Home
last modified time | relevance | path

Searched +full:sha +full:- +full:256 (Results 1 – 25 of 401) sorted by relevance

12345678910>>...17

/freebsd/contrib/llvm-project/clang/lib/Headers/
H A Dshaintrin.h1 /*===---- shaintrin.h - SHA intrinsics -------------------------------------===
5 * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 *===-----------------------------------------------------------------------===
18 #define __DEFAULT_FN_ATTRS __attribute__((__always_inline__, __nodebug__, __target__("sha"), __min_…
20 /// Performs four iterations of the inner loop of the SHA-1 message digest
21 /// algorithm using the starting SHA-1 state (A, B, C, D) from the 128-bit
22 /// vector of [4 x i32] in \a V1 and the next four 32-bit elements of the
23 /// message from the 128-bit vector of [4 x i32] in \a V2. Note that the
24 /// SHA-1 state variable E must have already been added to \a V2
26 /// SHA-1 state (A, B, C, D) as a 128-bit vector of [4 x i32].
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_sha224.pod11 - SHA-2 For EVP
26 SHA-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions
27 standardized in NIST FIPS 180-4, first published in 2001.
38 The SHA-2 SHA-224, SHA-256, SHA-512/224, SHA512/256, SHA-384 and SHA-512
39 algorithms, which generate 224, 256, 224, 256, 384 and 512 bits
42 The two algorithms: SHA-512/224 and SHA512/256 are truncated forms of the
43 SHA-512 algorithm. They are distinct from SHA-224 and SHA-256 even though
52 L<EVP_MD_fetch(3)> with L<EVP_MD-SHA2(7)>instead.
63 NIST FIPS 180-4.
72 Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
H A DEVP_sha3_224.pod11 - SHA-3 For EVP
27 SHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions
38 The SHA-3 SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 algorithms
39 respectively. They produce 224, 256, 384 and 512 bits of output from a given
45 The SHAKE-128 and SHAKE-256 Extendable Output Functions (XOF) that can generate
49 B<EVP_shake256> provides that of 256 bits.
57 L<EVP_MD_fetch(3)> with L<EVP_MD-SHA3(7)> or L<EVP_MD-SHAKE(7)> instead.
77 Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
H A DOPENSSL_s390xcap.pod5 OPENSSL_s390xcap - the IBM z processor capabilities vector
23 The environment variable is a semicolon-separated list of tokens which is
42 The name of an instruction followed by two 64-bit masks. The part of the
44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>,
50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The
52 instruction is set to the specified 192-bit mask.
61 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is
65 rows separate the individual 64-bit masks. The bit numbers in the first
67 the numbering is continuous across 64-bit mask boundaries.
72 # 17 1<<46 message-security assist
[all …]
