Home
last modified time | relevance | path

Searched refs:algorithms (Results 1 – 25 of 327) sorted by relevance

12345678910>>...14

/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-list.pod.in6 openssl-list - list algorithms and features
17 [B<-digest-algorithms>]
21 -}[B<-kdf-algorithms>]
22 [B<-mac-algorithms>]
25 [B<-cipher-algorithms>]
32 [B<-key-exchange-algorithms>]
33 [B<-kem-algorithms>]
34 [B<-signature-algorithms>]
35 [B<-asymcipher-algorithms>]
36 [B<-public-key-algorithms>]
[all …]
H A Dopenssl-speed.pod.in32 This command is used to test the performance of cryptographic algorithms.
55 To see the algorithms supported with this option, use
56 C<openssl list -digest-algorithms> or C<openssl list -cipher-algorithms>
119 If any I<algorithm> is given, then those algorithms are tested, otherwise a
130 There is no way to test the speed of any additional public key algorithms
H A Dopenssl-pkcs8.pod.in37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms.
131 Some implementations may not support custom PRF algorithms and may require
166 encryption algorithms such as 56 bit DES.
168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
179 Various algorithms can be used with the B<-v1> command line option,
187 These algorithms were included in the original PKCS#5 v1.5 specification.
192 These algorithms are not mentioned in the original PKCS#5 v1.5 specification
199 These algorithms use the PKCS#12 password based encryption algorithm and
200 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
254 algorithms are concerned.
H A Dopenssl-dgst.pod.in50 To see the list of supported algorithms, use C<openssl list -digest-algorithms>
89 Set the output length for XOF algorithms, such as B<shake128> and B<shake256>.
92 For OpenSSL providers it is recommended to set this value for shake algorithms,
159 algorithm is HMAC (hash-based MAC), but there are other MAC algorithms
243 The C<openssl list -digest-algorithms> command can be used to list them.
255 A source of random numbers is required for certain signing algorithms, in
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set1_sigalgs.pod8 SSL_set1_client_sigalgs_list - set supported signature algorithms
27 algorithms for B<ctx> or B<ssl>. The array B<slist> of length B<slistlen>
29 algorithms.
32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter
40 signature algorithms related to client authentication, otherwise they are
50 If an application wishes to allow the setting of signature algorithms
54 The signature algorithms set by a client are used directly in the supported
57 The supported signature algorithms set by a server are not sent to the
58 client but are used to determine the set of shared signature algorithms
62 The client authentication signature algorithms set by a server are sent
[all …]
H A DOpenSSL_add_all_algorithms.pod6 add algorithms to internal table
24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
27 OpenSSL_add_all_digests() adds all digest algorithms to the table.
29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and
32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including
33 password based encryption algorithms.
H A DSSL_get_shared_sigalgs.pod5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms
22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index
29 information about all signature algorithms supported by B<s> in the order
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
50 signature algorithms can be determined: which can be zero.
53 signature algorithms: after a client hello (for servers) or a certificate
57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms.
61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
H A DEVP_PKEY_CTX_set1_pbe_pass.pod17 These functions are generic support functions for all KDF algorithms.
25 EVP_PKEY_CTX_set1_kdf_key (to be used by the algorithms that use a
41 supported by the algorithms that use them.
H A DSSL_check_chain.pod34 B<CERT_PKEY_CA_SIGNATURE>: the signature algorithms of all CA certificates
44 algorithms extension).
67 algorithms may also wish to check B<CERT_PKEY_CA_SIGNATURE> too. If no
75 Since the supported signature algorithms extension is only used in TLS 1.2,
H A DSSL_CTX_set_security_level.pod125 signature algorithms) to achieve this end and some cases (DH parameter size
132 cipher suite encryption algorithms, supported ECC curves, supported
133 signature algorithms, DH parameter sizes, certificate key sizes and
134 signature algorithms. This limit applies no matter what other custom
139 algorithms.
142 algorithms which can severely degrade performance. For example 256 bits
H A DCMS_add1_signer.pod43 algorithms are needed. New attributes can also be added using the returned
79 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192
81 If any of these algorithms is not available then it will not be included: for example the GOST algo…
/freebsd/crypto/openssl/test/ssl-tests/
H A D01-simple.cnf6 test-1 = 1-Server signature algorithms bug
34 [1-Server signature algorithms bug]
35 ssl_conf = 1-Server signature algorithms bug-ssl
37 [1-Server signature algorithms bug-ssl]
38 server = 1-Server signature algorithms bug-server
39 client = 1-Server signature algorithms bug-client
41 [1-Server signature algorithms bug-server]
