| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmac_common.txt | 19 Algorithm = MD5 28 Algorithm = MD5 36 Algorithm = MD5 47 Algorithm = SHA1 55 Algorithm = SHA1 62 Algorithm = SHA1 72 Algorithm = SHA256-192 81 Algorithm = SHA256-192 88 Algorithm = SHA256-192 94 Algorithm = SHA224 [all …]
|
| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 18 test-13 = 13-Suite B P-256 Hash Algorithm Selection 19 test-14 = 14-Suite B P-384 Hash Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | mcrypt | 15 >4 string >\0 algorithm: %s, 26 >3 byte 0 algorithm: blowfish-448, 27 >3 byte 1 algorithm: DES, 28 >3 byte 2 algorithm: 3DES, 29 >3 byte 3 algorithm: 3-WAY, 30 >3 byte 4 algorithm: GOST, 31 >3 byte 6 algorithm: SAFER-SK64, 32 >3 byte 7 algorithm: SAFER-SK128, 33 >3 byte 8 algorithm: CAST-128, 34 >3 byte 9 algorithm: xTEA, [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 15-test_dsaparam.t | 29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 39 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… [all …]
|
| H A D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
| H A D | 20-test_dhparam_check.t | 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey… 43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey… [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-genpkey.1 | 77 [\fB\-algorithm\fR \fIalg\fR] 124 This option encrypts the private key with the supplied cipher. Any algorithm 126 .IP "\fB\-algorithm\fR \fIalg\fR" 4 127 .IX Item "-algorithm alg" 128 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 129 precede any \fB\-pkeyopt\fR options. The options \fB\-paramfile\fR and \fB\-algorithm\fR 133 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 136 Valid built-in algorithm names for parameter generation (see the \fB\-genparam\fR 139 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 143 Set the public key algorithm option \fIopt\fR to \fIvalue\fR. The precise set of [all …]
|
| /freebsd/usr.sbin/ppp/ |
| H A D | ccp.c | 147 static const struct ccp_algorithm * const algorithm[] = { variable 156 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 179 if (ccp->in.algorithm != -1) in ccp_ReportStatus() 181 (*algorithm[ccp->in.algorithm]->Disp)(&ccp->in.opt)); in ccp_ReportStatus() 183 if (ccp->out.algorithm != -1) { in ccp_ReportStatus() 185 for (f = 0; f < ccp->out.algorithm; f++) in ccp_ReportStatus() 186 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg])) in ccp_ReportStatus() 189 (*algorithm[ccp->out.algorithm]->Disp)(&(*o)->val)); in ccp_ReportStatus() 277 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 303 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg]) && in ccp_Required() [all …]
|
| /freebsd/lib/libc++/ |
| H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 5 { include: [ "<__algorithm/binary_search.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 8 { include: [ "<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 10 { include: [ "<__algorithm/copy_backward.h>", "private", "<algorithm>", "public" ] }, 11 { include: [ "<__algorithm/copy_if.h>", "private", "<algorithm>", "public" ] }, [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-genpkey.pod.in | 24 [B<-algorithm> I<alg>] 77 This option encrypts the private key with the supplied cipher. Any algorithm 80 =item B<-algorithm> I<alg> 82 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 83 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 90 Valid built-in algorithm names for parameter generation (see the B<-genparam> 93 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 98 Set the public key algorithm option I<opt> to I<value>. The precise set of 99 options supported depends on the public key algorithm used and its [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | ossl-guide-libcrypto-introduction.7 | 81 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 82 implementations available for use. For example the RSA algorithm is available as 96 encryption operation using AES (or any other encryption algorithm) you would use 100 .SH "ALGORITHM FETCHING" 101 .IX Header "ALGORITHM FETCHING" 102 In order to use an algorithm an implementation for it must first be "fetched". 111 Explicit fetching involves directly calling a specific API to fetch an algorithm 115 can be used to explicitly fetch a digest algorithm implementation. The user is 131 For all currently implemented fetching functions this is the algorithm name. 132 Each provider supports a list of algorithm implementations. See the provider [all …]
|