/freebsd/crypto/openssl/doc/man7/
H A DEVP_MD-SHA2.pod5 EVP_MD-SHA2 - The SHA2 EVP_MD implementation
23 =item SHA2-224
25 Known names are "SHA2-224", "SHA-224" and "SHA224".
27 =item SHA2-256
29 Known names are "SHA2-256", "SHA-256" and "SHA256".
31 =item SHA2-384
33 Known names are "SHA2-384", "SHA-384" and "SHA384".
35 =item SHA2-512
37 Known names are "SHA2-512", "SHA-512" and "SHA512".
47 =item SHA2-256/192
[all …]
H A DEVP_PKEY-SLH-DSA.pod5 EVP_PKEY-SLH-DSA, EVP_KEYMGMT-SLH-DSA,
6 EVP_PKEY-SLH-DSA-SHA2-128s, EVP_PKEY-SLH-DSA-SHA2-128f,
7 EVP_PKEY-SLH-DSA-SHA2-192s, EVP_PKEY-SLH-DSA-SHA2-192f,
8 EVP_PKEY-SLH-DSA-SHA2-256s, EVP_PKEY-SLH-DSA-SHA2-256f,
9 EVP_PKEY-SLH-DSA-SHAKE-128s, EVP_PKEY-SLH-DSA-SHAKE-128f,
10 EVP_PKEY-SLH-DSA-SHAKE-192s, EVP_PKEY-SLH-DSA-SHAKE-192f,
11 EVP_PKEY-SLH-DSA-SHAKE-256s, EVP_PKEY-SLH-DSA-SHAKE-256f
12 - EVP_PKEY SLH-DSA keytype and algorithm support
16 The B<SLH-DSA-SHA2-128s>, B<EVP_PKEY-SLH-DSA-SHA2-128f>,
17 B<SLH-DSA-SHA2-192s>, B<EVP_PKEY-SLH-DSA-SHA2-192f>,
[all …]
/freebsd/lib/libmd/tests/
H A DMakefile7 MDTESTS= md rmd sha skein
35 .if ${mdt} == "sha"
36 CFLAGS_${mdtc}driver= -DSHA=${mdtc:C/sha//:C/t//}
38 CFLAGS_${mdtc}driver= -D${mdt:tu}=${mdtc:C/${mdt}//}
52 @echo " atf_check -o file:\$$(atf_get_srcdir)/${_digest}.ref \\" >> \
86 echo 'SHA-0 test suite:' > ${.TARGET}
87 @echo 'SHA-0 ("") = f96cea198ad1dd5617ac084a3d92c6107708c0ef' >> ${.TARGET}
88 @echo 'SHA-0 ("abc") = 0164b8a914cd2a5e74c4f7ff082c4d97f1edf880' >> ${.TARGET}
89 @echo 'SHA-0 ("message digest") =' \
91 @echo 'SHA-0 ("abcdefghijklmnopqrstuvwxyz") =' \
[all …]
/freebsd/contrib/bearssl/tools/
H A Dnames.c39 { "sha1", &br_sha1_vtable, "SHA-1" },
40 { "sha224", &br_sha224_vtable, "SHA-224" },
41 { "sha256", &br_sha256_vtable, "SHA-256" },
42 { "sha384", &br_sha384_vtable, "SHA-384" },
43 { "sha512", &br_sha512_vtable, "SHA-512" },
65 "ECDHE with ECDSA, AES-128/GCM encryption (TLS 1.2+)"
71 "ECDHE with RSA, AES-128/GCM encryption (TLS 1.2+)"
77 "ECDHE with ECDSA, AES-256/GCM encryption (TLS 1.2+)"
83 "ECDHE with RSA, AES-256/GCM encryption (TLS 1.2+)"
89 "ECDHE with ECDSA, AES-128/CCM encryption (TLS 1.2+)"
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_MD-SHA2.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "EVP_MD-SHA2 7ossl"
58 .TH EVP_MD-SHA2 7ossl 2025-09-30 3.5.4 OpenSSL
64 EVP_MD\-SHA2 \- The SHA2 EVP_MD implementation
74 .IP SHA2\-224 4
75 .IX Item "SHA2-224"
76 Known names are "SHA2\-224", "SHA\-224" and "SHA224".
77 .IP SHA2\-256 4
78 .IX Item "SHA2-256"
79 Known names are "SHA2\-256", "SHA\-256" and "SHA256".
[all …]
H A DEVP_PKEY-SLH-DSA.71 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "EVP_PKEY-SLH-DSA 7ossl"
58 .TH EVP_PKEY-SLH-DSA 7ossl 2025-09-30 3.5.4 OpenSSL
64 EVP_PKEY\-SLH\-DSA, EVP_KEYMGMT\-SLH\-DSA,
65 EVP_PKEY\-SLH\-DSA\-SHA2\-128s, EVP_PKEY\-SLH\-DSA\-SHA2\-128f,
66 EVP_PKEY\-SLH\-DSA\-SHA2\-192s, EVP_PKEY\-SLH\-DSA\-SHA2\-192f,
67 EVP_PKEY\-SLH\-DSA\-SHA2\-256s, EVP_PKEY\-SLH\-DSA\-SHA2\-256f,
68 EVP_PKEY\-SLH\-DSA\-SHAKE\-128s, EVP_PKEY\-SLH\-DSA\-SHAKE\-128f,
69 EVP_PKEY\-SLH\-DSA\-SHAKE\-192s, EVP_PKEY\-SLH\-DSA\-SHAKE\-192f,
70 EVP_PKEY\-SLH\-DSA\-SHAKE\-256s, EVP_PKEY\-SLH\-DSA\-SHAKE\-256f
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_hash.h48 * - `br_xxx_vtable`
52 * - `br_xxx_SIZE`
57 * - `br_xxx_ID`
64 * standard](https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1),
66 * 1 to 6 for MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512,
69 * - `br_xxx_context`
80 * - `br_xxx_init(br_xxx_context *ctx)`
88 * - `br_xxx_update(br_xxx_context *ctx, const void *data, size_t len)`
93 * - `br_xxx_out(const br_xxx_context *ctx, void *out)`
101 * - `br_xxx_state(const br_xxx_context *ctx, void *out)`
[all …]
H A Dbearssl_prf.h44 * TLS 1.0 and 1.1 define a PRF that is based on both MD5 and SHA-1. This
49 * PRF with, respectively, SHA-256 and SHA-384. Most standard cipher suites
50 * rely on the SHA-256 based PRF, but some use SHA-384.
