/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_common.txt | 19 Algorithm = MD5 28 Algorithm = MD5 36 Algorithm = MD5 47 Algorithm = SHA1 55 Algorithm = SHA1 62 Algorithm = SHA1 71 Algorithm = SHA224 79 Algorithm = SHA224 85 Algorithm = SHA224 91 Algorithm = SHA256 [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 18 test-13 = 13-Suite B P-256 Hash Algorithm Selection 19 test-14 = 14-Suite B P-384 Hash Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selectio [all...] |
/freebsd/contrib/file/magic/Magdir/ |
H A D | mcrypt | 15 >4 string >\0 algorithm: %s, 26 >3 byte 0 algorithm: blowfish-448, 27 >3 byte 1 algorithm: DES, 28 >3 byte 2 algorithm: 3DES, 29 >3 byte 3 algorithm: 3-WAY, 30 >3 byte 4 algorithm: GOST, 31 >3 byte 6 algorithm: SAFER-SK64, 32 >3 byte 7 algorithm: SAFER-SK128, 33 >3 byte 8 algorithm: CAST-128, 34 >3 byte 9 algorithm: xTEA, [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_dsaparam.t | 27 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 28 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… [all …]
|
H A D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
H A D | 20-test_dhparam_check.t | 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey… 43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey… [all …]
|
/freebsd/usr.sbin/ppp/ |
H A D | ccp.c | 147 static const struct ccp_algorithm * const algorithm[] = { variable 156 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 179 if (ccp->in.algorithm != -1) in ccp_ReportStatus() 181 (*algorithm[ccp->in.algorithm]->Disp)(&ccp->in.opt)); in ccp_ReportStatus() 183 if (ccp->out.algorithm != -1) { in ccp_ReportStatus() 185 for (f = 0; f < ccp->out.algorithm; f++) in ccp_ReportStatus() 186 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg])) in ccp_ReportStatus() 189 (*algorithm[ccp->out.algorithm]->Disp)(&(*o)->val)); in ccp_ReportStatus() 277 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 303 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg]) && in ccp_Required() [all …]
|
/freebsd/lib/libc++/ |
H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 5 { include: [ "<__algorithm/binary_search.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 8 { include: [ "<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 10 { include: [ "<__algorithm/copy_backward.h>", "private", "<algorithm>", "public" ] }, 11 { include: [ "<__algorithm/copy_if.h>", "private", "<algorithm>", "public" ] }, [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-genpkey.pod.in | 22 [B<-algorithm> I<alg>] 64 This option encrypts the private key with the supplied cipher. Any algorithm 67 =item B<-algorithm> I<alg> 69 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 70 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 77 Valid built-in algorithm names for parameter generation (see the B<-genparam> 80 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 85 Set the public key algorithm option I<opt> to I<value>. The precise set of 86 options supported depends on the public key algorithm used and its [all …]
|
H A D | openssl-pkeyutl.pod.in | 6 openssl-pkeyutl - public key algorithm command 14 [B<-digest> I<algorithm>] 31 [B<-kdf> I<algorithm>] 45 operations using any supported algorithm. 63 message digest algorithm. The user can specify a digest algorithm by using 67 =item B<-digest> I<algorithm> 69 This specifies the digest algorithm which is used to hash the input data before 71 signature algorithm does not require one (for instance, EdDSA). If this option 72 is omitted but the signature algorithm requires one, a default value will be 74 default digest algorithm. For SM2, it will be SM3. If this option is present, [all …]
|
/freebsd/share/man/man4/ |
H A D | mod_cc.4 | 38 dynamically change the congestion control algorithm used by new and existing 43 Algorithm modules can be compiled into the kernel or loaded as kernel modules 48 The default algorithm is CUBIC, and all connections use the default unless 60 Algorithm specific parameters can be set or queried using the 65 Callers must pass a pointer to an algorithm specific data, and specify 86 .It Va algorithm 87 Returns the current default congestion control algorithm when read, and changes 89 When attempting to change the default algorithm, this variable should be set to 133 algorithm built into it via kernel option and a system default specified. 