| H A D | openssl-glossary.7 | 67 .IP Algorithm 4 68 .IX Item "Algorithm" 71 implementation for any given algorithm available for use. 86 the algorithm implementations in the Base Provider are also available in the 92 A decoder is a type of algorithm used for decoding keys and parameters from some 98 An OpenSSL Provider that contains the most common OpenSSL algorithm 100 the algorithm implementations in the Base Provider are also available in the 115 An encoder is a type of algorithm used for encoding keys and parameters to some 122 where a function call is made to obtain an algorithm object representing an 126 Fetching is the process of looking through the available algorithm [all …]
|
| /freebsd/share/man/man4/ |
| H A D | mod_cc.4 | 38 dynamically change the congestion control algorithm used by new and existing 43 Algorithm modules can be compiled into the kernel or loaded as kernel modules 48 The default algorithm is CUBIC, and all connections use the default unless 60 Algorithm specific parameters can be set or queried using the 65 Callers must pass a pointer to an algorithm specific data, and specify 86 .It Va algorithm 87 Returns the current default congestion control algorithm when read, and changes 89 When attempting to change the default algorithm, this variable should be set to 133 algorithm built into it via kernel option and a system default specified. 139 This directive loads the NewReno congestion control algorithm. [all …]
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_sym_hash_defs.h | 19 /* Constant for MD5 algorithm */ 30 /* Constants for SHA1 algorithm */ 41 /* Constants for SHA224 algorithm */ 52 /* Constants for SHA256 algorithm */ 63 /* Constants for SHA384 algorithm */ 74 /* Constants for SHA512 algorithm */ 85 /* Constants for SHA3_224 algorithm */ 96 /* Constants for SHA3_256 algorithm */ 107 /* Constants for SHA3_384 algorithm */ 118 /* Constants for SHA3_512 algorithm */ [all …]
|
| H A D | lac_sym_cipher_defs.h | 38 * Constants value for ARC4 algorithm 40 /* ARC4 algorithm block size */ 61 /* Key Modifier (KM) 4 bytes used in Kasumi algorithm in F8 mode to XOR 90 /* 96-bit case of IV for GCM algorithm */ 93 /* 96-bit case of IV for CCP/GCM single pass algorithm */ 96 * Constants value for NULL algorithm 98 /* NULL algorithm block size */ 101 /* Macro to check if the Algorithm is SM4 */ 107 /* Macro to check if the Algorithm is CHACHA */ 109 /* Macro to check if the Algorithm is AES */ [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-libcrypto-introduction.pod | 25 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 26 implementations available for use. For example the RSA algorithm is available as 41 encryption operation using AES (or any other encryption algorithm) you would use 46 =head1 ALGORITHM FETCHING 48 In order to use an algorithm an implementation for it must first be "fetched". 58 Explicit fetching involves directly calling a specific API to fetch an algorithm 62 can be used to explicitly fetch a digest algorithm implementation. The user is 82 For all currently implemented fetching functions this is the algorithm name. 83 Each provider supports a list of algorithm implementations. See the provider 84 specific documentation for information on the algorithm implementations [all …]
|
| H A D | openssl-glossary.pod | 13 =item Algorithm 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 41 A decoder is a type of algorithm used for decoding keys and parameters from some 48 An OpenSSL Provider that contains the most common OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 67 An encoder is a type of algorithm used for encoding keys and parameters to some 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have [all …]
|
| /freebsd/crypto/openssl/crypto/asn1/ |
| H A D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 40 ASN1_OBJECT_free(alg->algorithm); 41 alg->algorithm = aobj; 64 alg->algorithm = NULL; /* precaution to prevent double free */ in ossl_X509_ALGOR_from_nid() 76 *paobj = algor->algorithm; in X509_ALGOR_get0() 100 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 113 if (dest->algorithm) in X509_ALGOR_copy() 114 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 115 dest->algorithm = NULL; in X509_ALGOR_copy() 121 if (src->algorithm) in X509_ALGOR_copy() [all …]
|
| /freebsd/usr.bin/cksum/ |
| H A D | cksum.1 | 59 utility, except that it defaults to using historic algorithm 1, as 68 Algorithm 1 is the algorithm used by historic 72 algorithm and by historic 76 algorithm when using the 82 Algorithm 2 is the algorithm used by historic 87 algorithm. 95 Algorithm 3 is what is commonly called the 97 algorithm. 100 Both algorithm 1 and 2 write to the standard output the same fields as 101 the default algorithm except that the size of the file in bytes is [all …]
