Lines Matching +full:4 +full:a
58 .TH OPENSSL-LIST 1ossl 2025-09-30 3.5.4 OpenSSL
114 .IP \fB\-help\fR 4
116 Display a usage message.
117 .IP \fB\-verbose\fR 4
120 The options below where verbosity applies say a bit more about what that means.
121 .IP "\fB\-select\fR \fIname\fR" 4
124 .IP \fB\-1\fR 4
126 List the commands, digest-commands, or cipher-commands in a single column.
128 .IP \fB\-all\-algorithms\fR 4
131 .RS 4
132 .IP "Asymmetric ciphers" 4
135 .IP Decoders 4
137 .IP Digests 4
139 .IP Encoders 4
141 .IP "Key derivation algorithms (KDF)" 4
143 .IP "Key encapsulation methods (KEM)" 4
145 .IP "Key exchange algorithms (KEX)" 4
147 .IP "Key managers" 4
149 .IP "Symmetric key managers" 4
151 .IP "Message authentication code algorithms (MAC)" 4
153 .IP "Random number generators (RNG, DRBG)" 4
155 .IP "Signature algorithms" 4
157 .IP "Store loaders" 4
159 .IP "Symmetric ciphers" 4
162 .RS 4
164 .IP \fB\-commands\fR 4
167 Display a list of standard commands.
168 .IP \fB\-standard\-commands\fR 4
171 .IP \fB\-digest\-commands\fR 4
175 Display a list of message digest commands, which are typically used
177 .IP \fB\-cipher\-commands\fR 4
181 Display a list of cipher commands, which are typically used as input
183 …er\-algorithms\fR, \fB\-digest\-algorithms\fR, \fB\-kdf\-algorithms\fR, \fB\-mac\-algorithms\fR," 4
185 Display a list of symmetric cipher, digest, kdf and mac algorithms.
186 See "Display of algorithm names" for a description of how names are
189 In verbose mode, the algorithms provided by a provider will get additional
191 .IP \fB\-random\-instances\fR 4
194 .IP \fB\-random\-generators\fR 4
196 Display a list of random number generators.
197 See "Display of algorithm names" for a description of how names are
199 .IP \fB\-encoders\fR 4
201 Display a list of encoders.
202 See "Display of algorithm names" for a description of how names are
205 In verbose mode, the algorithms provided by a provider will get additional
207 .IP \fB\-decoders\fR 4
209 Display a list of decoders.
210 See "Display of algorithm names" for a description of how names are
213 In verbose mode, the algorithms provided by a provider will get additional
215 .IP \fB\-public\-key\-algorithms\fR 4
217 Display a list of public key algorithms, with each algorithm as
218 a block of multiple lines, all but the first are indented.
221 .IP \fB\-public\-key\-methods\fR 4
223 Display a list of public key methods.
224 .IP \fB\-key\-managers\fR 4
226 Display a list of key managers.
227 .IP \fB\-skey\-managers\fR 4
229 Display a list of symmetric key managers.
230 .IP \fB\-key\-exchange\-algorithms\fR 4
232 Display a list of key exchange algorithms.
233 .IP \fB\-kem\-algorithms\fR 4
235 Display a list of key encapsulation algorithms.
236 .IP \fB\-tls\-groups\fR 4
238 Display a list of the IANA names of all available (implemented) TLS groups.
240 .IP \fB\-all\-tls\-groups\fR 4
242 Display a list of the names of all available (implemented) TLS groups,
247 .IP \fB\-tls1_2\fR 4
250 .IP \fB\-tls1_3\fR 4
255 .IP \fB\-signature\-algorithms\fR 4
257 Display a list of signature algorithms.
258 .IP \fB\-tls\-signature\-algorithms\fR 4
262 The output format is colon delimited in a form directly usable in
264 .IP \fB\-asymcipher\-algorithms\fR 4
266 Display a list of asymmetric cipher algorithms.
267 .IP \fB\-store\-loaders\fR 4
269 Display a list of store loaders.
270 .IP \fB\-providers\fR 4
272 Display a list of all loaded providers with their names, version and status.
276 .IP \fB\-engines\fR 4
280 Display a list of loaded engines.
281 .IP \fB\-disabled\fR 4
283 Display a list of disabled features, those that were compiled out
285 .IP \fB\-objects\fR 4
287 Display a list of built in objects, i.e. OIDs with names. They're listed in the
289 .IP "\fB\-options\fR \fIcommand\fR" 4
291 Output a two-column list of the options accepted by the specified \fIcommand\fR.
292 The first is the option name, and the second is a one-character indication
296 .IP "\fB\-provider\fR \fIname\fR" 4
299 .IP "\fB\-provider\-path\fR \fIpath\fR" 4
301 .IP "\fB\-provparam\fR \fI[name:]key=value\fR" 4
303 .IP "\fB\-propquery\fR \fIpropq\fR" 4
310 .IP "Legacy implementations" 4
313 algorithm on a line of its own, or in the form \f(CW\*(C`<foo \*(C'\fR bar>> to show
315 .IP "Provided implementations" 4
317 Implementations from a provider are displayed like this if the
318 implementation is labeled with a single name:
342 this file except in compliance with the License. You can obtain a copy