| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_SIGNATURE-ECDSA.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_SIGNATURE-ECDSA 7ossl" 58 .TH EVP_SIGNATURE-ECDSA 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_SIGNATURE\-ECDSA \- The EVP_PKEY ECDSA signature implementation. 68 See \fBEVP_PKEY\-EC\fR\|(7) for information related to EC keys. 83 .IP """ECDSA\-SHA1"", ""ECDSA\-SHA\-1"", ""ecdsa\-with\-SHA1"", ""1.2.840.10045.4.1""" 4 84 .IX Item """ECDSA-SHA1"", ""ECDSA-SHA-1"", ""ecdsa-with-SHA1"", ""1.2.840.10045.4.1""" 86 .IP """ECDSA\-SHA2\-224"", ""ECDSA\-SHA224"", ""ecdsa\-with\-SHA224"", ""1.2.840.10045.4.3.1""" 4 87 .IX Item """ECDSA-SHA2-224"", ""ECDSA-SHA224"", ""ecdsa-with-SHA224"", ""1.2.840.10045.4.3.1""" 88 .IP """ECDSA\-SHA2\-256"", ""ECDSA\-SHA256"", ""ecdsa\-with\-SHA256"", ""1.2.840.10045.4.3.2""" 4 [all …]
|
| H A D | EVP_SIGNATURE-DSA.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_SIGNATURE-DSA 7ossl" 58 .TH EVP_SIGNATURE-DSA 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_SIGNATURE\-DSA 65 \&\- The EVP_PKEY DSA signature implementation 71 See \fBEVP_PKEY\-DSA\fR\|(7) for information related to DSA keys. 73 As part of FIPS 140\-3 DSA is not longer FIPS approved for key generation and 89 .IP """DSA\-SHA1"", ""DSA\-SHA\-1"", ""dsaWithSHA1"", ""1.2.840.10040.4.3""" 4 90 .IX Item """DSA-SHA1"", ""DSA-SHA-1"", ""dsaWithSHA1"", ""1.2.840.10040.4.3""" 92 .IP """DSA\-SHA2\-224"", ""DSA\-SHA224"", ""dsa_with_SHA224"", ""2.16.840.1.101.3.4.3.1""" 4 [all …]
|
| H A D | EVP_SIGNATURE-RSA.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_SIGNATURE-RSA 7ossl" 58 .TH EVP_SIGNATURE-RSA 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_SIGNATURE\-RSA 65 \&\- The EVP_PKEY RSA signature implementation 69 See \fBEVP_PKEY\-RSA\fR\|(7) for information related to RSA keys. 84 .IP """RSA\-RIPEMD160"", ""ripemd160WithRSA"", ""1.3.36.3.3.1.2""" 4 85 .IX Item """RSA-RIPEMD160"", ""ripemd160WithRSA"", ""1.3.36.3.3.1.2""" 87 .IP """RSA\-SHA2\-256"", ""RSA\-SHA256"", ""sha256WithRSAEncryption"", ""1.2.840.113549.1.1.11""" 4 88 .IX Item """RSA-SHA2-256"", ""RSA-SHA256"", ""sha256WithRSAEncryption"", ""1.2.840.113549.1.1.11""" [all …]
|
| H A D | EVP_MD-SHA3.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_MD-SHA3 7ossl" 58 .TH EVP_MD-SHA3 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_MD\-SHA3 \- The SHA3 EVP_MD implementations 67 Support for computing SHA3 digests through the \fBEVP_MD\fR API. 72 .IP """SHA3\-224""" 4 73 .IX Item """SHA3-224""" 75 .IP """SHA3\-256""" 4 76 .IX Item """SHA3-256""" 77 .IP """SHA3\-384""" 4 [all …]
|
| H A D | EVP_KDF-X963.7 | 1 .\" -*- mode: troff; coding: utf-8 -*- 57 .IX Title "EVP_KDF-X963 7ossl" 58 .TH EVP_KDF-X963 7ossl 2025-09-30 3.5.4 OpenSSL 64 EVP_KDF\-X963 \- The X9.63\-2001 EVP_KDF implementation 67 The EVP_KDF\-X963 algorithm implements the key derivation function (X963KDF). 95 .IP """fips-indicator"" (\fBOSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR\fR) <integer>" 4 96 .IX Item """fips-indicator"" (OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR) <integer>" 98 This may be used after calling EVP_KDF_derive. It returns 0 if any "***\-check" 100 .IP """digest-check"" (\fBOSSL_KDF_PARAM_FIPS_DIGEST_CHECK\fR) <int>" 4 101 .IX Item """digest-check"" (OSSL_KDF_PARAM_FIPS_DIGEST_CHECK) <int>" [all …]
