Home
last modified time | relevance | path

Searched full:algorithms (Results 1 – 25 of 1219) sorted by relevance

12345678910>>...49

/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-list.164 openssl\-list \- list algorithms and features
72 [\fB\-all\-algorithms\fR]
75 [\fB\-digest\-algorithms\fR]
77 [\fB\-kdf\-algorithms\fR]
78 [\fB\-mac\-algorithms\fR]
81 [\fB\-cipher\-algorithms\fR]
87 [\fB\-key\-exchange\-algorithms\fR]
88 [\fB\-kem\-algorithms\fR]
93 [\fB\-signature\-algorithms\fR]
94 [\fB\-tls\-signature\-algorithms\fR]
[all …]
H A Dopenssl-speed.176 [\fB\-kem\-algorithms\fR]
77 [\fB\-signature\-algorithms\fR]
98 This command is used to test the performance of cryptographic algorithms.
121 To see the algorithms supported with this option, use
122 \&\f(CW\*(C`openssl list \-digest\-algorithms\*(C'\fR or \f(CW\*(C`openssl list \-cipher\-algorithm…
149 .IP \fB\-kem\-algorithms\fR 4
150 .IX Item "-kem-algorithms"
151 Benchmark KEM algorithms: key generation, encapsulation, decapsulation.
152 .IP \fB\-signature\-algorithms\fR 4
153 .IX Item "-signature-algorithms"
[all …]
H A Dopenssl-pkeyutl.1128 For signature algorithms like RSA, DSA and ECDSA,
132 For EdDSA (the Ed25519 and Ed448 algorithms) this option
195 Even for other algorithms like ECDSA, where the additional \fB\-pkeyopt\fR option
244 Encapsulation is supported with a number of public key algorithms, currently:
250 The ECX and EC algorithms use the
256 hybrid ECDHE (no DHKEM) plus \fBML-KEM\fR algorithms, but these are intended
259 algorithms, so it is not possible to provide the required key material.
269 Decapsulation is supported with a number of public key algorithms, currently:
275 The ECX and EC algorithms use the
284 All the supported algorithms presently support only their default \fImode\fR, and
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-list.pod.in6 openssl-list - list algorithms and features
15 [B<-all-algorithms>]
18 [B<-digest-algorithms>]
22 -}[B<-kdf-algorithms>]
23 [B<-mac-algorithms>]
26 [B<-cipher-algorithms>]
34 [B<-key-exchange-algorithms>]
35 [B<-kem-algorithms>]
40 [B<-signature-algorithms>]
41 [B<-tls-signature-algorithms>]
[all …]
H A Dopenssl-speed.pod.in19 [B<-kem-algorithms>]
20 [B<-signature-algorithms>]
37 This command is used to test the performance of cryptographic algorithms.
66 To see the algorithms supported with this option, use
67 C<openssl list -digest-algorithms> or C<openssl list -cipher-algorithms>
103 =item B<-kem-algorithms>
105 Benchmark KEM algorithms: key generation, encapsulation, decapsulation.
107 =item B<-signature-algorithms>
109 Benchmark signature algorithms: key generation, signature, verification.
148 If any I<algorithm> is given, then those algorithms are tested, otherwise a
[all …]
H A Dopenssl-pkeyutl.pod.in72 For signature algorithms like RSA, DSA and ECDSA,
76 For EdDSA (the Ed25519 and Ed448 algorithms) this option
150 Even for other algorithms like ECDSA, where the additional B<-pkeyopt> option
207 Encapsulation is supported with a number of public key algorithms, currently:
213 The ECX and EC algorithms use the
219 hybrid ECDHE (no DHKEM) plus B<ML-KEM> algorithms, but these are intended
222 algorithms, so it is not possible to provide the required key material.
233 Decapsulation is supported with a number of public key algorithms, currently:
239 The ECX and EC algorithms use the
249 All the supported algorithms presently support only their default I<mode>, and
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
27 algorithms for B<ctx> or B<ssl>. The array B<slist> of length B<slistlen>
29 algorithms.
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
45 signature algorithms related to client authentication, otherwise they are
55 If an application wishes to allow the setting of signature algorithms
59 The signature algorithms set by a client are used directly in the supported
62 The supported signature algorithms set by a server are not sent to the
63 client but are used to determine the set of shared signature algorithms
67 The client authentication signature algorithms set by a server are sent
[all …]
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index
29 information about all signature algorithms supported by B<s> in the order
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
50 signature algorithms can be determined: which can be zero.
53 signature algorithms: after a client hello (for servers) or a certificate
57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms.
61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
H A DOpenSSL_add_all_algorithms.pod6 add algorithms to internal table
24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
27 OpenSSL_add_all_digests() adds all digest algorithms to the table.
29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and
32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including
33 password based encryption algorithms.
