/freebsd/contrib/llvm-project/clang/lib/Headers/ |
H A D | shaintrin.h | 1 /*===---- shaintrin.h - SHA intrinsics -------------------------------------=== 5 * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 *===-----------------------------------------------------------------------=== 18 #define __DEFAULT_FN_ATTRS __attribute__((__always_inline__, __nodebug__, __target__("sha"), __min_… 20 /// Performs four iterations of the inner loop of the SHA-1 message digest 21 /// algorithm using the starting SHA-1 state (A, B, C, D) from the 128-bit 22 /// vector of [4 x i32] in \a V1 and the next four 32-bit elements of the 23 /// message from the 128-bit vector of [4 x i32] in \a V2. Note that the 24 /// SHA-1 state variable E must have already been added to \a V2 26 /// SHA-1 state (A, B, C, D) as a 128-bit vector of [4 x i32]. [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_sha224.pod | 11 - SHA-2 For EVP 26 SHA-2 (Secure Hash Algorithm 2) is a family of cryptographic hash functions 27 standardized in NIST FIPS 180-4, first published in 2001. 38 The SHA-2 SHA-224, SHA-256, SHA-512/224, SHA512/256, SHA-384 and SHA-512 39 algorithms, which generate 224, 256, 224, 256, 384 and 512 bits 42 The two algorithms: SHA-512/224 and SHA512/256 are truncated forms of the 43 SHA-512 algorithm. They are distinct from SHA-224 and SHA-256 even though 52 L<EVP_MD_fetch(3)> with L<EVP_MD-SHA2(7)>instead. 63 NIST FIPS 180-4. 72 Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
|
H A D | EVP_sha3_224.pod | 11 - SHA-3 For EVP 27 SHA-3 (Secure Hash Algorithm 3) is a family of cryptographic hash functions 38 The SHA-3 SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 algorithms 39 respectively. They produce 224, 256, 384 and 512 bits of output from a given 45 The SHAKE-128 and SHAKE-256 Extendable Output Functions (XOF) that can generate 49 B<EVP_shake256> provides that of 256 bits. 57 L<EVP_MD_fetch(3)> with L<EVP_MD-SHA3(7)> or L<EVP_MD-SHAKE(7)> instead. 77 Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
|
/freebsd/lib/libmd/tests/ |
H A D | Makefile | 7 MDTESTS= md rmd sha skein 35 .if ${mdt} == "sha" 36 CFLAGS_${mdtc}driver= -DSHA=${mdtc:C/sha//:C/t//} 38 CFLAGS_${mdtc}driver= -D${mdt:tu}=${mdtc:C/${mdt}//} 52 @echo " atf_check -o file:\$$(atf_get_srcdir)/${_digest}.ref \\" >> \ 86 echo 'SHA-0 test suite:' > ${.TARGET} 87 @echo 'SHA-0 ("") = f96cea198ad1dd5617ac084a3d92c6107708c0ef' >> ${.TARGET} 88 @echo 'SHA-0 ("abc") = 0164b8a914cd2a5e74c4f7ff082c4d97f1edf880' >> ${.TARGET} 89 @echo 'SHA-0 ("message digest") =' \ 91 @echo 'SHA-0 ("abcdefghijklmnopqrstuvwxyz") =' \ [all …]
|
/freebsd/contrib/bearssl/tools/ |
H A D | names.c | 39 { "sha1", &br_sha1_vtable, "SHA-1" }, 40 { "sha224", &br_sha224_vtable, "SHA-224" }, 41 { "sha256", &br_sha256_vtable, "SHA-256" }, 42 { "sha384", &br_sha384_vtable, "SHA-384" }, 43 { "sha512", &br_sha512_vtable, "SHA-512" }, 65 "ECDHE with ECDSA, AES-128/GCM encryption (TLS 1.2+)" 71 "ECDHE with RSA, AES-128/GCM encryption (TLS 1.2+)" 77 "ECDHE with ECDSA, AES-256/GCM encryption (TLS 1.2+)" 83 "ECDHE with RSA, AES-256/GCM encryption (TLS 1.2+)" 89 "ECDHE with ECDSA, AES-128/CCM encryption (TLS 1.2+)" [all …]
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_hash.h | 48 * - `br_xxx_vtable` 52 * - `br_xxx_SIZE` 57 * - `br_xxx_ID` 64 * standard](https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1), 66 * 1 to 6 for MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, 69 * - `br_xxx_context` 80 * - `br_xxx_init(br_xxx_context *ctx)` 88 * - `br_xxx_update(br_xxx_context *ctx, const void *data, size_t len)` 93 * - `br_xxx_out(const br_xxx_context *ctx, void *out)` 101 * - `br_xxx_state(const br_xxx_context *ctx, void *out)` [all …]
|
