| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmac_common.txt | 19 Algorithm = MD5 28 Algorithm = MD5 36 Algorithm = MD5 47 Algorithm = SHA1 55 Algorithm = SHA1 62 Algorithm = SHA1 72 Algorithm = SHA256-192 81 Algorithm = SHA256-192 88 Algorithm = SHA256-192 94 Algorithm = SHA224 [all …]
|
| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 18 test-13 = 13-Suite B P-256 Hash Algorithm Selection 19 test-14 = 14-Suite B P-384 Hash Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | mcrypt | 15 >4 string >\0 algorithm: %s, 26 >3 byte 0 algorithm: blowfish-448, 27 >3 byte 1 algorithm: DES, 28 >3 byte 2 algorithm: 3DES, 29 >3 byte 3 algorithm: 3-WAY, 30 >3 byte 4 algorithm: GOST, 31 >3 byte 6 algorithm: SAFER-SK64, 32 >3 byte 7 algorithm: SAFER-SK128, 33 >3 byte 8 algorithm: CAST-128, 34 >3 byte 9 algorithm: xTEA, [all …]
|
| /illumos-gate/usr/src/man/man3nsl/ |
| H A D | getipsecalgbyname.3nsl | 8 getipsecalgbyname, getipsecalgbynum, freeipsecalgent \- query algorithm mapping 34 \fBfreeipsecalgent()\fR functions to obtain the IPsec algorithm mappings that 40 describes the algorithm entry found. This structure is described in the 50 the protocol identifier in which the algorithm is defined. See 77 \fBgetipsecalgbyname()\fR looks up the algorithm by its name, while 78 \fBgetipsecalgbynum()\fR looks up the algorithm by its assigned number. 92 the requested algorithm cannot be found, these functions return \fINULL\fR. 100 char **a_names; /* algorithm names */ 102 int a_alg_num; /* algorithm number */ 114 key size for the algorithm. \fBa_key_sizes[1]\fR and \fBa_key_sizes[2]\fR [all …]
|
| /illumos-gate/usr/src/man/man8/ |
| H A D | ipsecalgs.8 | 101 Internet Assigned Numbers Authority (IANA). Each algorithm belongs to a 102 protocol. Algorithm information includes supported key lengths, block or MAC 104 algorithm. This information is used by the IPsec modules, \fBipsecesp\fR(4P) 132 The mechanism name specified by an algorithm entry must correspond to a valid 143 Modifications to the protocols and algorithm by default update only the 165 Adds an algorithm of the protocol specified by the \fB-P\fR option. The 166 algorithm name(s) are specified with the \fB-n\fR option. The supported key 177 Specifies the block or MAC lengths of an algorithm, in bytes. Set more than one 224 Used with the \fB-a\fR option to force the addition of an algorithm or protocol 235 when the valid key lengths for an algorithm are specified by a range with the [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-genpkey.1 | 77 [\fB\-algorithm\fR \fIalg\fR] 124 This option encrypts the private key with the supplied cipher. Any algorithm 126 .IP "\fB\-algorithm\fR \fIalg\fR" 4 127 .IX Item "-algorithm alg" 128 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 129 precede any \fB\-pkeyopt\fR options. The options \fB\-paramfile\fR and \fB\-algorithm\fR 133 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 136 Valid built-in algorithm names for parameter generation (see the \fB\-genparam\fR 139 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 143 Set the public key algorithm option \fIopt\fR to \fIvalue\fR. The precise set of [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 15-test_dsaparam.t | 29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 39 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… [all …]
|
| H A D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
| H A D | 20-test_dhparam_check.t | 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey… 43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey… [all …]
|
| /freebsd/usr.sbin/ppp/ |
| H A D | ccp.c | 147 static const struct ccp_algorithm * const algorithm[] = { variable 156 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 179 if (ccp->in.algorithm != -1) in ccp_ReportStatus() 181 (*algorithm[ccp->in.algorithm]->Disp)(&ccp->in.opt)); in ccp_ReportStatus() 183 if (ccp->out.algorithm != -1) { in ccp_ReportStatus() 185 for (f = 0; f < ccp->out.algorithm; f++) in ccp_ReportStatus() 186 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg])) in ccp_ReportStatus() 189 (*algorithm[ccp->out.algorithm]->Disp)(&(*o)->val)); in ccp_ReportStatus() 277 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 303 if (IsEnabled(ccp->cfg.neg[algorithm[f]->Neg]) && in ccp_Required() [all …]
|
| /freebsd/lib/libc++/ |
