FreeBSD manual
download PDF document: crypto.7.pdf
CRYPTO(7) FreeBSD Miscellaneous Information Manual CRYPTO(7)
NAME
crypto - OpenCrypto algorithms
DESCRIPTION
The in-kernel OpenCrypto framework supports several different encryption
and authentication algorithms. This document describes the parameters
and requirements of these algorithms. Unless otherwise noted, all sizes
listed below are in bytes.
Authenticators
Authenticators compute a value (also known as a digest, hash, or tag)
over an input of bytes. In-kernel requests can either compute the value
for a given input, or verify if a given tag matches the computed tag for
a given input. The following authentication algorithms are supported:
Name Nonce Key Sizes Digest Description
CRYPTO_AES_CCM_CBC_MAC 12 16, 24, 32 16 Authentication-
only mode of
AES-CCM
CRYPTO_AES_NIST_GMAC 12 16, 24, 32 16 Galois message
authentication
code
CRYPTO_BLAKE2B 0, 64 64 Blake2b
CRYPTO_BLAKE2S 0, 32 32 Blake2s
CRYPTO_NULL_HMAC 12 IPsec NULL HMAC
CRYPTO_POLY1305 32 16 Poly1305
authenticator
CRYPTO_RIPEMD160 20 RIPE Message
Digest-160
CRYPTO_RIPEMD160_HMAC 64 20 RIPE Message
Digest-160 HMAC
CRYPTO_SHA1 20 SHA-1
CRYPTO_SHA1_HMAC 64 20 SHA-1 HMAC
CRYPTO_SHA2_224 28 SHA-2 224
CRYPTO_SHA2_224_HMAC 64 28 SHA-2 224 HMAC
CRYPTO_SHA2_256 32 SHA-2 256
CRYPTO_SHA2_256_HMAC 64 32 SHA-2 256 HMAC
CRYPTO_SHA2_384 48 SHA-2 384
CRYPTO_SHA2_384_HMAC 128 48 SHA-2 384 HMAC
CRYPTO_SHA2_512 64 SHA-2 512
CRYPTO_SHA2_512_HMAC 128 64 SHA-2 512 HMAC
Block Ciphers
Block ciphers in OCF can only operate on messages whose length is an
exact multiple of the cipher's block size. OCF supports the following
block ciphers:
Name IV Size Block Size Key Sizes Description
CRYPTO_AES_CBC 16 16 16, 24, 32 AES-CBC
CRYPTO_AES_XTS 8 16 32, 64 AES-XTS
CRYPTO_CAMELLIA_CBC 16 16 16, 24, 32 Camellia
CBC
CRYPTO_NULL_CBC 0 4 0-256 IPsec NULL
cipher
CRYPTO_AES_XTS implements XEX Tweakable Block Cipher with Ciphertext
Stealing as defined in NIST SP 800-38E. OCF consumers provide the first
Stream Ciphers
Stream ciphers can operate on messages with arbitrary lengths. OCF
supports the following stream ciphers:
Name IV Size Key Sizes Description
CRYPTO_AES_ICM 16 16, 24, 32 AES Counter Mode
CRYPTO_CHACHA20 16 16, 32 ChaCha20
The IV for each request must be provided in crp_iv via the
CRYPTO_F_IV_SEPARATE flag.
CRYPTO_AES_ICM uses the entire IV as a 128-bit big endian block counter.
The IV sets the initial counter value for a message. If a consumer
wishes to use an IV whose value is split into separate nonce and counter
fields (e.g., IPsec), the consumer is responsible for splitting requests
to handle counter rollover.
CRYPTO_CHACHA20 accepts a 16 byte IV. The first 8 bytes are used as a
nonce. The last 8 bytes are used as a 64-bit little-endian block
counter.
Authenticated Encryption with Associated Data Algorithms
AEAD algorithms in OCF combine a stream cipher with an authentication
algorithm to provide both secrecy and authentication. AEAD algorithms
accept additional authentication data (AAD) in addition to the ciphertext
or plaintext. AAD is passed to the authentication algorithm as input in
a method defined by the specific AEAD algorithm.
AEAD algorithms in OCF accept a nonce that is combined with an algorithm-
defined counter to construct the IV for the underlying stream cipher.
This nonce must be provided in crp_iv via the CRYPTO_F_IV_SEPARATE flag.
Some AEAD algorithms support multiple nonce sizes. The first size listed
is the default nonce size.
The following AEAD algorithms are supported:
Name Nonce Key Sizes Tag Description
CRYPTO_AES_NIST_GCM_16 12 16, 24, 32 16 AES
Galois/Counter
Mode
CRYPTO_AES_CCM_16 12, 7-13 16, 24, 32 16 AES Counter
with CBC-MAC
CRYPTO_CHACHA20_POLY1305 12, 8 32 16 ChaCha20-Poly1305
CRYPTO_XCHACHA20_POLY1305 24 32 16 XChaCha20-Poly1305
SEE ALSO
crypto(4), crypto(9)
HISTORY
The crypto manual page first appeared in FreeBSD 10.1.
FreeBSD 14.0-RELEASE-p11 January 11, 2022 FreeBSD 14.0-RELEASE-p11