| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 25-cipher.cnf.in | 25 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 39 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 43 "CipherString" => "ECDHE-RSA-AES128-SHA256" 46 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 53 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 57 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 60 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 67 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 82 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 87 "CipherString" => "ECDHE-RSA-AES128-SHA256" [all …]
|
| H A D | 25-cipher.cnf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 55 CipherString = ECDHE-RSA-AES128-SHA256 61 ExpectedCipher = ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 86 ExpectedCipher = ECDHE-RSA-AES128-SHA256 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 126 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 132 CipherString = ECDHE-RSA-AES128-SHA256 [all …]
|
| H A D | 20-cert-select.cnf.in | 157 "SignatureAlgorithms" => randcase("ECDSA+SHA256:ed25519"), 161 "ExpectedServerSignHash" => "SHA256", 183 "SignatureAlgorithms" => randcase("ECDSA+SHA256"), 187 "ExpectedServerSignHash" => "SHA256", 213 "SignatureAlgorithms" => randcase("ECDSA+SHA256"), 217 "ExpectedServerSignHash" => "SHA256", 228 "SignatureAlgorithms" => randcase("ECDSA+SHA256"), 238 "SignatureAlgorithms" => randcase("RSA+SHA256"), 242 "ExpectedServerSignHash" => "SHA256", 251 "SignatureAlgorithms" => randcase("RSA-PSS+SHA256"), [all …]
|
| H A D | 26-tls13_client_auth.cnf.in | 84 "ClientSignatureAlgorithms" => randcase("PSS+SHA256"), 98 "ExpectedClientSignHash" => "SHA256", 107 "ClientSignatureAlgorithms" => randcase("PSS+SHA256"), 122 "ExpectedClientSignHash" => "SHA256", 182 "ClientSignatureAlgorithms" => randcase("PSS+SHA256"), 200 "ExpectedClientSignHash" => "SHA256", 209 "ClientSignatureAlgorithms" => randcase("PSS+SHA256"), 228 "ExpectedClientSignHash" => "SHA256",
|
| H A D | 20-cert-select.cnf | 218 SignatureAlgorithms = ecdSA+SHA256:eD25519 225 ExpectedServerSignHash = SHA256 277 SignatureAlgorithms = eCDsa+SHA256 284 ExpectedServerSignHash = SHA256 341 SignatureAlgorithms = EcDsA+SHA256 348 ExpectedServerSignHash = SHA256 369 SignatureAlgorithms = eCdsA+SHA256 400 SignatureAlgorithms = rsA+SHA256 407 ExpectedServerSignHash = SHA256 434 SignatureAlgorithms = RSA-pss+SHA256 [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-ciphers.pod.in | 126 cipher suites of a certain type. For example B<SHA256> represents all cipher 127 suites using the digest algorithm SHA256 and B<TLSv1.2> represents all 132 B<SHA256+AES> represents all cipher suites using the SHA256 B<and> the AES 350 =item B<SHA256>, B<SHA384> 352 Cipher suites using SHA256 or SHA384. 428 ECDSA and SHA256 or SHA384, only the elliptic curves P-256 and P-384 can be 430 (ECDHE-ECDSA-AES128-GCM-SHA256 and ECDHE-ECDSA-AES256-GCM-SHA384) are 454 TLS_DH_anon_WITH_AES_128_CBC_SHA256 ADH-AES128-SHA256 456 TLS_DH_anon_WITH_AES_128_GCM_SHA256 ADH-AES128-GCM-SHA256 457 TLS_DH_anon_WITH_AES_256_CBC_SHA256 ADH-AES256-SHA256 [all …]
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpkdf_ss.txt | 426 Ctrl.digest = digest:SHA256 440 Ctrl.digest = digest:SHA256 448 Ctrl.digest = digest:SHA256 456 Ctrl.digest = digest:SHA256 464 Ctrl.digest = digest:SHA256 472 Ctrl.digest = digest:SHA256 480 Ctrl.digest = digest:SHA256 488 Ctrl.digest = digest:SHA256 496 Ctrl.digest = digest:SHA256 504 Ctrl.digest = digest:SHA256 [all …]
