/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-list.pod.in | 6 openssl-list - list algorithms and features 17 [B<-digest-algorithms>] 21 -}[B<-kdf-algorithms>] 22 [B<-mac-algorithms>] 25 [B<-cipher-algorithms>] 32 [B<-key-exchange-algorithms>] 33 [B<-kem-algorithms>] 34 [B<-signature-algorithms>] 35 [B<-asymcipher-algorithms>] 36 [B<-public-key-algorithms>] [all …]
|
H A D | openssl-speed.pod.in | 32 This command is used to test the performance of cryptographic algorithms. 55 To see the algorithms supported with this option, use 56 C<openssl list -digest-algorithms> or C<openssl list -cipher-algorithms> 119 If any I<algorithm> is given, then those algorithms are tested, otherwise a 130 There is no way to test the speed of any additional public key algorithms
|
H A D | openssl-pkcs8.pod.in | 37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms. 131 Some implementations may not support custom PRF algorithms and may require 166 encryption algorithms such as 56 bit DES. 168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 179 Various algorithms can be used with the B<-v1> command line option, 187 These algorithms were included in the original PKCS#5 v1.5 specification. 192 These algorithms are not mentioned in the original PKCS#5 v1.5 specification 199 These algorithms use the PKCS#12 password based encryption algorithm and 200 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used. 254 algorithms are concerned.
|
H A D | openssl-dgst.pod.in | 50 To see the list of supported algorithms, use C<openssl list -digest-algorithms> 89 Set the output length for XOF algorithms, such as B<shake128> and B<shake256>. 92 For OpenSSL providers it is recommended to set this value for shake algorithms, 159 algorithm is HMAC (hash-based MAC), but there are other MAC algorithms 243 The C<openssl list -digest-algorithms> command can be used to list them. 255 A source of random numbers is required for certain signing algorithms, in
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 27 algorithms for B<ctx> or B<ssl>. The array B<slist> of length B<slistlen> 29 algorithms. 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 40 signature algorithms related to client authentication, otherwise they are 50 If an application wishes to allow the setting of signature algorithms 54 The signature algorithms set by a client are used directly in the supported 57 The supported signature algorithms set by a server are not sent to the 58 client but are used to determine the set of shared signature algorithms 62 The client authentication signature algorithms set by a server are sent [all …]
|
H A D | OpenSSL_add_all_algorithms.pod | 6 add algorithms to internal table 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 27 OpenSSL_add_all_digests() adds all digest algorithms to the table. 29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including 33 password based encryption algorithms.
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 50 signature algorithms can be determined: which can be zero. 53 signature algorithms: after a client hello (for servers) or a certificate 57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. 61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
|
H A D | EVP_PKEY_CTX_set1_pbe_pass.pod | 17 These functions are generic support functions for all KDF algorithms. 25 EVP_PKEY_CTX_set1_kdf_key (to be used by the algorithms that use a 41 supported by the algorithms that use them.
|
H A D | SSL_check_chain.pod | 34 B<CERT_PKEY_CA_SIGNATURE>: the signature algorithms of all CA certificates 44 algorithms extension). 67 algorithms may also wish to check B<CERT_PKEY_CA_SIGNATURE> too. If no 75 Since the supported signature algorithms extension is only used in TLS 1.2,
|
H A D | SSL_CTX_set_security_level.pod | 125 signature algorithms) to achieve this end and some cases (DH parameter size 132 cipher suite encryption algorithms, supported ECC curves, supported 133 signature algorithms, DH parameter sizes, certificate key sizes and 134 signature algorithms. This limit applies no matter what other custom 139 algorithms. 142 algorithms which can severely degrade performance. For example 256 bits
|
H A D | CMS_add1_signer.pod | 43 algorithms are needed. New attributes can also be added using the returned 79 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 81 If any of these algorithms is not available then it will not be included: for example the GOST algo…
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 01-simple.cnf | 6 test-1 = 1-Server signature algorithms bug 34 [1-Server signature algorithms bug] 35 ssl_conf = 1-Server signature algorithms bug-ssl 37 [1-Server signature algorithms bug-ssl] 38 server = 1-Server signature algorithms bug-server 39 client = 1-Server signature algorithms bug-client 41 [1-Server signature algorithms bug-server] 47 [1-Server signature algorithms bug-client]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | OSSL_PROVIDER-legacy.pod | 9 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms 10 that have been deemed legacy. Such algorithms have commonly fallen out of 14 We can consider this the retirement home of cryptographic algorithms. 37 The OpenSSL legacy provider supports these operations and algorithms: 57 Not all of these symmetric cipher algorithms are enabled by default. 94 When algorithms for other operations start appearing, the
