Home
last modified time | relevance | path

Searched refs:CCM (Results 1 – 25 of 49) sorted by relevance

12

/src/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpciph_aria.txt197 Title = ARIA CCM test vectors from IETF draft-ietf-avtcore-aria-srtp-02
201 Cipher = ARIA-128-CCM
209 Cipher = ARIA-256-CCM
219 Cipher = ARIA-128-CCM
227 Cipher = ARIA-256-CCM
237 Cipher = ARIA-128-CCM
245 Cipher = ARIA-256-CCM
254 Cipher = ARIA-256-CCM
H A Devpciph_sm4.txt62 Title = SM4 CCM test vectors from RFC8998
64 Cipher = SM4-CCM
/src/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_aes_ccm.c68 IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 128, 8, 96);
70 IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 192, 8, 96);
72 IMPLEMENT_aead_cipher(aes, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
H A Dcipher_aria_ccm.c54 IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 128, 8, 96);
56 IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 192, 8, 96);
58 IMPLEMENT_aead_cipher(aria, ccm, CCM, AEAD_FLAGS, 256, 8, 96);
H A Dcipher_aes_ccm_hw_rv64i.inc11 * RISC-V 64 ZKND ZKNE support for AES CCM.
35 * RISC-V RV64 ZVKNED support for AES CCM.
H A Dcipher_sm4_ccm.c54 IMPLEMENT_aead_cipher(sm4, ccm, CCM, AEAD_FLAGS, 128, 8, 96);
H A Dcipher_aes_ccm_hw_t4.inc11 * Fujitsu SPARC64 X support for AES CCM.
H A Dcipher_aes_ccm_hw_aesni.inc11 * AES-NI support for AES CCM.
H A Dcipher_sm4_ccm_hw_rv64i.inc11 * RV64I ZVKSED support for SM4 CCM.
H A Dcipher_aes_ccm_hw_rv32i.inc11 * RISC-V 32 ZKND ZKNE support for AES CCM.
/src/crypto/openssl/doc/man7/
H A DEVP_CIPHER-ARIA.pod31 =item "ARIA-128-CCM", "ARIA-192-CCM" and "ARIA-256-CCM"
H A Dopenssl-quic-concurrency.pod64 The B<Contentive Concurrency Model (CCM)>, which supports multi-threaded usage.
89 The B<Contentive Concurrency Model (CCM)> performs automatic locking when making
118 The default concurrency model is CCM or TACM, depending on the B<SSL_METHOD>
120 concurrency model of CCM, whereas using L<OSSL_QUIC_client_thread_method(3)>
168 connections or streams in the same QUIC domain should a) select the CCM or TACM
173 An application should select the CCM concurrency model if the application can
199 Specifying this flag configures the Contentive Concurrency Model (CCM) (unless
259 Contentive Concurrency Model (CCM) is used with the
264 Otherwise, the Contentive Concurrency Model (CCM) is used.
H A DEVP_CIPHER-AES.pod34 =item "AES-128-CCM", "AES-192-CCM" and "AES-256-CCM"
H A DEVP_CIPHER-SM4.pod29 =item "SM4-CCM"
/src/crypto/openssl/doc/designs/quic-design/
H A Dquic-concurrency.md52 - **Contentive Concurrency Model (CCM):** In the
69 (NB-CCM) or which does support blocking (B-CCM). The blocking variant must
72 - **Thread Assisted Contentive Concurrency Model (TA-CCM):** This is currently
103 | CCM | | MT (Contentive) | Optional | Mutex, (Notifier) …
104 | TA-CCM† | | MT (Contentive) | Optional | Mutex, Thread, (Notifier)…
134 regard. The feasibility of having the UCM and CCM models support RX steering
147 Since UCM is basically a slight optimisation of CCM in which unnecessary locking
148 is elided, discussion from hereon in will focus on CCM and WCM except where
149 there are specific differences between CCM and UCM.
151 Supporting both CCM and WCM creates significant architectural challenges. Under
[all …]
/src/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in303 AES in Cipher Block Chaining - Message Authentication Mode (CCM): these
304 cipher suites are only supported in TLS v1.2. B<AESCCM> references CCM
607 RSA_WITH_AES_128_CCM AES128-CCM
608 RSA_WITH_AES_256_CCM AES256-CCM
609 DHE_RSA_WITH_AES_128_CCM DHE-RSA-AES128-CCM
610 DHE_RSA_WITH_AES_256_CCM DHE-RSA-AES256-CCM
615 ECDHE_ECDSA_WITH_AES_128_CCM ECDHE-ECDSA-AES128-CCM
616 ECDHE_ECDSA_WITH_AES_256_CCM ECDHE-ECDSA-AES256-CCM
713 PSK_WITH_AES_128_CCM PSK-AES128-CCM
714 PSK_WITH_AES_256_CCM PSK-AES256-CCM
[all …]
/src/crypto/openssl/crypto/evp/
H A De_aria.c784 BLOCK_CIPHER_aead(128, ccm, CCM)
785 BLOCK_CIPHER_aead(192, ccm, CCM)
786 BLOCK_CIPHER_aead(256, ccm, CCM)
/src/crypto/openssl/doc/man3/
H A DEVP_aria_128_gcm.pod89 ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
H A DSSL_CTX_set_domain_flags.pod45 Specifying this flag configures the Contentive Concurrency Model (CCM) (unless
H A DEVP_aes_128_gcm.pod128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
/src/sys/contrib/device-tree/Bindings/pinctrl/
H A Dbrcm,iproc-gpio.txt109 * Touchscreen that uses the CCM GPIO 0 and 1
/src/sys/contrib/device-tree/Bindings/dma/
H A Dfsl-imx-sdma.txt44 11 CCM
/src/crypto/openssl/demos/
H A DREADME.txt16 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt
/src/share/doc/papers/
H A Dbsdreferences.bib330 @inproceedings{Woodruff:2014:CCM:2665671.2665740,
346 @article{Woodruff:2014:CCM:2678373.2665740,
/src/sys/dev/cxgbe/crypto/
H A Dt4_crypto.c221 enum { HASH, HMAC, CIPHER, ETA, GCM, CCM } mode; enumerator
2134 case CCM: in ccr_aes_setkey()
2452 s->mode = CCM; in ccr_newsession()
2477 } else if (s->mode == CCM) { in ccr_newsession()
2626 case CCM: in ccr_process()
2715 case CCM: in fw6_pld_ccr()

12