| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-list.1 | 64 openssl\-list \- list algorithms and features 72 [\fB\-all\-algorithms\fR] 75 [\fB\-digest\-algorithms\fR] 77 [\fB\-kdf\-algorithms\fR] 78 [\fB\-mac\-algorithms\fR] 81 [\fB\-cipher\-algorithms\fR] 87 [\fB\-key\-exchange\-algorithms\fR] 88 [\fB\-kem\-algorithms\fR] 93 [\fB\-signature\-algorithms\fR] 94 [\fB\-tls\-signature\-algorithms\fR] [all …]
|
| H A D | openssl-speed.1 | 76 [\fB\-kem\-algorithms\fR] 77 [\fB\-signature\-algorithms\fR] 98 This command is used to test the performance of cryptographic algorithms. 121 To see the algorithms supported with this option, use 122 \&\f(CW\*(C`openssl list \-digest\-algorithms\*(C'\fR or \f(CW\*(C`openssl list \-cipher\-algorithm… 149 .IP \fB\-kem\-algorithms\fR 4 150 .IX Item "-kem-algorithms" 151 Benchmark KEM algorithms: key generation, encapsulation, decapsulation. 152 .IP \fB\-signature\-algorithms\fR 4 153 .IX Item "-signature-algorithms" [all …]
|
| H A D | openssl-pkeyutl.1 | 128 For signature algorithms like RSA, DSA and ECDSA, 132 For EdDSA (the Ed25519 and Ed448 algorithms) this option 195 Even for other algorithms like ECDSA, where the additional \fB\-pkeyopt\fR option 244 Encapsulation is supported with a number of public key algorithms, currently: 250 The ECX and EC algorithms use the 256 hybrid ECDHE (no DHKEM) plus \fBML-KEM\fR algorithms, but these are intended 259 algorithms, so it is not possible to provide the required key material. 269 Decapsulation is supported with a number of public key algorithms, currently: 275 The ECX and EC algorithms use the 284 All the supported algorithms presently support only their default \fImode\fR, and [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-list.pod.in | 6 openssl-list - list algorithms and features 15 [B<-all-algorithms>] 18 [B<-digest-algorithms>] 22 -}[B<-kdf-algorithms>] 23 [B<-mac-algorithms>] 26 [B<-cipher-algorithms>] 34 [B<-key-exchange-algorithms>] 35 [B<-kem-algorithms>] 40 [B<-signature-algorithms>] 41 [B<-tls-signature-algorithms>] [all …]
|
| H A D | openssl-speed.pod.in | 19 [B<-kem-algorithms>] 20 [B<-signature-algorithms>] 37 This command is used to test the performance of cryptographic algorithms. 66 To see the algorithms supported with this option, use 67 C<openssl list -digest-algorithms> or C<openssl list -cipher-algorithms> 103 =item B<-kem-algorithms> 105 Benchmark KEM algorithms: key generation, encapsulation, decapsulation. 107 =item B<-signature-algorithms> 109 Benchmark signature algorithms: key generation, signature, verification. 148 If any I<algorithm> is given, then those algorithms are tested, otherwise a [all …]
|
| H A D | openssl-pkeyutl.pod.in | 72 For signature algorithms like RSA, DSA and ECDSA, 76 For EdDSA (the Ed25519 and Ed448 algorithms) this option 150 Even for other algorithms like ECDSA, where the additional B<-pkeyopt> option 207 Encapsulation is supported with a number of public key algorithms, currently: 213 The ECX and EC algorithms use the 219 hybrid ECDHE (no DHKEM) plus B<ML-KEM> algorithms, but these are intended 222 algorithms, so it is not possible to provide the required key material. 233 Decapsulation is supported with a number of public key algorithms, currently: 239 The ECX and EC algorithms use the 249 All the supported algorithms presently support only their default I<mode>, and [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 27 algorithms for B<ctx> or B<ssl>. The array B<slist> of length B<slistlen> 29 algorithms. 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 45 signature algorithms related to client authentication, otherwise they are 55 If an application wishes to allow the setting of signature algorithms 59 The signature algorithms set by a client are used directly in the supported 62 The supported signature algorithms set by a server are not sent to the 63 client but are used to determine the set of shared signature algorithms 67 The client authentication signature algorithms set by a server are sent [all …]
|
| H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 50 signature algorithms can be determined: which can be zero. 53 signature algorithms: after a client hello (for servers) or a certificate 57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. 61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
|
| H A D | OpenSSL_add_all_algorithms.pod | 6 add algorithms to internal table 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 27 OpenSSL_add_all_digests() adds all digest algorithms to the table. 29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including 33 password based encryption algorithms.
