/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
/freebsd/usr.sbin/ppp/ |
H A D | ccp.c | 147 static const struct ccp_algorithm * const algorithm[] = { variable 156 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 179 if (ccp->in.algorithm != -1) in ccp_ReportStatus() 181 (*algorithm[ccp->in.algorithm]->Disp)(&ccp->in.opt)); in ccp_ReportStatus() 183 if (ccp->out.algorithm != -1) { in ccp_ReportStatus() 185 for (f = 0; f < ccp->out.algorithm; f++) in ccp_ReportStatus() 186 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg])) in ccp_ReportStatus() 189 (*algorithm[ccp->out.algorithm]->Disp)(&(*o)->val)); in ccp_ReportStatus() 277 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 303 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg]) && in ccp_Required() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | mcrypt | 15 >4 string >\0 algorithm: %s, 26 >3 byte 0 algorithm: blowfish-448, 27 >3 byte 1 algorithm: DES, 28 >3 byte 2 algorithm: 3DES, 29 >3 byte 3 algorithm: 3-WAY, 30 >3 byte 4 algorithm: GOST, 31 >3 byte 6 algorithm: SAFER-SK64, 32 >3 byte 7 algorithm: SAFER-SK128, 33 >3 byte 8 algorithm: CAST-128, 34 >3 byte 9 algorithm: xTEA, [all …]
|
/freebsd/lib/libc++/ |
H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 5 { include: [ "<__algorithm/binary_search.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 8 { include: [ "<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 10 { include: [ "<__algorithm/copy_backward.h>", "private", "<algorithm>", "public" ] }, 11 { include: [ "<__algorithm/copy_if.h>", "private", "<algorithm>", "public" ] }, [all …]
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 40 ASN1_OBJECT_free(alg->algorithm); 41 alg->algorithm = aobj; 64 alg->algorithm = NULL; /* precaution to prevent double free */ in ossl_X509_ALGOR_from_nid() 76 *paobj = algor->algorithm; in X509_ALGOR_get0() 100 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 113 if (dest->algorithm) in X509_ALGOR_copy() 114 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 115 dest->algorithm = NULL; in X509_ALGOR_copy() 121 if (src->algorithm) in X509_ALGOR_copy() [all …]
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
H A D | lac_sym_hash_defs.h | 288 #define IS_HMAC_ALG(algorithm) \ argument 289 ((algorithm == CPA_CY_SYM_HASH_MD5) || \ 290 (algorithm == CPA_CY_SYM_HASH_SHA1) || \ 291 (algorithm == CPA_CY_SYM_HASH_SHA224) || \ 292 (algorithm == CPA_CY_SYM_HASH_SHA256) || \ 293 (algorithm == CPA_CY_SYM_HASH_SHA384) || \ 294 (algorithm == CPA_CY_SYM_HASH_SHA512) || \ 295 (algorithm == CPA_CY_SYM_HASH_SM3)) || \ 296 (LAC_HASH_IS_SHA3(algorithm))
|
/freebsd/crypto/openssh/ |
H A D | dns.c | 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() argument 89 *algorithm = SSHFP_KEY_RSA; in dns_read_key() 92 *algorithm = SSHFP_KEY_DSA; in dns_read_key() 95 *algorithm = SSHFP_KEY_ECDSA; in dns_read_key() 98 *algorithm = SSHFP_KEY_ED25519; in dns_read_key() 101 *algorithm = SSHFP_KEY_XMSS; in dns_read_key() 104 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ in dns_read_key() 118 if (*algorithm && *digest_type) { in dns_read_key() 135 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() argument 140 *algorithm = SSHFP_KEY_RESERVED; in dns_read_rdata() [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-genpkey.pod.in | 24 [B<-algorithm> I<alg>] 77 This option encrypts the private key with the supplied cipher. Any algorithm 80 =item B<-algorithm> I<alg> 82 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 83 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 90 Valid built-in algorithm names for parameter generation (see the B<-genparam> 93 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 98 Set the public key algorithm option I<opt> to I<value>. The precise set of 99 options supported depends on the public key algorithm used and its [all …]
