| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpciph_aria.txt | 197 Title = ARIA CCM test vectors from IETF draft-ietf-avtcore-aria-srtp-02 201 Cipher = ARIA-128-CCM 209 Cipher = ARIA-256-CCM 219 Cipher = ARIA-128-CCM 227 Cipher = ARIA-256-CCM 237 Cipher = ARIA-128-CCM 245 Cipher = ARIA-256-CCM 254 Cipher = ARIA-256-CCM
|
| H A D | evpciph_sm4.txt | 62 Title = SM4 CCM test vectors from RFC8998 64 Cipher = SM4-CCM
|
| /src/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_aes_ccm.c | 68 IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 128, 8, 96); 70 IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 192, 8, 96); 72 IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
|
| H A D | cipher_aria_ccm.c | 54 IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 128, 8, 96); 56 IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 192, 8, 96); 58 IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
|
| H A D | cipher_aes_ccm_hw_rv64i.inc | 11 * RISC-V 64 ZKND ZKNE support for AES CCM. 35 * RISC-V RV64 ZVKNED support for AES CCM.
|
| H A D | cipher_sm4_ccm.c | 54 IMPLEMENT_aead_cipher(sm4, ccm, CCM, AEAD_FLAGS, 128, 8, 96);
|
| H A D | cipher_aes_ccm_hw_t4.inc | 11 * Fujitsu SPARC64 X support for AES CCM.
|
| H A D | cipher_aes_ccm_hw_aesni.inc | 11 * AES-NI support for AES CCM.
|
| H A D | cipher_sm4_ccm_hw_rv64i.inc | 11 * RV64I ZVKSED support for SM4 CCM.
|
| H A D | cipher_aes_ccm_hw_rv32i.inc | 11 * RISC-V 32 ZKND ZKNE support for AES CCM.
|
| /src/crypto/openssl/doc/man7/ |
| H A D | EVP_CIPHER-ARIA.pod | 31 =item "ARIA-128-CCM", "ARIA-192-CCM" and "ARIA-256-CCM"
|
| H A D | openssl-quic-concurrency.pod | 64 The B<Contentive Concurrency Model (CCM)>, which supports multi-threaded usage. 89 The B<Contentive Concurrency Model (CCM)> performs automatic locking when making 118 The default concurrency model is CCM or TACM, depending on the B<SSL_METHOD> 120 concurrency model of CCM, whereas using L<OSSL_QUIC_client_thread_method(3)> 168 connections or streams in the same QUIC domain should a) select the CCM or TACM 173 An application should select the CCM concurrency model if the application can 199 Specifying this flag configures the Contentive Concurrency Model (CCM) (unless 259 Contentive Concurrency Model (CCM) is used with the 264 Otherwise, the Contentive Concurrency Model (CCM) is used.
|
| H A D | EVP_CIPHER-AES.pod | 34 =item "AES-128-CCM", "AES-192-CCM" and "AES-256-CCM"
|
| H A D | EVP_CIPHER-SM4.pod | 29 =item "SM4-CCM"
|
| /src/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-concurrency.md | 52 - **Contentive Concurrency Model (CCM):** In the 69 (NB-CCM) or which does support blocking (B-CCM). The blocking variant must 72 - **Thread Assisted Contentive Concurrency Model (TA-CCM):** This is currently 103 | CCM | | MT (Contentive) | Optional | Mutex, (Notifier) … 104 | TA-CCM† | | MT (Contentive) | Optional | Mutex, Thread, (Notifier)… 134 regard. The feasibility of having the UCM and CCM models support RX steering 147 Since UCM is basically a slight optimisation of CCM in which unnecessary locking 148 is elided, discussion from hereon in will focus on CCM and WCM except where 149 there are specific differences between CCM and UCM. 151 Supporting both CCM and WCM creates significant architectural challenges. Under [all …]
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-ciphers.pod.in | 303 AES in Cipher Block Chaining - Message Authentication Mode (CCM): these 304 cipher suites are only supported in TLS v1.2. B<AESCCM> references CCM 607 RSA_WITH_AES_128_CCM AES128-CCM 608 RSA_WITH_AES_256_CCM AES256-CCM 609 DHE_RSA_WITH_AES_128_CCM DHE-RSA-AES128-CCM 610 DHE_RSA_WITH_AES_256_CCM DHE-RSA-AES256-CCM 615 ECDHE_ECDSA_WITH_AES_128_CCM ECDHE-ECDSA-AES128-CCM 616 ECDHE_ECDSA_WITH_AES_256_CCM ECDHE-ECDSA-AES256-CCM 713 PSK_WITH_AES_128_CCM PSK-AES128-CCM 714 PSK_WITH_AES_256_CCM PSK-AES256-CCM [all …]
|
| /src/crypto/openssl/crypto/evp/ |
| H A D | e_aria.c | 784 BLOCK_CIPHER_aead(128, ccm, CCM) 785 BLOCK_CIPHER_aead(192, ccm, CCM) 786 BLOCK_CIPHER_aead(256, ccm, CCM)
|
| /src/crypto/openssl/doc/man3/ |
| H A D | EVP_aria_128_gcm.pod | 89 ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
|
| H A D | SSL_CTX_set_domain_flags.pod | 45 Specifying this flag configures the Contentive Concurrency Model (CCM) (unless
|
| H A D | EVP_aes_128_gcm.pod | 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
|
| /src/sys/contrib/device-tree/Bindings/pinctrl/ |
| H A D | brcm,iproc-gpio.txt | 109 * Touchscreen that uses the CCM GPIO 0 and 1
|
| /src/sys/contrib/device-tree/Bindings/dma/ |
| H A D | fsl-imx-sdma.txt | 44 11 CCM
|
| /src/crypto/openssl/demos/ |
| H A D | README.txt | 16 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt
|
| /src/share/doc/papers/ |
| H A D | bsdreferences.bib | 330 @inproceedings{Woodruff:2014:CCM:2665671.2665740, 346 @article{Woodruff:2014:CCM:2678373.2665740,
|
| /src/sys/dev/cxgbe/crypto/ |
| H A D | t4_crypto.c | 221 enum { HASH, HMAC, CIPHER, ETA, GCM, CCM } mode; enumerator 2134 case CCM: in ccr_aes_setkey() 2452 s->mode = CCM; in ccr_newsession() 2477 } else if (s->mode == CCM) { in ccr_newsession() 2626 case CCM: in ccr_process() 2715 case CCM: in fw6_pld_ccr()
|