|
| H A D | SSL_CTX_set1_cert_comp_preference.pod | 42 to specify the preferred compression algorithms. The B<algs> argument is an array 43 of algorithms, and B<length> is number of elements in the B<algs> array. Only 44 those algorithms enabled in the library will be accepted in B<algs>, unknown 45 algorithms in B<algs> are ignored. On an error, the preference order is left 48 The following compression algorithms (B<alg> arguments) may be used: 68 B<alg> is 0, then the certificates are compressed with the algorithms specified 88 saved). As the default list includes all the enabled algorithms, not specifying 119 =item * If B<alg> is 0 and no compression algorithms are enabled.
|
| /freebsd/crypto/openssl/doc/designs/ |
| H A D | fetching-composite-algorithms.md | 1 Fetching composite algorithms and using them - adding the bits still missing 8 fetching composite algorithms (such as AES-128-CBC or HMAC-SHA256), and 12 However, there is one class of algorithms where the support for *using* 13 explicitly fetched algorithms is lacking: asymmetric algorithms. 49 - [Functions for explicitly fetched signature algorithms] 50 - [Functions for explicitly fetched asym-cipher algorithms] (not yet designed) 51 - [Functions for explicitly fetched keyexch algorithms] (not yet designed) 64 known as "sigalgs", but this is really broader than just signature algorithms. 84 composite algorithms, although our providers do not fully participate in 116 There are some classes of algorithms for which we have no support for using [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_CTX_set1_sigalgs.3 | 67 SSL_set1_client_sigalgs_list \- set supported signature algorithms 86 algorithms for \fBctx\fR or \fBssl\fR. The array \fBslist\fR of length \fBslistlen\fR 88 algorithms. 91 signature algorithms for \fBctx\fR or \fBssl\fR. The \fBstr\fR parameter 103 signature algorithms related to client authentication, otherwise they are 112 If an application wishes to allow the setting of signature algorithms 116 The signature algorithms set by a client are used directly in the supported 119 The supported signature algorithms set by a server are not sent to the 120 client but are used to determine the set of shared signature algorithms 124 The client authentication signature algorithms set by a server are sent [all …]
|
| H A D | SSL_get_shared_sigalgs.3 | 64 SSL_get_shared_sigalgs, SSL_get_sigalgs \- get supported signature algorithms 81 algorithms supported by peer \fBs\fR. The parameter \fBidx\fR indicates the index 88 information about all signature algorithms supported by \fBs\fR in the order 93 signature algorithms or \fB0\fR if the \fBidx\fR parameter is out of range. 107 signature algorithms can be determined: which can be zero. 110 signature algorithms: after a client hello (for servers) or a certificate 114 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. 118 The shared signature algorithms returned by \fBSSL_get_shared_sigalgs()\fR are
|
| H A D | OpenSSL_add_all_algorithms.3 | 65 add algorithms to internal table 85 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 88 \&\fBOpenSSL_add_all_digests()\fR adds all digest algorithms to the table. 90 \&\fBOpenSSL_add_all_algorithms()\fR adds all algorithms to the table (digests and 93 \&\fBOpenSSL_add_all_ciphers()\fR adds all encryption algorithms to the table including 94 password based encryption algorithms.
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | fips_module.pod | 51 use the FIPS module for cryptographic algorithms by default. 103 enabled to prevent accidental use of non-FIPS validated algorithms via broken 110 cryptographic algorithms (and therefore does not impact the validation status of 111 any cryptographic operations), but does include other supporting algorithms that 136 The algorithms available in the FIPS module are a subset of the algorithms 139 If any applications attempt to use any algorithms that are not present, 221 This loads a sub-set of algorithms that are also available in the default 223 with the FIPS provider. For example this contains algorithms for encoding and 272 All algorithms implemented in a provider have this property set on them. 274 There is also the C<fips> property. All FIPS algorithms match against the [all …]
|
| H A D | ossl-guide-libcrypto-introduction.pod | 12 of cryptographic algorithms used in various Internet standards. The services 22 =head2 Algorithms section in INTRODUCTION 25 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 32 Algorithms are implemented in providers. See 37 Different algorithms can be grouped together by their purpose. For example there 38 are algorithms for encryption, and different algorithms for digesting data. 86 L<OSSL_PROVIDER-default(7)/OPERATIONS AND ALGORITHMS>, 87 L<OSSL_PROVIDER-FIPS(7)/OPERATIONS AND ALGORITHMS>, 88 L<OSSL_PROVIDER-legacy(7)/OPERATIONS AND ALGORITHMS> and 89 L<OSSL_PROVIDER-base(7)/OPERATIONS AND ALGORITHMS>. [all …]
|