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmd_sha.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 62 Digest = SHA256-192 67 Digest = SHA256-192 72 Digest = SHA256-192 110 # Some of the test vectors from the SHS CAVP for FIPS 180-4 111 Digest = SHA512-224 115 Digest = SHA512-224 119 Digest = SHA512-224 123 Digest = SHA512-224 127 Digest = SHA512-224 [all …]
|
| H A D | evpmac_common.txt | 2 # Copyright 2001-2024 The OpenSSL Project Authors. All Rights Reserved. 72 Algorithm = SHA256-192 81 Algorithm = SHA256-192 88 Algorithm = SHA256-192 173 Title = SHA3 178 Algorithm = SHA3-224 186 Algorithm = SHA3-224 192 Algorithm = SHA3-224 198 Algorithm = SHA3-256 206 Algorithm = SHA3-256 [all …]
|
| H A D | evppkey_ecdsa.txt | 2 # Copyright 2001-2025 The OpenSSL Project Authors. All Rights Reserved. 19 # EC P-256 key 21 PrivateKey=P-256 22 -----BEGIN PRIVATE KEY----- 26 -----END PRIVATE KEY----- 30 PublicKey=P-256-PUBLIC 31 -----BEGIN PUBLIC KEY----- 34 -----END PUBLIC KEY----- 36 PrivPubKeyPair = P-256:P-256-PUBLIC 40 Verify = P-256-PUBLIC [all …]
|
| H A D | evppkey_ecdsa_sigalg.txt | 19 # EC P-256 key 21 PrivateKey=P-256 22 -----BEGIN PRIVATE KEY----- 26 -----END PRIVATE KEY----- 30 PublicKey=P-256-PUBLIC 31 -----BEGIN PUBLIC KEY----- 34 -----END PUBLIC KEY----- 36 PrivPubKeyPair = P-256:P-256-PUBLIC 41 Verify = ECDSA-SHA1:P-256-PUBLIC 47 Verify = ECDSA-SHA1:P-256-PUBLIC [all …]
|
| H A D | evppbe_pbkdf2.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 125 MD = sha3-224 132 MD = sha3-256 139 MD = sha3-384 146 MD = sha3-512
|
| /freebsd/crypto/openssl/providers/implementations/include/prov/ |
| H A D | names.h | 2 * Copyright 2021-2025 The OpenSSL Project Authors. All Rights Reserved. 22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] 31 * algorithms together, e.g. MD5-SHA1. 34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC) 39 /*- 41 * ----------------- 45 #define PROV_NAMES_GENERIC "GENERIC-SECRET" 48 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" 49 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" 50 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_SIGNATURE-ECDSA.pod | 5 EVP_SIGNATURE-ECDSA - The EVP_PKEY ECDSA signature implementation. 10 See L<EVP_PKEY-EC(7)> for information related to EC keys. 25 L<EC keys|EVP_PKEY-EC(7)>) with L<EVP_DigestSignInit(3)> and 30 =item "ECDSA-SHA1", "ECDSA-SHA-1", "ecdsa-with-SHA1", "1.2.840.10045.4.1" 32 =item "ECDSA-SHA2-224", "ECDSA-SHA224", "ecdsa-with-SHA224", "1.2.840.10045.4.3.1" 34 =item "ECDSA-SHA2-256", "ECDSA-SHA256", "ecdsa-with-SHA256", "1.2.840.10045.4.3.2" 36 =item "ECDSA-SHA2-384", "ECDSA-SHA384", "ecdsa-with-SHA384", "1.2.840.10045.4.3.3" 38 =item "ECDSA-SHA2-512", "ECDSA-SHA512", "ecdsa-with-SHA512", "1.2.840.10045.4.3.4" 40 =item "ECDSA-SHA3-224", "ecdsa_with_SHA3-224", "id-ecdsa-with-sha3-224", "2.16.840.1.101.3.4.3.9" 42 =item "ECDSA-SHA3-256", "ecdsa_with_SHA3-256", "id-ecdsa-with-sha3-256", "2.16.840.1.101.3.4.3.10" [all …]
|
| H A D | EVP_SIGNATURE-DSA.pod | 5 EVP_SIGNATURE-DSA 6 - The B<EVP_PKEY> DSA signature implementation 13 See L<EVP_PKEY-DSA(7)> for information related to DSA keys. 15 As part of FIPS 140-3 DSA is not longer FIPS approved for key generation and 31 L<EC keys|EVP_PKEY-EC(7)>) with L<EVP_DigestSignInit(3)> and 36 =item "DSA-SHA1", "DSA-SHA-1", "dsaWithSHA1", "1.2.840.10040.4.3" 38 =item "DSA-SHA2-224", "DSA-SHA224", "dsa_with_SHA224", "2.16.840.1.101.3.4.3.1" 40 =item "DSA-SHA2-256", "DSA-SHA256", "dsa_with_SHA256", "2.16.840.1.101.3.4.3.2" 42 =item "DSA-SHA2-384", "DSA-SHA384", "dsa_with_SHA384", "id-dsa-with-sha384", "1.2.840.1.101.3.4.3.3" 44 =item "DSA-SHA2-512", "DSA-SHA512", "dsa_with_SHA512", "id-dsa-with-sha512", "1.2.840.1.101.3.4.3.4" [all …]