139 This directive loads the NewReno congestion control algorithm. [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-genpkey.1 | 151 [\fB\-algorithm\fR \fIalg\fR] 187 This option encrypts the private key with the supplied cipher. Any algorithm 189 .IP "\fB\-algorithm\fR \fIalg\fR" 4 190 .IX Item "-algorithm alg" 191 Public key algorithm to use such as \s-1RSA, DSA, DH\s0 or \s-1DHX.\s0 If used this option must 192 precede any \fB\-pkeyopt\fR options. The options \fB\-paramfile\fR and \fB\-algorithm\fR 196 Valid built-in algorithm names for private key generation are \s-1RSA,\s0 RSA-PSS, \s-1EC, 199 Valid built-in algorithm names for parameter generation (see the \fB\-genparam\fR 202 Note that the algorithm name X9.42 \s-1DH\s0 may be used as a synonym for \s-1DHX\s0 keys and 206 Set the public key algorithm option \fIopt\fR to \fIvalue\fR. The precise set of [all …]
|
H A D | openssl-pkeyutl.1 | 140 openssl\-pkeyutl \- public key algorithm command 147 [\fB\-digest\fR \fIalgorithm\fR] 164 [\fB\-kdf\fR \fIalgorithm\fR] 181 operations using any supported algorithm. 194 message digest algorithm. The user can specify a digest algorithm by using 197 .IP "\fB\-digest\fR \fIalgorithm\fR" 4 198 .IX Item "-digest algorithm" 199 This specifies the digest algorithm which is used to hash the input data before 201 signature algorithm does not require one (for instance, EdDSA). If this option 202 is omitted but the signature algorithm requires one, a default value will be [all …]
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
H A D | lac_sym_hash_defs.h | 19 /* Constant for MD5 algorithm */ 30 /* Constants for SHA1 algorithm */ 41 /* Constants for SHA224 algorithm */ 52 /* Constants for SHA256 algorithm */ 63 /* Constants for SHA384 algorithm */ 74 /* Constants for SHA512 algorithm */ 85 /* Constants for SHA3_224 algorithm */ 96 /* Constants for SHA3_256 algorithm */ 107 /* Constants for SHA3_384 algorithm */ 118 /* Constants for SHA3_512 algorithm */ [all …]
|
H A D | lac_sym_cipher_defs.h | 38 * Constants value for ARC4 algorithm 40 /* ARC4 algorithm block size */ 61 /* Key Modifier (KM) 4 bytes used in Kasumi algorithm in F8 mode to XOR 90 /* 96-bit case of IV for GCM algorithm */ 93 /* 96-bit case of IV for CCP/GCM single pass algorithm */ 96 * Constants value for NULL algorithm 98 /* NULL algorithm block size */ 101 /* Macro to check if the Algorithm is SM4 */ 107 /* Macro to check if the Algorithm is CHACHA */ 109 /* Macro to check if the Algorithm is AES */ [all …]
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 43 ASN1_OBJECT_free(alg->algorithm); 44 alg->algorithm = aobj; 60 *paobj = algor->algorithm; in X509_ALGOR_get0() 90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 103 if (dest->algorithm) in X509_ALGOR_copy() 104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 105 dest->algorithm = NULL; in X509_ALGOR_copy() 111 if (src->algorithm) in X509_ALGOR_copy() 112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy() [all …]
|
/freebsd/usr.bin/cksum/ |
H A D | cksum.1 | 59 utility, except that it defaults to using historic algorithm 1, as 68 Algorithm 1 is the algorithm used by historic 72 algorithm and by historic 76 algorithm when using the 82 Algorithm 2 is the algorithm used by historic 87 algorithm. 95 Algorithm 3 is what is commonly called the 97 algorithm. 100 Both algorithm 1 and 2 write to the standard output the same fields as 101 the default algorithm except that the size of the file in bytes is [all …]
|
/freebsd/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 57 /** number of entries in algorithm needs array */ 61 * Storage for algorithm needs. DNSKEY algorithms. 68 * Indexed by algorithm number. 80 * @param sigalg: adds to signalled algorithm list too. 88 * @param sigalg: signalled algorithm list, numbers ends with 0. 104 * Mark this algorithm as a success, sec_secure, and see if we are done. 106 * @param algo: the algorithm processed to be secure. 112 * Mark this algorithm a failure, sec_bogus. It can later be overridden 113 * by a success for this algorithm (with a different signature). 115 * @param algo: the algorithm processed to be bogus. [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | openssl-glossary.pod | 13 =item Algorithm 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 41 A decoder is a type of algorithm used for decoding keys and parameters from some 48 An OpenSSL Provider that contains the most common OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 67 An encoder is a type of algorithm used for encoding keys and parameters to some 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have [all …]