| H A D | OSSL_PROVIDER-legacy.pod | 9 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms 10 that have been deemed legacy. Such algorithms have commonly fallen out of 14 We can consider this the retirement home of cryptographic algorithms. 35 =head1 OPERATIONS AND ALGORITHMS 37 The OpenSSL legacy provider supports these operations and algorithms: 39 =head2 Hashing Algorithms / Message Digests 59 Not all of these symmetric cipher algorithms are enabled by default. 98 When algorithms for other operations start appearing, the
|
| H A D | OSSL_PROVIDER-base.pod | 56 =head1 OPERATIONS AND ALGORITHMS 58 The OpenSSL base provider supports these operations and algorithms: 70 In addition to this provider, the "SEED-SRC" and "JITTER" algorithms 137 In addition to this provider, all of these encoding algorithms are also 138 available in the default provider. Some of these algorithms may be used in 207 In addition to this provider, all of these decoding algorithms are also 208 available in the default provider. Some of these algorithms may be used in 221 In addition to this provider, all of these store algorithms are also
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | fips_module.7 | 97 use the FIPS module for cryptographic algorithms by default. 155 enabled to prevent accidental use of non-FIPS validated algorithms via broken 162 cryptographic algorithms (and therefore does not impact the validation status of 163 any cryptographic operations), but does include other supporting algorithms that 180 The algorithms available in the FIPS module are a subset of the algorithms 183 If any applications attempt to use any algorithms that are not present, 263 This loads a sub-set of algorithms that are also available in the default 265 with the FIPS provider. For example this contains algorithms for encoding and 319 All algorithms implemented in a provider have this property set on them. 321 There is also the \f(CW\*(C`fips\*(C'\fR property. All FIPS algorithms match against the [all …]
|
| H A D | ossl-guide-libcrypto-introduction.7 | 69 of cryptographic algorithms used in various Internet standards. The services 78 .SS Algorithms 79 .IX Subsection "Algorithms" 81 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 88 Algorithms are implemented in providers. See 92 Different algorithms can be grouped together by their purpose. For example there 93 are algorithms for encryption, and different algorithms for digesting data. 135 "OPERATIONS AND ALGORITHMS" in \fBOSSL_PROVIDER\-default\fR\|(7), 136 "OPERATIONS AND ALGORITHMS" in \fBOSSL_PROVIDER\-FIPS\fR\|(7), 137 "OPERATIONS AND ALGORITHMS" in \fBOSSL_PROVIDER\-legacy\fR\|(7) and [all …]
|
| H A D | OSSL_PROVIDER-legacy.7 | 67 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms 68 that have been deemed legacy. Such algorithms have commonly fallen out of 72 We can consider this the retirement home of cryptographic algorithms. 87 .SH "OPERATIONS AND ALGORITHMS" 88 .IX Header "OPERATIONS AND ALGORITHMS" 89 The OpenSSL legacy provider supports these operations and algorithms: 90 .SS "Hashing Algorithms / Message Digests" 91 .IX Subsection "Hashing Algorithms / Message Digests" 107 Not all of these symmetric cipher algorithms are enabled by default.
|
| /freebsd/share/man/man7/ |
| H A D | crypto.7 | 36 .Nd OpenCrypto algorithms 39 and authentication algorithms. 40 This document describes the parameters and requirements of these algorithms. 47 The following authentication algorithms are supported: 141 .Ss Authenticated Encryption with Associated Data Algorithms 142 AEAD algorithms in OCF combine a stream cipher with an authentication 144 AEAD algorithms accept additional authentication data (AAD) 149 AEAD algorithms in OCF accept a nonce that is combined with an 157 Some AEAD algorithms support multiple nonce sizes. 160 The following AEAD algorithms are supported:
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 20-test_nocache.t | 19 ok(run(app(["openssl", "list", "-mac-algorithms"], 21 "List mac algorithms - default configuration"); 25 ok(scalar @match > 1 ? 1 : 0, "Several algorithms are listed - default configuration"); 28 ok(run(app(["openssl", "list", "-mac-algorithms"], 30 "List mac algorithms"); 34 ok(scalar @match > 1 ? 1 : 0, "Several algorithms are listed - nocache-and-default");
|
| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 01-simple.cnf | 6 test-1 = 1-Server signature algorithms bug 34 [1-Server signature algorithms bug] 35 ssl_conf = 1-Server signature algorithms bug-ssl 37 [1-Server signature algorithms bug-ssl] 38 server = 1-Server signature algorithms bug-server 39 client = 1-Server signature algorithms bug-client 41 [1-Server signature algorithms bug-server] 47 [1-Server signature algorithms bug-client]
|
| /freebsd/share/man/man9/ |
| H A D | crypto.9 | 75 .Ss Supported Algorithms 76 More details on some algorithms may be found in 79 The following authentication algorithms are supported: 102 The following encryption algorithms are supported: 114 algorithms are supported: 122 The following compression algorithms are supported: 147 best for a specific set of algorithms associated with a session.
|