H A D | bearssl_prf.h | 44 * TLS 1.0 and 1.1 define a PRF that is based on both MD5 and SHA-1. This 49 * PRF with, respectively, SHA-256 and SHA-384. Most standard cipher suites 50 * rely on the SHA-256 based PRF, but some use SHA-384. 81 * MD5 and SHA-1. 87 * \param label PRF label (zero-terminated ASCII string). 89 * \param seed seed chnks for this computation (usually non-secret). 96 * \brief PRF implementation for TLS 1.2, with SHA-256. 99 * function is SHA-256. 105 * \param label PRF label (zero-terminated ASCII string). 107 * \param seed seed chnks for this computation (usually non-secret). [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_MD-SHA2.pod | 5 EVP_MD-SHA2 - The SHA2 EVP_MD implementation 23 =item SHA2-224 25 Known names are "SHA2-224", "SHA-224" and "SHA224". 27 =item SHA2-256 29 Known names are "SHA2-256", "SHA-256" and "SHA256". 31 =item SHA2-384 33 Known names are "SHA2-384", "SHA-384" and "SHA384". 35 =item SHA2-512 37 Known names are "SHA2-512", "SHA-512" and "SHA512". 47 =item SHA2-512/224 [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_sha224.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
H A D | EVP_sha3_224.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
/freebsd/crypto/openssl/demos/certs/apps/ |
H A D | mkxcerts.sh | 2 # Create certificates using various algorithms to test multi-certificate 6 CN="OpenSSL Test RSA SHA-1 cert" $OPENSSL req \ 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 8 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1 9 CN="OpenSSL Test RSA SHA-256 cert" $OPENSSL req \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 11 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256 12 CN="OpenSSL Test RSA SHA-512 cert" $OPENSSL req \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 14 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512 [all …]
|
/freebsd/sys/cddl/boot/zfs/ |
H A D | sha256.c | 32 * SHA-256 and SHA-512/256 hashes, as specified in FIPS 180-4, available at: 35 * This is a very compact implementation of SHA-256 and SHA-512/256. 40 * The literal definitions according to FIPS180-4 would be: 49 #define ROTR(x, n) (((x) >> (n)) | ((x) << ((sizeof (x) * NBBY)-(n)))) 51 /* SHA-224/256 operations */ 57 /* SHA-384/512 operations */ 63 /* SHA-256 round constants */ 83 /* SHA-512 round constants */ 138 W[t] = SIGMA1_256(W[t - 2]) + W[t - 7] + in SHA256Transform() 139 SIGMA0_256(W[t - 15]) + W[t - 16]; in SHA256Transform() [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-ciphers - SSL cipher display and cipher list command 11 [B<-help>] 12 [B<-s>] 13 [B<-v>] 14 [B<-V>] 15 [B<-ssl3>] 16 [B<-tls1>] 17 [B<-tls1_1>] 18 [B<-tls1_2>] [all …]
|
H A D | openssl.pod | 5 openssl - OpenSSL command line program 14 B<openssl> B<no->I<XXX> [ I<options> ] 43 (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list 46 The command B<no->I<XXX> tests whether a command of the 48 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1 53 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is 54 not able to detect pseudo-commands such as B<quit>, 55 B<list>, or B<no->I<XXX> itself.) 60 arguments and have a B<-config> option to specify that file. 62 storage area, which can be determined from the L<openssl-version(1)> [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_MD-SHA2.7 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | sha2.c | 7 * Copyright (c) 2000-2001, Aaron D. Gifford 44 /* no-op out, similar to DEF_WEAK but only needed here */ 48 #include "openbsd-compat/sha2.h" 56 * cc -DSHA2_UNROLL_TRANSFORM -o sha2 sha2.c sha2prog.c 69 /*** SHA-224/256/384/512 Machine Architecture Definitions *****************/ 74 * architecture is little-endian, make sure it also defines 84 * And for little-endian machines, add: 88 * Or for big-endian machines: 102 /*** SHA-224/256/384/512 Various Length Definitions ***********************/ 104 #define SHA224_SHORT_BLOCK_LENGTH (SHA224_BLOCK_LENGTH - 8) [all …]
|
/freebsd/sbin/md5/ |