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_sigcrypt.h | 57 /** number of entries in algorithm needs array */ 61 * Storage for algorithm needs. DNSKEY algorithms. 68 * Indexed by algorithm number. 80 * @param sigalg: adds to signalled algorithm list too. 88 * @param sigalg: signalled algorithm list, numbers ends with 0. 104 * Mark this algorithm as a success, sec_secure, and see if we are done. 106 * @param algo: the algorithm processed to be secure. 112 * Mark this algorithm a failure, sec_bogus. It can later be overridden 113 * by a success for this algorithm (with a different signature). 115 * @param algo: the algorithm processed to be bogus. [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | OSSL_ALGORITHM.3 | 64 OSSL_ALGORITHM \- OpenSSL Core type to define a fetchable algorithm 81 algorithm that a \fBprovider\fR\|(7) provides. Arrays of this type are returned 97 \&\fBEVP_MD_fetch\fR\|(3), etc) to find the desired algorithm. 99 Multiple names / identities allow a specific algorithm implementation to be 100 fetched multiple ways. For example, the RSA algorithm has the following 108 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the 123 The OpenSSL libraries use the first of the algorithm names as the main 124 or canonical name, on a per algorithm implementation basis. 126 See the notes "On the subject of algorithm names" below for a more in 133 algorithm implementation, and is used by the appropriate fetching [all …]
|
| H A D | EVP_PBE_CipherInit.3 | 94 \&\fIpass\fR of length \fIpasslen\fR. The PBE algorithm type and parameters are extracted 98 \&\fIlibctx\fR and property query \fIpropq\fR to select appropriate algorithm 100 .SS "PBE algorithm search" 101 .IX Subsection "PBE algorithm search" 102 \&\fBEVP_PBE_find()\fR and \fBEVP_PBE_find_ex()\fR search for a matching algorithm using two parame… 104 1. An algorithm type \fItype\fR which can be: 106 EVP_PBE_TYPE_OUTER \- A PBE algorithm 112 2. A \fIpbe_nid\fR which can represent the algorithm identifier with parameters e.g. 113 \&\fBNID_pbeWithSHA1AndRC2_CBC\fR or an algorithm class e.g. \fBNID_pbes2\fR. 115 They return the algorithm's cipher ID \fIpcnid\fR, digest ID \fIpmnid\fR and a key [all …]
|
| /freebsd/contrib/ofed/opensm/man/ |
| H A D | opensm.8 | 158 algorithm (default). Multiple routing engines can be specified 172 This option sets the starting VL to use for the lash routing algorithm. 191 violate "pure" deadlock free algorithm, so use it carefully. 209 algorithm to the guids provided in the given file (one to a line). 239 using a round-robin algorithm (which is the default). Value supplied 249 by Up/Down routing algorithm instead of node GUIDs 304 equalization algorithm. 317 1. While using DOR routing algorithm. 326 2. While using general routing algorithm. 875 1. Min Hop Algorithm - based on the minimum hops to each node where the [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OSSL_ALGORITHM.pod | 5 OSSL_ALGORITHM - OpenSSL Core type to define a fetchable algorithm 22 algorithm that a L<provider(7)> provides. Arrays of this type are returned 41 L<EVP_MD_fetch(3)>, etc) to find the desired algorithm. 43 Multiple names / identities allow a specific algorithm implementation to be 44 fetched multiple ways. For example, the RSA algorithm has the following 57 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the 72 The OpenSSL libraries use the first of the algorithm names as the main 73 or canonical name, on a per algorithm implementation basis. 75 See the notes L</On the subject of algorithm names> below for a more in 82 algorithm implementation, and is used by the appropriate fetching [all …]
|
| /freebsd/contrib/ntp/html/ |
| H A D | prefer.html | 21 <li class="inline"><a href="#combine">2. Combine Algorithm</a></li> 22 <li class="inline"><a href="#clockhop">3. Anti-Clockhop Algorithm</a></li> 30 …m among the survivors of the clock cluster algorithm a set of contributors to the clock discipli… 32 …Algorithm</a> page and to determine the <em>truechimers</em> from among the candidates, leaving b… 33 …stem clock, either using the <a href="discipline.html">clock discipline algorithm</a> or using th… 34 <h4 id="combine">2. Combine Algorithm</h4> 35 <p> The clock combine algorithm uses the survivor list to produce a weighted average of both offset… 36 <p> The clock combine algorithm uses a weight factor for each survivor equal to the reciprocal of t… 37 <h4 id="clockhop">3. Anti-Clockhop Algorithm</h4> 38 …algorithm is intended for cases where multiple servers are available on a fast LAN with modern co… [all …]
|