Fl -strict 29 .Op Fl -tag 30 .Op Fl -text [all …]
|
| /freebsd/crypto/openssl/providers/implementations/include/prov/ |
| H A D | names.h | 2 * Copyright 2021-2025 The OpenSSL Project Authors. All Rights Reserved. 22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] 31 * algorithms together, e.g. MD5-SHA1. 34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC) 39 /*- 41 * ----------------- 45 #define PROV_NAMES_GENERIC "GENERIC-SECRET" 48 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" 49 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" 50 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ssl3.h | 2 * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved. 36 * Signalling cipher suite value from draft-ietf-tls-downgrade-scsv-00 90 # define SSL3_TXT_RSA_NULL_MD5 "NULL-MD5" 91 # define SSL3_TXT_RSA_NULL_SHA "NULL-SHA" 92 # define SSL3_TXT_RSA_RC4_40_MD5 "EXP-RC4-MD5" 93 # define SSL3_TXT_RSA_RC4_128_MD5 "RC4-MD5" 94 # define SSL3_TXT_RSA_RC4_128_SHA "RC4-SHA" 95 # define SSL3_TXT_RSA_RC2_40_MD5 "EXP-RC2-CBC-MD5" 96 # define SSL3_TXT_RSA_IDEA_128_SHA "IDEA-CBC-SHA" 97 # define SSL3_TXT_RSA_DES_40_CBC_SHA "EXP-DES-CBC-SHA" [all …]
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_kdf_test.c | 1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ 30 #include "k5-platform.h" 38 {0, sizeof(s)-1, (char *) s} 41 /* values from test vectors in the pkinit-alg-agility draft */ 42 int secret_len = 256; 91 /* set up a 256-byte, ALL-ZEROS secret */ in main() 100 /* set-up the partyUInfo and partyVInfo principals */ in main() 110 /* The test vectors in RFC 8636 implicitly use NT-PRINCIPAL names. */ in main() 111 u_principal->type = KRB5_NT_PRINCIPAL; in main() 112 v_principal->type = KRB5_NT_PRINCIPAL; in main() [all …]
|