/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 25-cipher.cnf.in | 25 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 29 "CipherString" => "ECDHE-RSA-AES256-SHA384" 32 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 39 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 53 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 57 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 67 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 72 "CipherString" => "ECDHE-RSA-AES256-SHA384" 75 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 82 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
H A D | 25-cipher.cnf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 30 CipherString = ECDHE-RSA-AES256-SHA384 36 ExpectedCipher = ECDHE-RSA-AES256-SHA384 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 106 CipherString = ECDHE-RSA-AES256-SHA384 112 ExpectedCipher = ECDHE-RSA-AES256-SHA384 126 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 [all …]
|
H A D | 20-cert-select.cnf.in | 179 name => "ECDSA Signature Algorithm Selection SHA384", 182 "SignatureAlgorithms" => "ECDSA+SHA384", 186 "ExpectedServerSignHash" => "SHA384", 268 "SignatureAlgorithms" => "ECDSA+SHA384:ECDSA+SHA256" 287 "SignatureAlgorithms" => "ECDSA+SHA256:ECDSA+SHA384" 291 "ExpectedServerSignHash" => "SHA384", 704 name => "TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS", 707 "SignatureAlgorithms" => "ECDSA+SHA384:RSA-PSS+SHA384", 711 "ExpectedServerSignHash" => "SHA384", [all...] |
H A D | 20-cert-select.cnf | 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 44 test-39 = 39-TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS 289 [7-ECDSA Signature Algorithm Selection SHA384] 290 ssl_conf = 7-ECDSA Signature Algorithm Selection SHA384-ssl 292 [7-ECDSA Signature Algorithm Selection SHA384-ssl] 293 server = 7-ECDSA Signature Algorithm Selection SHA384-server 294 client = 7-ECDSA Signature Algorithm Selection SHA384-client 296 [7-ECDSA Signature Algorithm Selection SHA384-server] 308 [7-ECDSA Signature Algorithm Selection SHA384-client] 310 SignatureAlgorithms = ECDSA+SHA384 [all...] |
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 352 =item B<SHA256>, B<SHA384> 354 Cipher suites using SHA256 or SHA384. 400 ECDSA and SHA256 or SHA384, only the elliptic curves P-256 and P-384 can be 402 (ECDHE-ECDSA-AES128-GCM-SHA256 and ECDHE-ECDSA-AES256-GCM-SHA384) are 564 TLS_RSA_WITH_AES_256_GCM_SHA384 AES256-GCM-SHA384 569 TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH-RSA-AES256-GCM-SHA384 574 TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH-DSS-AES256-GCM-SHA384 579 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE-RSA-AES256-GCM-SHA384 584 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE-DSS-AES256-GCM-SHA384 587 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDHE-RSA-AES256-SHA384 [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | tls1.h | 892 # define TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384 "PSK-AES256-GCM-SHA384" 894 # define TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384 "DHE-PSK-AES256-GCM-SHA384" 896 # define TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384 "RSA-PSK-AES256-GCM-SHA384" 899 # define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384 "PSK-AES256-CBC-SHA384" 901 # define TLS1_TXT_PSK_WITH_NULL_SHA384 "PSK-NULL-SHA384" 904 # define TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384 "DHE-PSK-AES256-CBC-SHA384" 906 # define TLS1_TXT_DHE_PSK_WITH_NULL_SHA384 "DHE-PSK-NULL-SHA384" 909 # define TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384 "RSA-PSK-AES256-CBC-SHA384" 911 # define TLS1_TXT_RSA_PSK_WITH_NULL_SHA384 "RSA-PSK-NULL-SHA384" 955 # define TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384 "PSK-CAMELLIA256-SHA384" [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-ciphers.1 | 441 .IP "\fB\s-1SHA256\s0\fR, \fB\s-1SHA384\s0\fR" 4 442 .IX Item "SHA256, SHA384" 443 Cipher suites using \s-1SHA256\s0 or \s-1SHA384.\s0 480 \&\s-1ECDSA\s0 and \s-1SHA256\s0 or \s-1SHA384,\s0 only the elliptic curves P\-256 and P\-384 can be 482 (\s-1ECDHE\-ECDSA\-AES128\-GCM\-SHA256\s0 and \s-1ECDHE\-ECDSA\-AES256\-GCM\-SHA384\s0) are 648 \& TLS_RSA_WITH_AES_256_GCM_SHA384 AES256\-GCM\-SHA384 653 \& TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH\-RSA\-AES256\-GCM\-SHA384 658 \& TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH\-DSS\-AES256\-GCM\-SHA384 663 \& TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE\-RSA\-AES256\-GCM\-SHA384 668 \& TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE\-DSS\-AES256\-GCM\-SHA384 [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | sha384.c | 12 #include "sha384.h" 17 * hmac_sha384_vector - HMAC-SHA384 over data vector (RFC 2104) 42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */ in hmac_sha384_vector() 52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector() 66 /* perform inner SHA384 */ in hmac_sha384_vector() 82 /* perform outer SHA384 */ in hmac_sha384_vector() 92 * hmac_sha384 - HMAC-SHA384 over data buffer (RFC 2104)
|
H A D | sha384-internal.c | 17 * sha384_vector - SHA384 hash for data vector 40 /* ===== start - public domain SHA384 implementation ===== */ 42 /* This is based on SHA384 implementation in LibTomCrypt that was released into 92 /* ===== end - public domain SHA384 implementation ===== */
|
H A D | sha384-kdf.c | 2 * HMAC-SHA384 KDF (RFC 5295) and HKDF-Expand(SHA384) (RFC 5869) 12 #include "sha384.h" 16 * hmac_sha384_kdf - HMAC-SHA384 based KDF (RFC 5295)
|
H A D | Makefile | 43 sha384.o \ 44 sha384-prf.o \ 45 sha384-internal.o \
|
H A D | sha384-prf.c | 2 * SHA384-based KDF (IEEE 802.11ac) 12 #include "sha384.h" 17 * sha384_prf - SHA384-based Key derivation function (IEEE 802.11ac, 11.6.1.7.2)
|
H A D | crypto_internal.c | 28 struct sha384_state sha384; member 67 sha384_init(&ctx->u.sha384); in crypto_hash_init() 165 sha384_process(&ctx->u.sha384, data, len); in crypto_hash_update() 230 sha384_done(&ctx->u.sha384, mac); in crypto_hash_finish()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SHA256_Init.pod | 6 SHA224_Final, SHA256, SHA256_Init, SHA256_Update, SHA256_Final, SHA384, 17 unsigned char *SHA384(const unsigned char *data, size_t count, unsigned char *md_buf); 47 except for SHA1(), SHA224(), SHA256(), SHA384() and SHA512() are deprecated. 50 SHA1(), SHA224(), SHA256(), SHA384(), and SHA256() 74 The SHA224, SHA256, SHA384 and SHA512 families of functions operate in the 76 B<SHA256_CTX> object instead of B<SHA_CTX>. SHA384 and SHA512 use B<SHA512_CTX>. 80 SHA224(), SHA256(), SHA384() and SHA512() functions are not thread safe if 85 SHA1(), SHA224(), SHA256(), SHA384() and SHA512() return a pointer to the hash 89 SHA384 and SHA512 functions return 1 for success, 0 otherwise.