|
H A D | openssl-speed.pod.in | 33 [I<algorithm> ...] 61 Use the specified cipher or message digest algorithm via the EVP interface. 84 Time the HMAC algorithm using the specified message digest. 88 Time the CMAC algorithm using the specified cipher e.g. 114 is only effective if RSA algorithm is specified to test. 136 Runs the speed command in testmode. Runs only 1 iteration of each algorithm test 146 =item I<algorithm> ... 148 If any I<algorithm> is given, then those algorithms are tested, otherwise a 155 The I<algorithm> can be selected only from a pre-compiled subset of things 157 or cipher algorithm supported by OpenSSL use the C<-evp> option.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PBE_CipherInit.pod | 35 I<pass> of length I<passlen>. The PBE algorithm type and parameters are extracted 39 I<libctx> and property query I<propq> to select appropriate algorithm 42 =head2 PBE algorithm search 44 EVP_PBE_find() and EVP_PBE_find_ex() search for a matching algorithm using two parameters: 46 1. An algorithm type I<type> which can be: 52 EVP_PBE_TYPE_OUTER - A PBE algorithm 64 2. A I<pbe_nid> which can represent the algorithm identifier with parameters e.g. 65 B<NID_pbeWithSHA1AndRC2_CBC> or an algorithm class e.g. B<NID_pbes2>. 67 They return the algorithm's cipher ID I<pcnid>, digest ID I<pmnid> and a key 68 generation function for the algorithm I<pkeygen>. EVP_PBE_CipherInit_ex() also [all …]
|
H A D | OSSL_ALGORITHM.pod | 5 OSSL_ALGORITHM - OpenSSL Core type to define a fetchable algorithm 22 algorithm that a L<provider(7)> provides. Arrays of this type are returned 41 L<EVP_MD_fetch(3)>, etc) to find the desired algorithm. 43 Multiple names / identities allow a specific algorithm implementation to be 44 fetched multiple ways. For example, the RSA algorithm has the following 57 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the 72 The OpenSSL libraries use the first of the algorithm names as the main 73 or canonical name, on a per algorithm implementation basis. 75 See the notes L</On the subject of algorithm names> below for a more in 82 algorithm implementation, and is used by the appropriate fetching [all …]
|
H A D | PKCS12_pack_p7encdata.pod | 23 type from the set of safeBags I<bags>. The algorithm ID in I<pbe_nid> can be 24 a PKCS#12 or PKCS#5 password based encryption algorithm, or a cipher algorithm. 25 If a cipher algorithm is passed, the PKCS#5 PBES2 algorithm will be used with 32 algorithm implementation.
|
H A D | EVP_PKEY_verify_recover.pod | 7 - recover signature using a public key algorithm 24 EVP_PKEY_verify_recover_init() initializes a public key algorithm context 25 I<ctx> for signing using the algorithm given when the context was created 26 using L<EVP_PKEY_CTX_new(3)> or variants thereof. The algorithm is used to 37 Depending on what algorithm was fetched, certain details revolving around the 60 After the call to EVP_PKEY_verify_recover_init() algorithm specific control 64 After the call to EVP_PKEY_verify_recover_init_ex2(), algorithm specific control 65 operations may not be needed if the chosen algorithm implies that those controls 75 indicates the operation is not supported by the public key algorithm.
|
H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 10 - EVP_PKEY RSA-PSS algorithm support functions 55 they have exactly the same meaning as for the RSA algorithm. 64 EVP_PKEY_CTX_set_rsa_pss_keygen_md() restricts the digest algorithm the 67 passes the algorithm by name rather than by B<EVP_MD>. 69 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() restricts the MGF1 algorithm the 72 passes the algorithm by name rather than by B<EVP_MD>. 79 A context for the B<RSA-PSS> algorithm can be obtained by calling: 87 the public key algorithm.