47 [1-Server signature algorithms bug-client]
/freebsd/crypto/openssl/doc/man7/
H A DOSSL_PROVIDER-legacy.pod9 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms
10 that have been deemed legacy. Such algorithms have commonly fallen out of
14 We can consider this the retirement home of cryptographic algorithms.
37 The OpenSSL legacy provider supports these operations and algorithms:
57 Not all of these symmetric cipher algorithms are enabled by default.
94 When algorithms for other operations start appearing, the
H A Devp.pod29 asymmetric algorithms. To create a new EVP_PKEY see
69 All the symmetric algorithms (ciphers), digests and asymmetric algorithms
70 (public key algorithms) can be replaced by ENGINE modules providing alternative
76 Although low-level algorithm specific functions exist for many algorithms
78 versions of new algorithms cannot be accessed using the low-level functions.
79 Also makes code harder to adapt to new algorithms and some options are not
H A Dfips_module.pod51 use the FIPS module for cryptographic algorithms by default.
99 enabled to prevent accidental use of non-FIPS validated algorithms via broken
106 cryptographic algorithms (and therefore does not impact the validation status of
107 any cryptographic operations), but does include other supporting algorithms that
132 The algorithms available in the FIPS module are a subset of the algorithms
135 If any applications attempt to use any algorithms that are not present,
217 This loads a sub-set of algorithms that are also available in the default
219 with the FIPS provider. For example this contains algorithms for encoding and
268 All algorithms implemented in a provider have this property set on them.
270 There is also the C<fips> property. All FIPS algorithms match against the
[all …]
H A DEVP_CIPHER-DES.pod13 The following algorithms are available in the FIPS provider as well as the
24 The following algorithms are available in the default provider, but not the
43 The following algorithms are available in the legacy provider:
H A Dcrypto.pod14 cryptographic algorithms used in various Internet standards. The services
27 referred to in OpenSSL as "algorithms". Each algorithm may have multiple
36 Different algorithms can be grouped together by their purpose. For example there
37 are algorithms for encryption, and different algorithms for digesting data.
234 Internally OpenSSL caches similar algorithms on the first fetch
283 that some algorithms have aliases. So "SHA256" and "SHA2-256" are synonymous:
346 The algorithms available in each of these providers may vary due to build time
348 currently available algorithms.
350 The names of the algorithms shown from L<openssl-list(1)> can be used as an
353 algorithms available in each of the providers.
[all …]
H A DOSSL_PROVIDER-null.pod9 The OpenSSL null provider supplies no algorithms.
20 The OpenSSL null provider supports no operations and algorithms.
/freebsd/tools/tools/crypto/
H A Dcryptotest.c123 } algorithms[] = { variable
176 for (i = 0; i < nitems(algorithms); i++) in getalgbycode()
177 if (cipher == algorithms[i].code) in getalgbycode()
178 return &algorithms[i]; in getalgbycode()
187 for (i = 0; i < nitems(algorithms); i++) in getalgbyname()
188 if (streq(name, algorithms[i].name)) in getalgbyname()
189 return &algorithms[i]; in getalgbyname()
629 for (i = 0; i < nitems(algorithms); i++) { in main()
631 alg = &algorithms[i]; in main()
/freebsd/contrib/libfido2/src/
H A Dinfo.c314 return (decode_algorithms(val, &ci->algorithms)); in parse_reply_element()
440 fido_algo_array_free(&ci->algorithms); in fido_cbor_info_reset()
604 return (ci->algorithms.len); in fido_cbor_info_algorithm_count()
610 if (idx >= ci->algorithms.len) in fido_cbor_info_algorithm_type()
613 return (ci->algorithms.ptr[idx].type); in fido_cbor_info_algorithm_type()
619 if (idx >= ci->algorithms.len) in fido_cbor_info_algorithm_cose()
622 return (ci->algorithms.ptr[idx].cose); in fido_cbor_info_algorithm_cose()
/freebsd/crypto/openssl/
H A DREADME-PROVIDERS.md43 The legacy provider is a collection of legacy algorithms that are either no
45 However, some applications may need to use these algorithms for backwards
48 may find that some algorithms are no longer available unless they load the
58 from the default provider, consisting of algorithms conforming to FIPS standards.
68 The base provider contains a small sub-set of non-cryptographic algorithms
69 available in the default provider. For example, it contains algorithms to
/freebsd/sys/security/mac_veriexec/
H A Dveriexec_fingerprint.c69 SYSCTL_PROC(_security_mac_veriexec, OID_AUTO, algorithms,
79 int algorithms, error; in sysctl_mac_veriexec_algorithms() local
81 algorithms = 0; in sysctl_mac_veriexec_algorithms()
84 if (algorithms++) in sysctl_mac_veriexec_algorithms()
/freebsd/contrib/llvm-project/libcxx/modules/std/
H A Dmemory.cppm
H A Dmemory.inc55 // [specialized.algorithms], specialized algorithms
148 // [util.smartptr.shared.spec], shared_ptr specialized algorithms
166 // [util.smartptr.weak.spec], weak_ptr specialized algorithms
/freebsd/contrib/ntp/tests/libntp/data/
H A Dntp.keys2 # of OpenSSL-supported digest algorithms we've come across. It
3 # needs to be updated as algorithms are observed. A list can be

12345678910>>...14