|
/freebsd/contrib/ofed/opensm/man/ |
H A D | opensm.8 | 158 algorithm (default). Multiple routing engines can be specified 172 This option sets the starting VL to use for the lash routing algorithm. 191 violate "pure" deadlock free algorithm, so use it carefully. 209 algorithm to the guids provided in the given file (one to a line). 239 using a round-robin algorithm (which is the default). Value supplied 249 by Up/Down routing algorithm instead of node GUIDs 304 equalization algorithm. 317 1. While using DOR routing algorithm. 326 2. While using general routing algorithm. 875 1. Min Hop Algorithm - based on the minimum hops to each node where the [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_ALGORITHM.pod | 5 OSSL_ALGORITHM - OpenSSL Core type to define a fetchable algorithm 22 algorithm that a L<provider(7)> provides. Arrays of this type are returned 41 L<EVP_MD_fetch(3)>, etc) to find the desired algorithm. 43 Multiple names / identities allow a specific algorithm implementation to be 44 fetched multiple ways. For example, the RSA algorithm has the following 57 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the 72 The OpenSSL libraries use the first of the algorithm names as the main 73 or canonical name, on a per algorithm implementation basis. 75 See the notes L</On the subject of algorithm names> below for a more in 82 algorithm implementation, and is used by the appropriate fetching [all …]
|
H A D | EVP_PBE_CipherInit.pod | 35 I<pass> of length I<passlen>. The PBE algorithm type and parameters are extracted 39 I<libctx> and property query I<propq> to select appropriate algorithm 42 =head2 PBE algorithm search 44 EVP_PBE_find() and EVP_PBE_find_ex() search for a matching algorithm using two parameters: 46 1. An algorithm type I<type> which can be: 52 EVP_PBE_TYPE_OUTER - A PBE algorithm 64 2. A I<pbe_nid> which can represent the algorithm identifier with parameters e.g. 65 B<NID_pbeWithSHA1AndRC2_CBC> or an algorithm class e.g. B<NID_pbes2>. 67 They return the algorithm's cipher ID I<pcnid>, digest ID I<pmnid> and a key 68 generation function for the algorithm I<pkeygen>. EVP_PBE_CipherInit_ex() also [all …]
|
/freebsd/contrib/ntp/html/ |
H A D | prefer.html | 21 <li class="inline"><a href="#combine">2. Combine Algorithm</a></li> 22 <li class="inline"><a href="#clockhop">3. Anti-Clockhop Algorithm</a></li> 30 …m among the survivors of the clock cluster algorithm a set of contributors to the clock discipli… 32 …Algorithm</a> page and to determine the <em>truechimers</em> from among the candidates, leaving b… 33 …stem clock, either using the <a href="discipline.html">clock discipline algorithm</a> or using th… 34 <h4 id="combine">2. Combine Algorithm</h4> 35 <p> The clock combine algorithm uses the survivor list to produce a weighted average of both offset… 36 <p> The clock combine algorithm uses a weight factor for each survivor equal to the reciprocal of t… 37 <h4 id="clockhop">3. Anti-Clockhop Algorithm</h4> 38 …algorithm is intended for cases where multiple servers are available on a fast LAN with modern co… [all …]
|
/freebsd/contrib/one-true-awk/testdir/ |
H A D | funstack.ok | 5 J. R. Herndon ACM Algorithm 49: Spherical Neumann 11 J. N. Merner ACM Algorithm 149: Complete Elliptic 17 O. G. Ludwig ACM Algorithm 179: Incomplete Beta Ratio 314 22 R. H. Kase ACM Algorithm 219: Topological Ordering 28 W. Gautschi ACM Algorithm 236: Bessel Functions of 34 J. Boothroyd ACM Algorithm 246: Graycode . . . . . . 701 39 W. Gautschi ACM Algorithm 259: Legendre Functions 45 W. Fletcher ACM Algorithm 284: Interchange of Two 52 M. C. Pike ACM Algorithm 299: Chi-Squared Integral 243--244 95 Harald Stehfest ACM Algorithm 368: Numerical Inversion [all …]
|
/freebsd/share/man/man9/ |
H A D | crypto_session.9 | 85 algorithm in the 110 authentication algorithm requested by 114 does not specify an authentication algorithm, 115 or requests an invalid algorithm, 121 encryption algorithm requested by 125 does not specify an encryption algorithm, 126 or requests an invalid algorithm, 151 The compression algorithm is specified in 156 The encryption algorithm is specified in 161 The authentication algorithm is specified in [all …]
|