Lines Matching full:algorithm

101 Internet Assigned Numbers Authority (IANA). Each algorithm belongs to a
102 protocol. Algorithm information includes supported key lengths, block or MAC
104 algorithm. This information is used by the IPsec modules, \fBipsecesp\fR(4P)
132 The mechanism name specified by an algorithm entry must correspond to a valid
143 Modifications to the protocols and algorithm by default update only the
165 Adds an algorithm of the protocol specified by the \fB-P\fR option. The
166 algorithm name(s) are specified with the \fB-n\fR option. The supported key
177 Specifies the block or MAC lengths of an algorithm, in bytes. Set more than one
224 Used with the \fB-a\fR option to force the addition of an algorithm or protocol
235 when the valid key lengths for an algorithm are specified by a range with the
245 Specifies the default key lengths for an algorithm, in bits. If the \fB-K\fR
269 Specifies the supported key lengths for an algorithm, in bits. You can
284 will be used as the default key length for that algorithm unless the \fB-K\fR
288 for the algorithm. The minimum and maximum key lengths must be separated by a
306 Displays the kernel algorithm tables.
316 to the algorithm. Cryptographic framework mechanisms are described in the
326 Specifies an algorithm number. The algorithm number for a protocol must be
327 unique. IANA manages the algorithm numbers. See \fIRFC 2407\fR.
336 Specifies one or more names for an algorithm. When adding an algorithm with the
347 When used with the \fB-r\fR option to remove an algorithm, \fIalg-names\fR
348 contains one of the valid algorithm names.
378 Removes and IPsec protocol from the algorithm table. The protocol can be
390 Removes the mapping for an algorithm The algorithm can be specified by
391 algorithm number using the \fB-N\fR option or by algorithm name using the
424 \fBExample 2 \fRAdding the Blowfish Algorithm
427 The following example shows how to add the Blowfish algorithm:
439 \fBExample 3 \fRUpdating the Kernel Algorithm Table
442 The following example updates the kernel algorithm table with the currently
443 defined protocol and algorithm definitions:
461 File that contains the configured IPsec protocols and algorithm definitions.
502 When protocols or algorithm definitions that are removed or altered, services