|
H A D | evp.pod | 29 asymmetric algorithms. To create a new EVP_PKEY see 69 All the symmetric algorithms (ciphers), digests and asymmetric algorithms 70 (public key algorithms) can be replaced by ENGINE modules providing alternative 76 Although low-level algorithm specific functions exist for many algorithms 78 versions of new algorithms cannot be accessed using the low-level functions. 79 Also makes code harder to adapt to new algorithms and some options are not
|
H A D | fips_module.pod | 51 use the FIPS module for cryptographic algorithms by default. 99 enabled to prevent accidental use of non-FIPS validated algorithms via broken 106 cryptographic algorithms (and therefore does not impact the validation status of 107 any cryptographic operations), but does include other supporting algorithms that 132 The algorithms available in the FIPS module are a subset of the algorithms 135 If any applications attempt to use any algorithms that are not present, 217 This loads a sub-set of algorithms that are also available in the default 219 with the FIPS provider. For example this contains algorithms for encoding and 268 All algorithms implemented in a provider have this property set on them. 270 There is also the C<fips> property. All FIPS algorithms match against the [all …]
|
H A D | EVP_CIPHER-DES.pod | 13 The following algorithms are available in the FIPS provider as well as the 24 The following algorithms are available in the default provider, but not the 43 The following algorithms are available in the legacy provider:
|
H A D | crypto.pod | 14 cryptographic algorithms used in various Internet standards. The services 27 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 36 Different algorithms can be grouped together by their purpose. For example there 37 are algorithms for encryption, and different algorithms for digesting data. 234 Internally OpenSSL caches similar algorithms on the first fetch 283 that some algorithms have aliases. So "SHA256" and "SHA2-256" are synonymous: 346 The algorithms available in each of these providers may vary due to build time 348 currently available algorithms. 350 The names of the algorithms shown from L<openssl-list(1)> can be used as an 353 algorithms available in each of the providers. [all …]
|
H A D | OSSL_PROVIDER-null.pod | 9 The OpenSSL null provider supplies no algorithms. 20 The OpenSSL null provider supports no operations and algorithms.
|
/freebsd/tools/tools/crypto/ |
H A D | cryptotest.c | 123 } algorithms[] = { variable 176 for (i = 0; i < nitems(algorithms); i++) in getalgbycode() 177 if (cipher == algorithms[i].code) in getalgbycode() 178 return &algorithms[i]; in getalgbycode() 187 for (i = 0; i < nitems(algorithms); i++) in getalgbyname() 188 if (streq(name, algorithms[i].name)) in getalgbyname() 189 return &algorithms[i]; in getalgbyname() 629 for (i = 0; i < nitems(algorithms); i++) { in main() 631 alg = &algorithms[i]; in main()
|
/freebsd/contrib/libfido2/src/ |
H A D | info.c | 314 return (decode_algorithms(val, &ci->algorithms)); in parse_reply_element() 440 fido_algo_array_free(&ci->algorithms); in fido_cbor_info_reset() 604 return (ci->algorithms.len); in fido_cbor_info_algorithm_count() 610 if (idx >= ci->algorithms.len) in fido_cbor_info_algorithm_type() 613 return (ci->algorithms.ptr[idx].type); in fido_cbor_info_algorithm_type() 619 if (idx >= ci->algorithms.len) in fido_cbor_info_algorithm_cose() 622 return (ci->algorithms.ptr[idx].cose); in fido_cbor_info_algorithm_cose()
|
/freebsd/crypto/openssl/ |
H A D | README-PROVIDERS.md | 43 The legacy provider is a collection of legacy algorithms that are either no 45 However, some applications may need to use these algorithms for backwards 48 may find that some algorithms are no longer available unless they load the 58 from the default provider, consisting of algorithms conforming to FIPS standards. 68 The base provider contains a small sub-set of non-cryptographic algorithms 69 available in the default provider. For example, it contains algorithms to
|
/freebsd/sys/security/mac_veriexec/ |
H A D | veriexec_fingerprint.c | 69 SYSCTL_PROC(_security_mac_veriexec, OID_AUTO, algorithms, 79 int algorithms, error; in sysctl_mac_veriexec_algorithms() local 81 algorithms = 0; in sysctl_mac_veriexec_algorithms() 84 if (algorithms++) in sysctl_mac_veriexec_algorithms()
|
/freebsd/contrib/llvm-project/libcxx/modules/std/ |
H A D | memory.cppm |
|
H A D | memory.inc | 55 // [specialized.algorithms], specialized algorithms 148 // [util.smartptr.shared.spec], shared_ptr specialized algorithms 166 // [util.smartptr.weak.spec], weak_ptr specialized algorithms
|
/freebsd/contrib/ntp/tests/libntp/data/ |
H A D | ntp.keys | 2 # of OpenSSL-supported digest algorithms we've come across. It 3 # needs to be updated as algorithms are observed. A list can be
|