H A D | md5.1 | 12 .Nd calculate a message-digest fingerprint (checksum) for a file 22 .Op Fl -binary 23 .Op Fl -check 24 .Op Fl -help 25 .Op Fl -ignore-missing 26 .Op Fl -quiet 27 .Op Fl -status 28 .Op Fl -strict 29 .Op Fl -tag 30 .Op Fl -text [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl3.h | 2 * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. 36 * Signalling cipher suite value from draft-ietf-tls-downgrade-scsv-00 90 # define SSL3_TXT_RSA_NULL_MD5 "NULL-MD5" 91 # define SSL3_TXT_RSA_NULL_SHA "NULL-SHA" 92 # define SSL3_TXT_RSA_RC4_40_MD5 "EXP-RC4-MD5" 93 # define SSL3_TXT_RSA_RC4_128_MD5 "RC4-MD5" 94 # define SSL3_TXT_RSA_RC4_128_SHA "RC4-SHA" 95 # define SSL3_TXT_RSA_RC2_40_MD5 "EXP-RC2-CBC-MD5" 96 # define SSL3_TXT_RSA_IDEA_128_SHA "IDEA-CBC-SHA" 97 # define SSL3_TXT_RSA_DES_40_CBC_SHA "EXP-DES-CBC-SHA" [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-ciphers.1 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
H A D | openssl.1 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
/freebsd/contrib/ldns/ |
H A D | sha2.c | 3 * AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/ 5 * Copyright (c) 2000-2001, Aaron D. Gifford 9 * system-defined SHA code. 11 * - Renamed (external) functions and constants to fit ldns style 12 * - Removed _End and _Data functions 13 * - Added ldns_shaX(data, len, digest) convenience functions 14 * - Removed prototypes of _Transform functions and made those static 60 * cc -DSHA2_UNROLL_TRANSFORM -o sha2 sha2.c sha2prog.c 69 /*** SHA-256/384/512 Machine Architecture Definitions *****************/ 74 * architecture is little-endian, make sure it also defines [all …]
|
/freebsd/contrib/bearssl/samples/ |
H A D | custom_profile.c | 41 * respectively. Of course, in a typical size-constrained application, 108 br_ssl_engine_set_versions(&cc->eng, BR_TLS10, BR_TLS12); in example_client_profile() 114 * -- cipher suites with a name ending in "SHA384" need "prf_sha384"; in example_client_profile() 115 * -- all others need "prf_sha256". in example_client_profile() 118 * use SHA-1 for the per-record MAC (that's what the final "SHA" in example_client_profile() 119 * means), but still SHA-256 for the PRF when selected along with in example_client_profile() 120 * the TLS-1.2 protocol version. in example_client_profile() 122 br_ssl_engine_set_prf10(&cc->eng, &br_tls10_prf); in example_client_profile() 123 br_ssl_engine_set_prf_sha256(&cc->eng, &br_tls12_sha256_prf); in example_client_profile() 124 br_ssl_engine_set_prf_sha384(&cc->eng, &br_tls12_sha384_prf); in example_client_profile() [all …]
|
/freebsd/contrib/bearssl/test/x509/ |
H A D | alltests.txt | 2 ; root -> ica1 -> ica2 -> ee 4 ; "ee" is "end-entity", i.e. the client or server certificate itself 7 ; as a self-signed certificate. 10 name = root-rsa2048 16 name = root-p256 18 curve = P-256 22 name = root-p384 24 curve = P-384 28 name = root-p521 30 curve = P-521 [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/crypto/ |
H A D | samsung-slimsss.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/crypto/samsung-slimsss.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Krzysztof Kozlowski <krzk@kernel.org> 14 -- Feeder (FeedCtrl) 15 -- Advanced Encryption Standard (AES) with ECB,CBC,CTR,XTS and (CBC/XTS)/CTS 16 -- SHA-1/SHA-256 and (SHA-1/SHA-256)/HMAC 21 - const: samsung,exynos5433-slim-sss 29 clock-names: [all …]
|
/freebsd/crypto/openssl/providers/implementations/include/prov/ |
H A D | names.h | 22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] 31 * algorithms together, e.g. MD5-SHA1. 34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC) 39 /*- 41 * ----------------- 43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" 44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" 45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" 46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42" 47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22" [all …]
|