H A DSSL_CTX_set1_cert_comp_preference.pod42 to specify the preferred compression algorithms. The B<algs> argument is an array
43 of algorithms, and B<length> is number of elements in the B<algs> array. Only
44 those algorithms enabled in the library will be accepted in B<algs>, unknown
45 algorithms in B<algs> are ignored. On an error, the preference order is left
48 The following compression algorithms (B<alg> arguments) may be used:
68 B<alg> is 0, then the certificates are compressed with the algorithms specified
88 saved). As the default list includes all the enabled algorithms, not specifying
119 =item * If B<alg> is 0 and no compression algorithms are enabled.
/freebsd/crypto/openssl/doc/designs/
H A Dfetching-composite-algorithms.md1 Fetching composite algorithms and using them - adding the bits still missing
8 fetching composite algorithms (such as AES-128-CBC or HMAC-SHA256), and
12 However, there is one class of algorithms where the support for *using*
13 explicitly fetched algorithms is lacking: asymmetric algorithms.
49 - [Functions for explicitly fetched signature algorithms]
50 - [Functions for explicitly fetched asym-cipher algorithms] (not yet designed)
51 - [Functions for explicitly fetched keyexch algorithms] (not yet designed)
64 known as "sigalgs", but this is really broader than just signature algorithms.
84 composite algorithms, although our providers do not fully participate in
116 There are some classes of algorithms for which we have no support for using
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set1_sigalgs.367 SSL_set1_client_sigalgs_list \- set supported signature algorithms
86 algorithms for \fBctx\fR or \fBssl\fR. The array \fBslist\fR of length \fBslistlen\fR
88 algorithms.
91 signature algorithms for \fBctx\fR or \fBssl\fR. The \fBstr\fR parameter
103 signature algorithms related to client authentication, otherwise they are
112 If an application wishes to allow the setting of signature algorithms
116 The signature algorithms set by a client are used directly in the supported
119 The supported signature algorithms set by a server are not sent to the
120 client but are used to determine the set of shared signature algorithms
124 The client authentication signature algorithms set by a server are sent
[all …]
H A DSSL_get_shared_sigalgs.364 SSL_get_shared_sigalgs, SSL_get_sigalgs \- get supported signature algorithms
81 algorithms supported by peer \fBs\fR. The parameter \fBidx\fR indicates the index
88 information about all signature algorithms supported by \fBs\fR in the order
93 signature algorithms or \fB0\fR if the \fBidx\fR parameter is out of range.
107 signature algorithms can be determined: which can be zero.
110 signature algorithms: after a client hello (for servers) or a certificate
114 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms.
118 The shared signature algorithms returned by \fBSSL_get_shared_sigalgs()\fR are
H A DOpenSSL_add_all_algorithms.365 add algorithms to internal table
85 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
88 \&\fBOpenSSL_add_all_digests()\fR adds all digest algorithms to the table.
90 \&\fBOpenSSL_add_all_algorithms()\fR adds all algorithms to the table (digests and
93 \&\fBOpenSSL_add_all_ciphers()\fR adds all encryption algorithms to the table including
94 password based encryption algorithms.
/freebsd/crypto/openssl/doc/man7/
H A Dfips_module.pod51 use the FIPS module for cryptographic algorithms by default.
103 enabled to prevent accidental use of non-FIPS validated algorithms via broken
110 cryptographic algorithms (and therefore does not impact the validation status of
111 any cryptographic operations), but does include other supporting algorithms that
136 The algorithms available in the FIPS module are a subset of the algorithms
139 If any applications attempt to use any algorithms that are not present,
221 This loads a sub-set of algorithms that are also available in the default
223 with the FIPS provider. For example this contains algorithms for encoding and
272 All algorithms implemented in a provider have this property set on them.
274 There is also the C<fips> property. All FIPS algorithms match against the
[all …]
H A Dossl-guide-libcrypto-introduction.pod12 of cryptographic algorithms used in various Internet standards. The services
22 =head2 Algorithms section in INTRODUCTION
25 referred to in OpenSSL as "algorithms". Each algorithm may have multiple
32 Algorithms are implemented in providers. See
37 Different algorithms can be grouped together by their purpose. For example there
38 are algorithms for encryption, and different algorithms for digesting data.
