| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 25-cipher.cnf.in | 25 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 29 "CipherString" => "ECDHE-RSA-AES256-SHA384" 32 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 39 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 53 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 57 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 67 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 72 "CipherString" => "ECDHE-RSA-AES256-SHA384" 75 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 82 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
| H A D | 25-cipher.cnf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 30 CipherString = ECDHE-RSA-AES256-SHA384 36 ExpectedCipher = ECDHE-RSA-AES256-SHA384 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 106 CipherString = ECDHE-RSA-AES256-SHA384 112 ExpectedCipher = ECDHE-RSA-AES256-SHA384 126 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 [all …]
|
| H A D | 20-cert-select.cnf.in | 193 name => "ECDSA Signature Algorithm Selection SHA384", 196 "SignatureAlgorithms" => randcase("ECDSA+SHA384"), 200 "ExpectedServerSignHash" => "SHA384", 282 "SignatureAlgorithms" => randcase("ECDSA+SHA384:ECDSA+SHA256") 301 "SignatureAlgorithms" => randcase("ECDSA+SHA256:ECDSA+SHA384") 305 "ExpectedServerSignHash" => "SHA384", 723 name => "TLS 1.3 RSA Signature Algorithm Selection SHA384 with PSS", 726 "SignatureAlgorithms" => randcase("ECDSA+SHA384:RSA-PSS+SHA384"), 730 "ExpectedServerSignHash" => "SHA384",
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_ecdsa_rfc6979.txt | 82 DigestSign = SHA384 88 DigestVerify = SHA384 93 DigestVerify = SHA384 167 DigestSign = SHA384 173 DigestVerify = SHA384 178 DigestVerify = SHA384 268 DigestSign = SHA384 274 DigestVerify = SHA384 279 DigestVerify = SHA384 353 DigestSign = SHA384 [all …]
|
| H A D | evpkdf_ssh.txt | 2898 Ctrl.digest = digest:SHA384 2906 Ctrl.digest = digest:SHA384 2914 Ctrl.digest = digest:SHA384 2922 Ctrl.digest = digest:SHA384 2930 Ctrl.digest = digest:SHA384 2938 Ctrl.digest = digest:SHA384 2946 Ctrl.digest = digest:SHA384 2954 Ctrl.digest = digest:SHA384 2962 Ctrl.digest = digest:SHA384 2970 Ctrl.digest = digest:SHA384 [all …]
|
| H A D | evppkey_dsa_rfc6979.txt | 76 DigestSign = SHA384 82 DigestVerify = SHA384 131 DigestSign = SHA384 137 DigestVerify = SHA384 229 DigestSign = SHA384 235 DigestVerify = SHA384 284 DigestSign = SHA384 290 DigestVerify = SHA384
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-ciphers.1 | 371 .IP "\fBSHA256\fR, \fBSHA384\fR" 4 372 .IX Item "SHA256, SHA384" 373 Cipher suites using SHA256 or SHA384. 410 ECDSA and SHA256 or SHA384, only the elliptic curves P\-256 and P\-384 can be 412 (ECDHE\-ECDSA\-AES128\-GCM\-SHA256 and ECDHE\-ECDSA\-AES256\-GCM\-SHA384) are 581 \& TLS_RSA_WITH_AES_256_GCM_SHA384 AES256\-GCM\-SHA384 586 \& TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH\-RSA\-AES256\-GCM\-SHA384 591 \& TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH\-DSS\-AES256\-GCM\-SHA384 596 \& TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE\-RSA\-AES256\-GCM\-SHA384 601 \& TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE\-DSS\-AES256\-GCM\-SHA384 [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-ciphers.pod.in | 355 =item B<SHA256>, B<SHA384> 357 Cipher suites using SHA256 or SHA384. 403 ECDSA and SHA256 or SHA384, only the elliptic curves P-256 and P-384 can be 405 (ECDHE-ECDSA-AES128-GCM-SHA256 and ECDHE-ECDSA-AES256-GCM-SHA384) are 570 TLS_RSA_WITH_AES_256_GCM_SHA384 AES256-GCM-SHA384 575 TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH-RSA-AES256-GCM-SHA384 580 TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH-DSS-AES256-GCM-SHA384 585 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE-RSA-AES256-GCM-SHA384 590 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE-DSS-AES256-GCM-SHA384 593 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDHE-RSA-AES256-SHA384 [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | tls1.h | 930 # define TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384 "PSK-AES256-GCM-SHA384" 932 # define TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384 "DHE-PSK-AES256-GCM-SHA384" 934 # define TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384 "RSA-PSK-AES256-GCM-SHA384" 937 # define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384 "PSK-AES256-CBC-SHA384" 939 # define TLS1_TXT_PSK_WITH_NULL_SHA384 "PSK-NULL-SHA384" 942 # define TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384 "DHE-PSK-AES256-CBC-SHA384" 944 # define TLS1_TXT_DHE_PSK_WITH_NULL_SHA384 "DHE-PSK-NULL-SHA384" 947 # define TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384 "RSA-PSK-AES256-CBC-SHA384" 949 # define TLS1_TXT_RSA_PSK_WITH_NULL_SHA384 "RSA-PSK-NULL-SHA384" 993 # define TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384 "PSK-CAMELLIA256-SHA384" [all …]
|
| /freebsd/contrib/libarchive/libarchive/test/ |
| H A D | test_write_format_mtree_preset_digests.c | 36 unsigned char sha384[48]; member 82 assertEqualInt(ARCHIVE_OK, archive_sha384_final(&expectedSha384Ctx, ed.sha384)); in DEFINE_TEST() 128 …mcmp(archive_entry_digest(entry, ARCHIVE_ENTRY_DIGEST_SHA384), ed.sha384, sizeof(ed.sha384)) == 0); in DEFINE_TEST() 172 assertEqualInt(ARCHIVE_OK, archive_sha384_final(&expectedSha384Ctx, ed.sha384)); in DEFINE_TEST() 219 …mcmp(archive_entry_digest(entry, ARCHIVE_ENTRY_DIGEST_SHA384), ed.sha384, sizeof(ed.sha384)) == 0); in DEFINE_TEST() 264 assertEqualInt(ARCHIVE_OK, archive_sha384_final(&expectedSha384Ctx, ed.sha384)); in DEFINE_TEST() 311 …mcmp(archive_entry_digest(entry, ARCHIVE_ENTRY_DIGEST_SHA384), ed.sha384, sizeof(ed.sha384)) == 0); in DEFINE_TEST() 355 assertEqualInt(ARCHIVE_OK, archive_sha384_final(&expectedSha384Ctx, ed.sha384)); in DEFINE_TEST() 400 …mcmp(archive_entry_digest(entry, ARCHIVE_ENTRY_DIGEST_SHA384), ed.sha384, sizeof(ed.sha384)) == 0); in DEFINE_TEST() 448 assertEqualInt(ARCHIVE_OK, archive_sha384_final(&expectedSha384Ctx, ed.sha384)); in DEFINE_TEST() [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | sha384.c | 12 #include "sha384.h" 17 * hmac_sha384_vector - HMAC-SHA384 over data vector (RFC 2104) 42 /* if key is longer than 128 bytes reset it to key = SHA384(key) */ in hmac_sha384_vector() 52 * SHA384(K XOR opad, SHA384(K XOR ipad, text)) in hmac_sha384_vector() 66 /* perform inner SHA384 */ in hmac_sha384_vector() 82 /* perform outer SHA384 */ in hmac_sha384_vector() 92 * hmac_sha384 - HMAC-SHA384 over data buffer (RFC 2104)
|
| H A D | sha384-internal.c | 17 * sha384_vector - SHA384 hash for data vector 40 /* ===== start - public domain SHA384 implementation ===== */ 42 /* This is based on SHA384 implementation in LibTomCrypt that was released into 92 /* ===== end - public domain SHA384 implementation ===== */
|
| H A D | sha384-kdf.c | 2 * HMAC-SHA384 KDF (RFC 5295) and HKDF-Expand(SHA384) (RFC 5869) 12 #include "sha384.h" 16 * hmac_sha384_kdf - HMAC-SHA384 based KDF (RFC 5295)
|
| H A D | Makefile | 43 sha384.o \ 44 sha384-prf.o \ 45 sha384-internal.o \
|
| H A D | sha384-prf.c | 2 * SHA384-based KDF (IEEE 802.11ac) 12 #include "sha384.h" 17 * sha384_prf - SHA384-based Key derivation function (IEEE 802.11ac, 11.6.1.7.2)
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SHA256_Init.pod | 6 SHA224_Final, SHA256, SHA256_Init, SHA256_Update, SHA256_Final, SHA384, 17 unsigned char *SHA384(const unsigned char *data, size_t count, unsigned char *md_buf); 47 except for SHA1(), SHA224(), SHA256(), SHA384() and SHA512() are deprecated. 50 SHA1(), SHA224(), SHA256(), SHA384(), and SHA256() 74 The SHA224, SHA256, SHA384 and SHA512 families of functions operate in the 76 B<SHA256_CTX> object instead of B<SHA_CTX>. SHA384 and SHA512 use B<SHA512_CTX>. 80 SHA224(), SHA256(), SHA384() and SHA512() functions are not thread safe if 85 SHA1(), SHA224(), SHA256(), SHA384() and SHA512() return a pointer to the hash 89 SHA384 and SHA512 functions return 1 for success, 0 otherwise.