|
| H A D | EVP_SIGNATURE-RSA.pod | 5 EVP_SIGNATURE-RSA 6 - The EVP_PKEY RSA signature implementation 11 See L<EVP_PKEY-RSA(7)> for information related to RSA keys. 26 L<RSA keys|EVP_PKEY-RSA(7)>) with L<EVP_DigestSignInit(3)> and 31 =item "RSA-RIPEMD160", "ripemd160WithRSA", "1.3.36.3.3.1.2" 33 =item "RSA-SHA2-256", "RSA-SHA256", "sha256WithRSAEncryption", "1.2.840.113549.1.1.11" 35 =item "RSA-SHA2-384", "RSA-SHA384", "sha384WithRSAEncryption", "1.2.840.113549.1.1.12" 37 =item "RSA-SHA2-512", "RSA-SHA512", "sha512WithRSAEncryption", "1.2.840.113549.1.1.13" 39 =item "RSA-SHA2-224", "RSA-SHA224", "sha224WithRSAEncryption", "1.2.840.113549.1.1.14" 41 =item "RSA-SHA2-512/224", "RSA-SHA512-224", "sha512-224WithRSAEncryption", "1.2.840.113549.1.1.15" [all …]
|
| H A D | EVP_MD-SHA3.pod | 5 EVP_MD-SHA3 - The SHA3 EVP_MD implementations 9 Support for computing SHA3 digests through the B<EVP_MD> API. 18 =item "SHA3-224" 20 =item "SHA3-256" 22 =item "SHA3-384" 24 =item "SHA3-512" 31 in L<EVP_MD-common(7)>. 35 L<provider-digest(7)>, L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-default(7)>
|
| H A D | EVP_KDF-X963.pod | 5 EVP_KDF-X963 - The X9.63-2001 EVP_KDF implementation 9 The EVP_KDF-X963 algorithm implements the key derivation function (X963KDF). 47 =item "fips-indicator" (B<OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR>) <integer> 50 This may be used after calling EVP_KDF_derive. It returns 0 if any "***-check" 53 =item "digest-check" (B<OSSL_KDF_PARAM_FIPS_DIGEST_CHECK>) <int> 58 "fips-indicator" to 0. 59 This option breaks FIPS compliance if it causes the approved "fips-indicator" 62 According to ANSI X9.63-2001, the following are approved digest algorithms: 63 SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256, SHA3-224, 64 SHA3-256, SHA3-384, SHA3-512. [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OPENSSL_s390xcap.pod | 5 OPENSSL_s390xcap - the IBM z processor capabilities vector 23 The environment variable is a semicolon-separated list of tokens which is 42 The name of an instruction followed by two 64-bit masks. The part of the 44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>, 50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The 52 instruction is set to the specified 192-bit mask. 61 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is 65 rows separate the individual 64-bit masks. The bit numbers in the first 67 the numbering is continuous across 64-bit mask boundaries. 72 # 17 1<<46 message-security assist [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | OPENSSL_s390xcap.3 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH OPENSSL_S390XCAP 3ossl 2025-09-30 3.5.4 OpenSSL 64 OPENSSL_s390xcap \- the IBM z processor capabilities vector 82 The environment variable is a semicolon-separated list of tokens which is 99 The name of an instruction followed by two 64\-bit masks. The part of the 101 set to the specified 128\-bit mask. Possible values are \fBkimd\fR, \fBklmd\fR, 106 Store-facility-list-extended (stfle) followed by three 64\-bit masks. The 108 instruction is set to the specified 192\-bit mask. 114 The 64\-bit masks are specified in hexadecimal notation. The 0x prefix is 118 rows separate the individual 64\-bit masks. The bit numbers in the first [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | core_names.h.in | 2 * {- join("\n * ", @autowarntext) -} 4 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved. 11 {- 13 -} 29 # define OSSL_CIPHER_NAME_AES_128_GCM_SIV "AES-128-GCM-SIV" 30 # define OSSL_CIPHER_NAME_AES_192_GCM_SIV "AES-192-GCM-SIV" 31 # define OSSL_CIPHER_NAME_AES_256_GCM_SIV "AES-256-GCM-SIV" 35 # define OSSL_DIGEST_NAME_MD5_SHA1 "MD5-SHA1" 37 # define OSSL_DIGEST_NAME_SHA2_224 "SHA2-224" 38 # define OSSL_DIGEST_NAME_SHA2_256 "SHA2-256" [all …]