81 * MD5 and SHA-1.
87 * \param label PRF label (zero-terminated ASCII string).
89 * \param seed seed chnks for this computation (usually non-secret).
96 * \brief PRF implementation for TLS 1.2, with SHA-256.
99 * function is SHA-256.
105 * \param label PRF label (zero-terminated ASCII string).
107 * \param seed seed chnks for this computation (usually non-secret).
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_sha224.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH EVP_SHA224 3ossl 2025-09-30 3.5.4 OpenSSL
70 \&\- SHA\-2 For EVP
85 SHA\-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions
86 standardized in NIST FIPS 180\-4, first published in 2001.
89 The SHA\-2 SHA\-224, SHA\-256, SHA\-512/224, SHA512/256, SHA\-384 and SHA\-512
90 algorithms, which generate 224, 256, 224, 256, 384 and 512 bits
93 The two algorithms: SHA\-512/224 and SHA512/256 are truncated forms of the
94 SHA\-512 algorithm. They are distinct from SHA\-224 and SHA\-256 even though
100 \&\fBEVP_MD_fetch\fR\|(3) with \fBEVP_MD\-SHA2\fR\|(7)instead.
[all …]
H A DOPENSSL_s390xcap.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH OPENSSL_S390XCAP 3ossl 2025-09-30 3.5.4 OpenSSL
64 OPENSSL_s390xcap \- the IBM z processor capabilities vector
82 The environment variable is a semicolon-separated list of tokens which is
99 The name of an instruction followed by two 64\-bit masks. The part of the
101 set to the specified 128\-bit mask. Possible values are \fBkimd\fR, \fBklmd\fR,
106 Store-facility-list-extended (stfle) followed by three 64\-bit masks. The
108 instruction is set to the specified 192\-bit mask.
114 The 64\-bit masks are specified in hexadecimal notation. The 0x prefix is
118 rows separate the individual 64\-bit masks. The bit numbers in the first
[all …]
H A DEVP_sha3_224.31 .\" -*- mode: troff; coding: utf-8 -*-
58 .TH EVP_SHA3_224 3ossl 2025-09-30 3.5.4 OpenSSL
70 \&\- SHA\-3 For EVP
86 SHA\-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions
91 The SHA\-3 SHA\-3\-224, SHA\-3\-256, SHA\-3\-384, and SHA\-3\-512 algorithms
92 respectively. They produce 224, 256, 384 and 512 bits of output from a given
96 The SHAKE\-128 and SHAKE\-256 Extendable Output Functions (XOF) that can generate
100 \&\fBEVP_shake256\fR provides that of 256 bits.
105 \&\fBEVP_MD_fetch\fR\|(3) with \fBEVP_MD\-SHA3\fR\|(7) or \fBEVP_MD\-SHAKE\fR\|(7) instead.
121 Copyright 2017\-2023 The OpenSSL Project Authors. All Rights Reserved.
/freebsd/crypto/openssl/demos/certs/apps/
H A Dmkxcerts.sh3 # Create certificates using various algorithms to test multi-certificate
12 CN="OpenSSL Test RSA SHA-1 cert" opensslcmd req \
13 -config apps.cnf -extensions usr_cert -x509 -nodes \
14 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1
15 CN="OpenSSL Test RSA SHA-256 cert" opensslcmd req \
16 -config apps.cnf -extensions usr_cert -x509 -nodes \
17 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256
18 CN="OpenSSL Test RSA SHA-512 cert" opensslcmd req \
19 -config apps.cnf -extensions usr_cert -x509 -nodes \
20 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512
[all …]
/freebsd/sys/cddl/boot/zfs/
H A Dsha256.c32 * SHA-256 and SHA-512/256 hashes, as specified in FIPS 180-4, available at:
35 * This is a very compact implementation of SHA-256 and SHA-512/256.