|
| H A D | EVP_DigestVerifyInit.pod | 70 Supports SHA1, SHA224, SHA256, SHA384 and SHA512 74 Supports SHA1, SHA224, SHA256, SHA384, SHA512 and SM3 82 Supports SHA1, SHA256, SHA384 and SHA512 86 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2,
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SHA256_Init.3 | 65 SHA224_Final, SHA256, SHA256_Init, SHA256_Update, SHA256_Final, SHA384, 76 \& unsigned char *SHA384(const unsigned char *data, size_t count, unsigned char *md_buf); 108 except for \fBSHA1()\fR, \fBSHA224()\fR, \fBSHA256()\fR, \fBSHA384()\fR and \fBSHA512()\fR are depr… 111 \&\fBSHA1()\fR, \fBSHA224()\fR, \fBSHA256()\fR, \fBSHA384()\fR, and \fBSHA256()\fR 137 The SHA224, SHA256, SHA384 and SHA512 families of functions operate in the 139 \&\fBSHA256_CTX\fR object instead of \fBSHA_CTX\fR. SHA384 and SHA512 use \fBSHA512_CTX\fR. 143 \&\fBSHA224()\fR, \fBSHA256()\fR, \fBSHA384()\fR and \fBSHA512()\fR functions are not thread safe if 147 \&\fBSHA1()\fR, \fBSHA224()\fR, \fBSHA256()\fR, \fBSHA384()\fR and \fBSHA512()\fR return a pointer … 151 SHA384 and SHA512 functions return 1 for success, 0 otherwise.
|
| H A D | EVP_DigestVerifyInit.3 | 126 Supports SHA1, SHA224, SHA256, SHA384 and SHA512 129 Supports SHA1, SHA224, SHA256, SHA384, SHA512 and SM3 135 Supports SHA1, SHA256, SHA384 and SHA512 138 Support SHA1, SHA224, SHA256, SHA384, SHA512, MD5, MD5_SHA1, MD2, MD4, MDC2,
|
| /freebsd/usr.sbin/wpa/src/crypto/ |
| H A D | Makefile | 18 sha384-prf.c \ 19 sha384-tlsprf.c \ 111 SRCS+= sha384.c 113 SRCS+= sha384-internal.c \ 114 sha384-prf.c \ 115 sha384-tlsprf.c
|
| /freebsd/crypto/openssl/crypto/objects/ |
| H A D | obj_xref.txt | 11 sha384WithRSAEncryption sha384 rsaEncryption 56 ecdsa_with_SHA384 sha384 X9_62_id_ecPublicKey 78 dhSinglePass_stdDH_sha384kdf_scheme sha384 dh_std_kdf 84 dhSinglePass_cofactorDH_sha384kdf_scheme sha384 dh_cofactor_kdf
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_SIGNATURE-ECDSA.7 | 90 .IP """ECDSA\-SHA2\-384"", ""ECDSA\-SHA384"", ""ecdsa\-with\-SHA384"", ""1.2.840.10045.4.3.3""" 4 91 .IX Item """ECDSA-SHA2-384"", ""ECDSA-SHA384"", ""ecdsa-with-SHA384"", ""1.2.840.10045.4.3.3"""
|
| H A D | EVP_SIGNATURE-DSA.7 | 96 .IP """DSA\-SHA2\-384"", ""DSA\-SHA384"", ""dsa_with_SHA384"", ""id\-dsa\-with\-sha384"", ""1.2.840… 97 .IX Item """DSA-SHA2-384"", ""DSA-SHA384"", ""dsa_with_SHA384"", ""id-dsa-with-sha384"", ""1.2.840.…
|
| /freebsd/sys/dev/qat/qat_api/qat_utils/include/ |
| H A D | qat_utils.h | 33 #include <crypto/sha2/sha384.h> 748 * @brief Calculate SHA384 transform operation 751 * The buffer needs to be at least sha384 block size long as defined in 753 * out - output pointer for state data after single sha384 transform 755 * The buffer needs to be at least sha384 state size long as defined in 768 * @brief Calculate SHA384 transform operation 771 * The buffer needs to be at least sha384 block size long as defined in 773 * out - output pointer for state data after single sha384 transform 775 * The buffer needs to be at least sha384 state size long as defined in
|
| /freebsd/sys/contrib/device-tree/Bindings/crypto/ |
| H A D | nvidia,tegra234-se-hash.yaml | 11 SHA1, SHA224, SHA256, SHA384, SHA512, SHA3-224, SHA3-256, SHA3-384, SHA3-512 12 HMAC(SHA224), HMAC(SHA256), HMAC(SHA384), HMAC(SHA512)
|