|
| /freebsd/crypto/libecc/src/hash/ |
| H A D | meson.build | 6 'belt-hash.c', 15 'sha3-224.c', 16 'sha3-256.c', 17 'sha3-384.c', 18 'sha3-512.c', 20 'sha3.c', 21 'sha512-224.c', 22 'sha512-256.c',
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl.1 | 1 .\" -*- mode: troff; coding: utf-8 -*- 58 .TH OPENSSL 1ossl 2025-09-30 3.5.4 OpenSSL 64 openssl \- OpenSSL command line program 72 \&\fBopenssl\fR \fBno\-\fR\fIXXX\fR [ \fIoptions\fR ] 74 \&\fBopenssl\fR \fB\-help\fR | \fB\-version\fR 103 (e.g., \fBopenssl\-x509\fR\|(1)). The subcommand \fBopenssl\-list\fR\|(1) may be used to list 106 The command \fBno\-\fR\fIXXX\fR tests whether a command of the 108 returns 0 (success) and prints \fBno\-\fR\fIXXX\fR; otherwise it returns 1 113 availability of ciphers in the \fBopenssl\fR program. (\fBno\-\fR\fIXXX\fR is 114 not able to detect pseudo-commands such as \fBquit\fR, [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/crypto/ |
| H A D | nvidia,tegra234-se-hash.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/nvidia,tegra234-se-hash.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 The Tegra Security HASH Engine accelerates the following HASH functions - 11 SHA1, SHA224, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512 15 - Akhil R <akhilrajeev@nvidia.com> 19 const: nvidia,tegra234-se-hash 30 dma-coherent: true 33 - compatible [all …]
|
| /freebsd/secure/lib/libpkgecc/ |
| H A D | Makefile | 2 # STOP - This is not a general purpose library and is only for use by pkg(7) 63 belt-hash.c \ 72 sha3-224.c \ 73 sha3-256.c \ 74 sha3-384.c \ 75 sha3-512.c \ 77 sha3.c \ 78 sha512-224.c \ 79 sha512-256.c \ 124 CONFLICTS= -Dsha256_init=_libecc_sha256_init \ [all …]
|
| /freebsd/crypto/openssl/providers/common/der/ |
| H A D | DSA.asn1 | 1 -- Copyright 2022 The OpenSSL Project Authors. All Rights Reserved. 2 -- 3 -- Licensed under the Apache License 2.0 (the "License"). You may not use 4 -- this file except in compliance with the License. You can obtain a copy 5 -- in the file LICENSE in the source distribution or at 6 -- https://www.openssl.org/source/license.html 8 -- ------------------------------------------------------------------- 9 -- Taken from RFC 3279, 3 ASN.1 Module 10 -- (https://www.rfc-editor.org/rfc/rfc3279.html#section-3) 12 -- OID for DSA public key [all …]
|
| H A D | der_dsa_gen.c | 5 * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. 24 * id-dsa OBJECT IDENTIFIER ::= { 25 * iso(1) member-body(2) us(840) x9-57(10040) x9algorithm(4) 1 } 32 * id-dsa-with-sha1 OBJECT IDENTIFIER ::= { 33 * iso(1) member-body(2) us(840) x9-57 (10040) x9algorithm(4) 3 } 40 * id-dsa-with-sha224 OBJECT IDENTIFIER ::= { sigAlgs 1 } 47 * id-dsa-with-sha256 OBJECT IDENTIFIER ::= { sigAlgs 2 } 54 * id-dsa-with-sha384 OBJECT IDENTIFIER ::= { sigAlgs 3 } 61 * id-dsa-with-sha512 OBJECT IDENTIFIER ::= { sigAlgs 4 } 68 * id-dsa-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 5 } [all …]
|