|
| H A D | evppkey_ecdsa_rfc6979.txt | 65 DigestSign = SHA256 71 DigestVerify = SHA256 76 DigestVerify = SHA256 150 DigestSign = SHA256 156 DigestVerify = SHA256 161 DigestVerify = SHA256 251 DigestSign = SHA256 257 DigestVerify = SHA256 262 DigestVerify = SHA256 336 DigestSign = SHA256 [all …]
|
| H A D | evpciph_aes_stitched.txt | 64 Title = AES-128-CBC-HMAC-SHA256 test vectors 66 Cipher = AES-128-CBC-HMAC-SHA256 76 Cipher = AES-128-CBC-HMAC-SHA256 86 Cipher = AES-128-CBC-HMAC-SHA256 96 Title = AES-256-CBC-HMAC-SHA256 test vectors 98 Cipher = AES-256-CBC-HMAC-SHA256 108 Cipher = AES-256-CBC-HMAC-SHA256 118 Cipher = AES-256-CBC-HMAC-SHA256
|
| H A D | evppkey_kdf_hkdf.txt | 17 Ctrl.md = md:SHA256 25 Ctrl.md = md:SHA256 32 Ctrl.md = md:SHA256 38 Ctrl.md = md:SHA256 46 Ctrl.md = md:SHA256 53 Ctrl.md = md:SHA256 59 Ctrl.md = md:SHA256 67 Ctrl.md = md:SHA256 75 Ctrl.md = md:SHA256
|
| H A D | evpkdf_tls12_prf.txt | 18 Ctrl.digest = digest:SHA256 27 Ctrl.digest = digest:SHA256 37 Ctrl.digest = digest:SHA256 55 Ctrl.digest = digest:SHA256 69 Ctrl.digest = digest:SHA256 119 Ctrl.digest = digest:SHA256 134 Ctrl.digest = digest:SHA256
|
| H A D | evppkey_dsa_rfc6979.txt | 65 DigestSign = SHA256 71 DigestVerify = SHA256 120 DigestSign = SHA256 126 DigestVerify = SHA256 218 DigestSign = SHA256 224 DigestVerify = SHA256 273 DigestSign = SHA256 279 DigestVerify = SHA256
|
| H A D | evppkey_dsa_sigalg.txt | 275 Sign-Message = DSA-SHA256:DSA-2048-160 283 Sign-Message = DSA-SHA256:DSA-2048-224 291 Sign-Message = DSA-SHA256:DSA-2048-256 298 Sign-Message = DSA-SHA256:DSA-3072-256 311 Verify-Message = DSA-SHA256:DSA-1024 323 Verify-Message = DSA-SHA256:DSA-2048-160 332 Sign-Message = DSA-SHA256:DSA-1024-FIPS186-2 348 Sign-Message = DSA-SHA256:DSA-3072-224 356 Sign-Message = DSA-SHA256:DSA-4096-256 368 Sign-Message = DSA-SHA256:DSA-1024-FIPS186-2 [all …]
|
| H A D | evppkey_dsa.txt | 273 DigestSign = SHA256 281 DigestSign = SHA256 289 DigestSign = SHA256 296 DigestSign = SHA256 309 DigestVerify = SHA256 322 DigestVerify = SHA256 331 DigestSign = SHA256 347 DigestSign = SHA256 355 DigestSign = SHA256 363 DigestSign = SHA256 [all …]
|
| H A D | evpkdf_hkdf.txt | 17 Ctrl.digest = digest:SHA256 25 Ctrl.digest = digest:SHA256 32 Ctrl.digest = digest:SHA256 38 Ctrl.digest = digest:SHA256 46 Ctrl.digest = digest:SHA256 53 Ctrl.digest = digest:SHA256 59 Ctrl.digest = digest:SHA256 67 Ctrl.digest = digest:SHA256 75 Ctrl.digest = digest:SHA256
|
| H A D | evpkdf_ssh.txt | 1938 Ctrl.digest = digest:SHA256 1946 Ctrl.digest = digest:SHA256 1954 Ctrl.digest = digest:SHA256 1962 Ctrl.digest = digest:SHA256 1970 Ctrl.digest = digest:SHA256 1978 Ctrl.digest = digest:SHA256 1986 Ctrl.digest = digest:SHA256 1994 Ctrl.digest = digest:SHA256 2002 Ctrl.digest = digest:SHA256 2010 Ctrl.digest = digest:SHA256 [all …]
|
| H A D | evppkey_kdf_tls1_prf.txt | 42 Ctrl.md = md:SHA256 50 Ctrl.md = md:SHA256 59 Ctrl.md = md:SHA256 114 Ctrl.digest = digest:SHA256 129 Ctrl.digest = digest:SHA256
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SHA256_Init.pod | 6 SHA224_Final, SHA256, SHA256_Init, SHA256_Update, SHA256_Final, SHA384, 16 unsigned char *SHA256(const unsigned char *data, size_t count, unsigned char *md_buf); 47 except for SHA1(), SHA224(), SHA256(), SHA384() and SHA512() are deprecated. 50 SHA1(), SHA224(), SHA256(), SHA384(), and SHA256() 53 (EVP_Q_digest(d, n, md, NULL, NULL, "SHA256", NULL) ? md : NULL) 74 The SHA224, SHA256, SHA384 and SHA512 families of functions operate in the 75 same way as for the SHA1 functions. Note that SHA224 and SHA256 use a 80 SHA224(), SHA256(), SHA384() and SHA512() functions are not thread safe if 85 SHA1(), SHA224(), SHA256(), SHA384() and SHA512() return a pointer to the hash 88 SHA1_Init(), SHA1_Update() and SHA1_Final() and equivalent SHA224, SHA256,