40 * The literal definitions according to FIPS180-4 would be:
49 #define ROTR(x, n) (((x) >> (n)) | ((x) << ((sizeof (x) * NBBY)-(n))))
51 /* SHA-224/256 operations */
57 /* SHA-384/512 operations */
63 /* SHA-256 round constants */
83 /* SHA-512 round constants */
138 W[t] = SIGMA1_256(W[t - 2]) + W[t - 7] + in SHA256Transform()
139 SIGMA0_256(W[t - 15]) + W[t - 16]; in SHA256Transform()
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-ciphers.11 .\" -*- mode: troff; coding: utf-8 -*-
57 .IX Title "OPENSSL-CIPHERS 1ossl"
58 .TH OPENSSL-CIPHERS 1ossl 2025-09-30 3.5.4 OpenSSL
64 openssl\-ciphers \- SSL cipher display and cipher list command
68 [\fB\-help\fR]
69 [\fB\-s\fR]
70 [\fB\-v\fR]
71 [\fB\-V\fR]
72 [\fB\-ssl3\fR]
73 [\fB\-tls1\fR]
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-ciphers - SSL cipher display and cipher list command
11 [B<-help>]
12 [B<-s>]
13 [B<-v>]
14 [B<-V>]
15 [B<-ssl3>]
16 [B<-tls1>]
17 [B<-tls1_1>]
18 [B<-tls1_2>]
[all …]
/freebsd/contrib/xz/src/liblzma/check/
H A Dcheck.h1 // SPDX-License-Identifier: 0BSD
17 // If the function for external SHA-256 is missing, use the internal SHA-256
39 /// State for the internal SHA-256 implementation
88 /// Check-specific data
105 /// Finish the check calculation and store the result to check->buffer.u8.
111 /// Prepare SHA-256 state for new input.
114 /// Update the SHA-256 hash state
118 /// Finish the SHA-256 calculation and store the result to check->buffer.u8.
127 LZMA_SHA256FUNC(Init)(&check->state.sha256); in lzma_sha256_init()
138 LZMA_SHA256FUNC(Update)(&check->state.sha256, buf, UINT32_MAX); in lzma_sha256_update()
[all …]
/freebsd/crypto/openssh/openbsd-compat/
H A Dsha2.c7 * Copyright (c) 2000-2001, Aaron D. Gifford
44 /* no-op out, similar to DEF_WEAK but only needed here */
48 #include "openbsd-compat/sha2.h"
56 * cc -DSHA2_UNROLL_TRANSFORM -o sha2 sha2.c sha2prog.c
69 /*** SHA-224/256/384/512 Machine Architecture Definitions *****************/
74 * architecture is little-endian, make sure it also defines
84 * And for little-endian machines, add:
88 * Or for big-endian machines:
102 /*** SHA-224/256/384/512 Various Length Definitions ***********************/
104 #define SHA224_SHORT_BLOCK_LENGTH (SHA224_BLOCK_LENGTH - 8)
[all …]
/freebsd/sbin/md5/
H A Dmd5.112 .Nd calculate a message-digest fingerprint (checksum) for a file
22 .Op Fl -binary
23 .Op Fl -check
24 .Op Fl -help
25 .Op Fl -ignore-missing
26 .Op Fl -quiet
27 .Op Fl -status
28 .Op Fl -strict
29 .Op Fl -tag
30 .Op Fl -text
[all …]
/freebsd/crypto/openssl/providers/implementations/include/prov/
H A Dnames.h2 * Copyright 2021-2025 The OpenSSL Project Authors. All Rights Reserved.
22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?]
31 * algorithms together, e.g. MD5-SHA1.
34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC)
39 /*-
41 * -----------------
45 #define PROV_NAMES_GENERIC "GENERIC-SECRET"
48 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41"
49 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21"
50 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1"
[all …]
/freebsd/crypto/openssl/include/openssl/
H A Dssl3.h2 * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved.
36 * Signalling cipher suite value from draft-ietf-tls-downgrade-scsv-00
90 # define SSL3_TXT_RSA_NULL_MD5 "NULL-MD5"
91 # define SSL3_TXT_RSA_NULL_SHA "NULL-SHA"
92 # define SSL3_TXT_RSA_RC4_40_MD5 "EXP-RC4-MD5"
93 # define SSL3_TXT_RSA_RC4_128_MD5 "RC4-MD5"
94 # define SSL3_TXT_RSA_RC4_128_SHA "RC4-SHA"
95 # define SSL3_TXT_RSA_RC2_40_MD5 "EXP-RC2-CBC-MD5"
96 # define SSL3_TXT_RSA_IDEA_128_SHA "IDEA-CBC-SHA"
97 # define SSL3_TXT_RSA_DES_40_CBC_SHA "EXP-DES-CBC-SHA"
[all …]
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_kdf_test.c1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
30 #include "k5-platform.h"
38 {0, sizeof(s)-1, (char *) s}
41 /* values from test vectors in the pkinit-alg-agility draft */
42 int secret_len = 256;
91 /* set up a 256-byte, ALL-ZEROS secret */ in main()
100 /* set-up the partyUInfo and partyVInfo principals */ in main()
110 /* The test vectors in RFC 8636 implicitly use NT-PRINCIPAL names. */ in main()
111 u_principal->type = KRB5_NT_PRINCIPAL; in main()
112 v_principal->type = KRB5_NT_PRINCIPAL; in main()
[all …]

12345678910>>...17