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | ossl-guide-libcrypto-introduction.pod | 25 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 26 implementations available for use. For example the RSA algorithm is available as 41 encryption operation using AES (or any other encryption algorithm) you would use 48 In order to use an algorithm an implementation for it must first be "fetched". 58 Explicit fetching involves directly calling a specific API to fetch an algorithm 62 can be used to explicitly fetch a digest algorithm implementation. The user is 82 For all currently implemented fetching functions this is the algorithm name. 83 Each provider supports a list of algorithm implementations. See the provider 84 specific documentation for information on the algorithm implementations 97 The property query string used to guide selection of the algorithm [all …]
|
H A D | openssl-glossary.pod | 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 41 A decoder is a type of algorithm used for decoding keys and parameters from some 48 An OpenSSL Provider that contains the most common OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 67 An encoder is a type of algorithm used for encoding keys and parameters to some 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have 98 where an algorithm object with no associated implementation is used such as the [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | mlkem_parse.py | 83 algorithm = data['algorithm'] variable 93 print("# ACVP test data for " + algorithm + " " + mode + " generated from") 95 + algorithm + "-" + mode + "-" + revision + "/internalProjection.json") 99 print_label("Title", algorithm + " " + mode + " ACVP Tests") 101 if algorithm == "ML-KEM": 109 eprint("Unsupported algorithm " + algorithm)
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
H A D | lac_sym_cipher.c | 68 CpaCySymCipherAlgorithm algorithm = pSessionDesc->cipherAlgorithm; in LacCipher_PerformIvCheck() local 71 switch (algorithm) { in LacCipher_PerformIvCheck() 85 ivLenInBytes = LacSymQat_CipherIvSizeBytesGet(algorithm); in LacCipher_PerformIvCheck() 89 (LAC_CIPHER_IS_GCM(algorithm) && in LacCipher_PerformIvCheck() 93 LAC_CIPHER_IS_CCM(algorithm))) { in LacCipher_PerformIvCheck() 361 LacCipher_PerformParamCheck(CpaCySymCipherAlgorithm algorithm, in LacCipher_PerformParamCheck() argument 378 switch (algorithm) { in LacCipher_PerformParamCheck() 421 (LacSymQat_CipherBlockSizeBytesGet(algorithm) - in LacCipher_PerformParamCheck()
|
/freebsd/contrib/llvm-project/clang/lib/Tooling/Inclusions/Stdlib/ |
H A D | StdSymbolMap.inc | 585 SYMBOL(adjacent_find, std::, <algorithm>) 600 SYMBOL(all_of, std::, <algorithm>) 610 SYMBOL(any_of, std::, <algorithm>) 807 SYMBOL(binary_search, std::, <algorithm>) 877 SYMBOL(clamp, std::, <algorithm>) 945 SYMBOL(copy, std::, <algorithm>) 946 SYMBOL(copy_backward, std::, <algorithm>) 948 SYMBOL(copy_if, std::, <algorithm>) 949 SYMBOL(copy_n, std::, <algorithm>) 980 SYMBOL(count, std::, <algorithm>) [all …]
|
/freebsd/crypto/openssl/doc/HOWTO/ |
H A D | keys.txt | 21 Generating a key for the RSA algorithm is quite easy, all you have to 40 Generating a key for the DSA algorithm is a two-step process. First, 91 openssl genpkey -algorithm EC -pkeyopt ec_paramgen_curve:P-256 98 Generating a key for the ML-DSA algorithm is a one-step process. 100 openssl genpkey -algorithm ML-DSA-44 -out key.pem 101 openssl genpkey -algorithm ML-DSA-65 -out key.pem 102 openssl genpkey -algorithm ML-DSA-87 -out key.pem 111 Generating a key for the ML-KEM algorithm is a one-step process. 113 openssl genpkey -algorithm ML-KEM-512 -out key.pem 114 openssl genpkey -algorithm ML-KEM-768 -out key.pem [all …]
|
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
H A D | pkinit_kdf_test.c | 125 alg_id.algorithm = kdf_sha1_id; in main() 129 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main() 153 alg_id.algorithm = kdf_sha256_id; in main() 157 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main() 181 alg_id.algorithm = kdf_sha512_id; in main() 185 retval = pkinit_kdf(context, &secret, &alg_id.algorithm, u_principal, in main()
|
/freebsd/sys/contrib/openzfs/scripts/ |
H A D | convert_wycheproof.pl | 72 my $algorithm = $data->{algorithm}; 73 if (!defined $algorithm) { 90 say "algorithm: $algorithm"; 204 say $outfh "algorithm: $algorithm";
|
/freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
H A D | sa8540p-ride.dts | 201 snps,dcb-algorithm; 208 snps,dcb-algorithm; 214 snps,avb-algorithm; 220 snps,avb-algorithm; 231 snps,dcb-algorithm; 235 snps,dcb-algorithm; 239 snps,avb-algorithm; 247 snps,avb-algorithm; 278 snps,dcb-algorithm; 285 snps,dcb-algorithm; [all …]
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/ |
H A D | lac_sym_qat.c | 257 icp_qat_hw_cipher_algo_t algorithm; in LacSymQat_UseSymConstantsTable() local 268 pSession, &algorithm, &mode, &dir, &key_convert); in LacSymQat_UseSymConstantsTable() 272 algorithm, in LacSymQat_UseSymConstantsTable() 289 icp_qat_hw_auth_algo_t algorithm; in LacSymQat_UseSymConstantsTable() local 308 &algorithm, in LacSymQat_UseSymConstantsTable() 313 algorithm, in LacSymQat_UseSymConstantsTable()
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | resolve.h | 142 unsigned algorithm; member 149 unsigned algorithm; member 163 unsigned algorithm; member 169 unsigned algorithm; member 177 unsigned algorithm; member
|