|
| H A D | EVP_PKEY_verify.pod | 56 length, such as ED25519, RSA-SHA256 and similar. 100 to produce the digest internally, and while RSA-SHA256 can be expected to 107 L<EVP_PKEY_CTX_set_rsa_padding(3)> and similar others), while an RSA-SHA256 115 an I<algo> that fetched C<RSA> and try to specify SHA256 separately to get the 116 functionality of RSA-SHA256. If combining algorithms in that manner is 161 =head2 RSA with PKCS#1 padding for SHA256 163 Verify signature using PKCS#1 padding and a SHA256 digest as input: 195 =head2 RSA-SHA256 with a pre-computed digest 197 Verify a digest with RSA-SHA256 using one-shot functions. To be noted is that 198 RSA-SHA256 is assumed to be an implementation of C<sha256WithRSAEncryption>, [all …]
|
| H A D | EVP_PKEY_sign.pod | 45 composite signature algorithm (such as RSA-SHA256) was fetched. 56 length, such as ED25519, RSA-SHA256 and similar. 105 i.e. to produce the message digest internally, and while RSA-SHA256 can be 112 L<EVP_PKEY_CTX_set_rsa_padding(3)> and similar others), while an RSA-SHA256 120 an I<algo> that fetched C<RSA> and try to specify SHA256 separately to get the 121 functionality of RSA-SHA256. If combining algorithms in that manner is 149 =head2 RSA with PKCS#1 padding for SHA256 151 Sign data using RSA with PKCS#1 padding and a SHA256 digest as input: 191 =head2 RSA-SHA256 with a pre-computed digest 193 Sign a digest with RSA-SHA256 using one-shot functions. To be noted is that [all …]
|
| H A D | SSL_CTX_set1_sigalgs.pod | 83 example "MD5", "SHA1", "SHA224", "SHA256", "SHA384", "SHA512") and 97 Set supported signature algorithms to SHA256 with ECDSA and SHA256 with RSA 104 Set supported signature algorithms to SHA256 with ECDSA and SHA256 with RSA 107 SSL_CTX_set1_sigalgs_list(ctx, "ECDSA+SHA256:RSA+SHA256");
|
| /freebsd/crypto/libecc/src/tests/ |
| H A D | bip0340_test_vectors.h | 50 .hash_type = SHA256, 95 .hash_type = SHA256, 140 .hash_type = SHA256, 185 .hash_type = SHA256,
|
| /freebsd/contrib/llvm-project/llvm/lib/Support/ |
| H A D | SHA256.cpp | 1 //====- SHA256.cpp - SHA256 implementation ---*- C++ -* ======// 22 #include "llvm/Support/SHA256.h" 51 void SHA256::init() { in init() 64 void SHA256::hashBlock() { in hashBlock() 169 void SHA256::addUncounted(uint8_t Data) { in addUncounted() 182 void SHA256::writebyte(uint8_t Data) { in writebyte() 187 void SHA256::update(ArrayRef<uint8_t> Data) { in update() 215 void SHA256::update(StringRef Str) { in update() 220 void SHA256 [all...] |
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | RSA-PSS.pod | 23 for example, if the key can only be used with digest SHA256, MGF1 SHA256 25 will be set to SHA256, SHA256 and 32 respectively.
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | efi | 24 >0 guid E2B36190-879B-4A3D-AD8D-F2E7BBA32784 EFI Signature List, RSA2048 SHA256 26 >0 guid A7717414-C616-4977-9420-844712A735BF EFI Signature List, RSA2048 SHA256 type 29 >0 guid C1C41626-504C-4092-ACA9-41F936934328 EFI Signature List, SHA256 33 >0 guid 3BD2A492-96C0-4079-B420-FCF98EF103ED EFI Signature List, X509 SHA256
|