86 L<OSSL_PROVIDER-default(7)/OPERATIONS AND ALGORITHMS>,
87 L<OSSL_PROVIDER-FIPS(7)/OPERATIONS AND ALGORITHMS>,
88 L<OSSL_PROVIDER-legacy(7)/OPERATIONS AND ALGORITHMS> and
89 L<OSSL_PROVIDER-base(7)/OPERATIONS AND ALGORITHMS>.
[all …]
H A DOSSL_PROVIDER-legacy.pod9 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms
10 that have been deemed legacy. Such algorithms have commonly fallen out of
14 We can consider this the retirement home of cryptographic algorithms.
35 =head1 OPERATIONS AND ALGORITHMS
37 The OpenSSL legacy provider supports these operations and algorithms:
39 =head2 Hashing Algorithms / Message Digests
59 Not all of these symmetric cipher algorithms are enabled by default.
98 When algorithms for other operations start appearing, the
H A DOSSL_PROVIDER-base.pod56 =head1 OPERATIONS AND ALGORITHMS
58 The OpenSSL base provider supports these operations and algorithms:
70 In addition to this provider, the "SEED-SRC" and "JITTER" algorithms
137 In addition to this provider, all of these encoding algorithms are also
138 available in the default provider. Some of these algorithms may be used in
207 In addition to this provider, all of these decoding algorithms are also
208 available in the default provider. Some of these algorithms may be used in
221 In addition to this provider, all of these store algorithms are also
/freebsd/secure/lib/libcrypto/man/man7/
H A Dfips_module.797 use the FIPS module for cryptographic algorithms by default.
155 enabled to prevent accidental use of non-FIPS validated algorithms via broken
162 cryptographic algorithms (and therefore does not impact the validation status of
163 any cryptographic operations), but does include other supporting algorithms that
180 The algorithms available in the FIPS module are a subset of the algorithms
183 If any applications attempt to use any algorithms that are not present,
263 This loads a sub-set of algorithms that are also available in the default
265 with the FIPS provider. For example this contains algorithms for encoding and
319 All algorithms implemented in a provider have this property set on them.
321 There is also the \f(CW\*(C`fips\*(C'\fR property. All FIPS algorithms match against the
[all …]
H A Dossl-guide-libcrypto-introduction.769 of cryptographic algorithms used in various Internet standards. The services
78 .SS Algorithms
79 .IX Subsection "Algorithms"
81 referred to in OpenSSL as "algorithms". Each algorithm may have multiple
88 Algorithms are implemented in providers. See
92 Different algorithms can be grouped together by their purpose. For example there
93 are algorithms for encryption, and different algorithms for digesting data.
135 "OPERATIONS AND ALGORITHMS" in \fBOSSL_PROVIDER\-default\fR\|(7),
136 "OPERATIONS AND ALGORITHMS" in \fBOSSL_PROVIDER\-FIPS\fR\|(7),
137 "OPERATIONS AND ALGORITHMS" in \fBOSSL_PROVIDER\-legacy\fR\|(7) and
[all …]
H A DOSSL_PROVIDER-legacy.767 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms
68 that have been deemed legacy. Such algorithms have commonly fallen out of
72 We can consider this the retirement home of cryptographic algorithms.
87 .SH "OPERATIONS AND ALGORITHMS"
88 .IX Header "OPERATIONS AND ALGORITHMS"
89 The OpenSSL legacy provider supports these operations and algorithms:
90 .SS "Hashing Algorithms / Message Digests"
91 .IX Subsection "Hashing Algorithms / Message Digests"
107 Not all of these symmetric cipher algorithms are enabled by default.
/freebsd/share/man/man7/
H A Dcrypto.736 .Nd OpenCrypto algorithms
39 and authentication algorithms.
40 This document describes the parameters and requirements of these algorithms.
47 The following authentication algorithms are supported:
141 .Ss Authenticated Encryption with Associated Data Algorithms
142 AEAD algorithms in OCF combine a stream cipher with an authentication
144 AEAD algorithms accept additional authentication data (AAD)
149 AEAD algorithms in OCF accept a nonce that is combined with an
157 Some AEAD algorithms support multiple nonce sizes.
160 The following AEAD algorithms are supported:
/freebsd/crypto/openssl/test/recipes/
H A D20-test_nocache.t19 ok(run(app(["openssl", "list", "-mac-algorithms"],
21 "List mac algorithms - default configuration");
25 ok(scalar @match > 1 ? 1 : 0, "Several algorithms are listed - default configuration");
28 ok(run(app(["openssl", "list", "-mac-algorithms"],
30 "List mac algorithms");
34 ok(scalar @match > 1 ? 1 : 0, "Several algorithms are listed - nocache-and-default");
/freebsd/crypto/openssl/test/ssl-tests/
H A D01-simple.cnf6 test-1 = 1-Server signature algorithms bug
34 [1-Server signature algorithms bug]
35 ssl_conf = 1-Server signature algorithms bug-ssl
37 [1-Server signature algorithms bug-ssl]
38 server = 1-Server signature algorithms bug-server
39 client = 1-Server signature algorithms bug-client
41 [1-Server signature algorithms bug-server]
47 [1-Server signature algorithms bug-client]
/freebsd/share/man/man9/
H A Dcrypto.975 .Ss Supported Algorithms
76 More details on some algorithms may be found in
79 The following authentication algorithms are supported:
102 The following encryption algorithms are supported:
114 algorithms are supported:
122 The following compression algorithms are supported:
147 best for a specific set of algorithms associated with a session.

12345678910>>...49