|
H A D | EVP_DigestVerifyInit.pod | 70 Supports SHA1, SHA224, SHA256, SHA384 and SHA512 74 Supports SHA1, SHA224, SHA256, SHA384, SHA512 and SM3 82 Supports SHA1, SHA256, SHA384 and SHA512 86 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2,
|
H A D | EVP_DigestSignInit.pod | 79 Supports SHA1, SHA224, SHA256, SHA384 and SHA512 83 Supports SHA1, SHA224, SHA256, SHA384, SHA512 and SM3 91 Supports SHA1, SHA256, SHA384 and SHA512 95 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2,
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_ssh.txt | 2898 Ctrl.digest = digest:SHA384 2906 Ctrl.digest = digest:SHA384 2914 Ctrl.digest = digest:SHA384 2922 Ctrl.digest = digest:SHA384 2930 Ctrl.digest = digest:SHA384 2938 Ctrl.digest = digest:SHA384 2946 Ctrl.digest = digest:SHA384 2954 Ctrl.digest = digest:SHA384 2962 Ctrl.digest = digest:SHA384 2970 Ctrl.digest = digest:SHA384 [all …]
|
H A D | evpmd_sha.txt | 61 Digest = SHA384 65 Digest = SHA384 69 Digest = SHA384
|
/freebsd/usr.sbin/wpa/src/crypto/ |
H A D | Makefile | 18 sha384-prf.c \ 19 sha384-tlsprf.c \ 111 SRCS+= sha384.c 113 SRCS+= sha384-internal.c \ 114 sha384-prf.c \ 115 sha384-tlsprf.c
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SHA256_Init.3 | 141 SHA224_Final, SHA256, SHA256_Init, SHA256_Update, SHA256_Final, SHA384, 152 \& unsigned char *SHA384(const unsigned char *data, size_t count, unsigned char *md_buf); 184 except for \s-1\fBSHA1\s0()\fR, \s-1\fBSHA224\s0()\fR, \s-1\fBSHA256\s0()\fR, \s-1\fBSHA384\s0()\fR… 187 \&\s-1\fBSHA1\s0()\fR, \s-1\fBSHA224\s0()\fR, \s-1\fBSHA256\s0()\fR, \s-1\fBSHA384\s0()\fR, and \s-… 213 The \s-1SHA224, SHA256, SHA384\s0 and \s-1SHA512\s0 families of functions operate in the 215 \&\fB\s-1SHA256_CTX\s0\fR object instead of \fB\s-1SHA_CTX\s0\fR. \s-1SHA384\s0 and \s-1SHA512\s0 u… 219 \&\s-1\fBSHA224\s0()\fR, \s-1\fBSHA256\s0()\fR, \s-1\fBSHA384\s0()\fR and \s-1\fBSHA512\s0()\fR fun… 223 \&\s-1\fBSHA1\s0()\fR, \s-1\fBSHA224\s0()\fR, \s-1\fBSHA256\s0()\fR, \s-1\fBSHA384\s0()\fR and \s-1… 227 SHA384\s0 and \s-1SHA512\s0 functions return 1 for success, 0 otherwise.
|
/freebsd/crypto/openssl/crypto/objects/ |
H A D | obj_xref.txt | 11 sha384WithRSAEncryption sha384 rsaEncryption 41 ecdsa_with_SHA384 sha384 X9_62_id_ecPublicKey 59 dhSinglePass_stdDH_sha384kdf_scheme sha384 dh_std_kdf 65 dhSinglePass_cofactorDH_sha384kdf_scheme sha384 dh_cofactor_kdf
|
/freebsd/sys/dev/qat/qat_api/qat_utils/include/ |
H A D | qat_utils.h | 34 #include <crypto/sha2/sha384.h> 749 * @brief Calculate SHA384 transform operation 752 * The buffer needs to be at least sha384 block size long as defined in 754 * out - output pointer for state data after single sha384 transform 756 * The buffer needs to be at least sha384 state size long as defined in 769 * @brief Calculate SHA384 transform operation 772 * The buffer needs to be at least sha384 block size long as defined in 774 * out - output pointer for state data after single sha384 transform 776 * The buffer needs to be at least sha384 state size long as defined in
|
/freebsd/sys/contrib/device-tree/Bindings/crypto/ |
H A D | nvidia,tegra234-se-hash.yaml | 11 SHA1, SHA224, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512 12 HMAC(SHA224), HMAC(SHA256), HMAC(SHA384), HMAC(SHA512)
|
/freebsd/sys/security/mac_veriexec/ |
H A D | mac_veriexec_sha384.c | 34 #include <crypto/sha2/sha384.h> 38 MAC_VERIEXEC_FPMOD(SHA384, SHA384_DIGEST_LENGTH, sizeof(SHA384_CTX),
|
/freebsd/crypto/libecc/src/tests/ |
H A D | decdsa_test_vectors.h | 84 /*** Tests for DECDSA-SHA384/SECP192R1 ***/ 99 .name="DECDSA-SHA384/SECP192R1 0", 104 .hash_type = SHA384, 224 /*** Tests for DECDSA-SHA384/SECP192R1 ***/ 239 .name="DECDSA-SHA384/SECP192R1 1", 244 .hash_type = SHA384, 370 /*** Tests for DECDSA-SHA384/SECP256R1 ***/ 388 .name="DECDSA-SHA384/SECP256R1 0", 393 .hash_type = SHA384, 522 /*** Tests for DECDSA-SHA384/SECP256R1 ***/ [all …]
|