| H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 5 { include: [ "<__algorithm/binary_search.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 8 { include: [ "<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 10 { include: [ "<__algorithm/copy_backward.h>", "private", "<algorithm>", "public" ] }, 11 { include: [ "<__algorithm/copy_if.h>", "private", "<algorithm>", "public" ] }, [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-genpkey.pod.in | 24 [B<-algorithm> I<alg>] 77 This option encrypts the private key with the supplied cipher. Any algorithm 80 =item B<-algorithm> I<alg> 82 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 83 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 90 Valid built-in algorithm names for parameter generation (see the B<-genparam> 93 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 98 Set the public key algorithm option I<opt> to I<value>. The precise set of 99 options supported depends on the public key algorithm used and its [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | ossl-guide-libcrypto-introduction.7 | 81 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 82 implementations available for use. For example the RSA algorithm is available as 96 encryption operation using AES (or any other encryption algorithm) you would use 100 .SH "ALGORITHM FETCHING" 101 .IX Header "ALGORITHM FETCHING" 102 In order to use an algorithm an implementation for it must first be "fetched". 111 Explicit fetching involves directly calling a specific API to fetch an algorithm 115 can be used to explicitly fetch a digest algorithm implementation. The user is 131 For all currently implemented fetching functions this is the algorithm name. 132 Each provider supports a list of algorithm implementations. See the provider [all …]
|
| H A D | openssl-glossary.7 | 67 .IP Algorithm 4 68 .IX Item "Algorithm" 71 implementation for any given algorithm available for use. 86 the algorithm implementations in the Base Provider are also available in the 92 A decoder is a type of algorithm used for decoding keys and parameters from some 98 An OpenSSL Provider that contains the most common OpenSSL algorithm 100 the algorithm implementations in the Base Provider are also available in the 115 An encoder is a type of algorithm used for encoding keys and parameters to some 122 where a function call is made to obtain an algorithm object representing an 126 Fetching is the process of looking through the available algorithm [all …]
|
| /freebsd/share/man/man4/ |
| H A D | mod_cc.4 | 38 dynamically change the congestion control algorithm used by new and existing 43 Algorithm modules can be compiled into the kernel or loaded as kernel modules 48 The default algorithm is CUBIC, and all connections use the default unless 60 Algorithm specific parameters can be set or queried using the 65 Callers must pass a pointer to an algorithm specific data, and specify 86 .It Va algorithm 87 Returns the current default congestion control algorithm when read, and changes 89 When attempting to change the default algorithm, this variable should be set to 133 algorithm built into it via kernel option and a system default specified. 139 This directive loads the NewReno congestion control algorithm. [all …]
|
| /freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_sym_hash_defs.h | 19 /* Constant for MD5 algorithm */ 30 /* Constants for SHA1 algorithm */ 41 /* Constants for SHA224 algorithm */ 52 /* Constants for SHA256 algorithm */ 63 /* Constants for SHA384 algorithm */ 74 /* Constants for SHA512 algorithm */ 85 /* Constants for SHA3_224 algorithm */ 96 /* Constants for SHA3_256 algorithm */ 107 /* Constants for SHA3_384 algorithm */ 118 /* Constants for SHA3_512 algorithm */ [all …]
|
| H A D | lac_sym_cipher_defs.h | 38 * Constants value for ARC4 algorithm 40 /* ARC4 algorithm block size */ 61 /* Key Modifier (KM) 4 bytes used in Kasumi algorithm in F8 mode to XOR 90 /* 96-bit case of IV for GCM algorithm */ 93 /* 96-bit case of IV for CCP/GCM single pass algorithm */ 96 * Constants value for NULL algorithm 98 /* NULL algorithm block size */ 101 /* Macro to check if the Algorithm is SM4 */ 107 /* Macro to check if the Algorithm is CHACHA */ 109 /* Macro to check if the Algorithm is AES */ [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-libcrypto-introduction.pod | 25 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 26 implementations available for use. For example the RSA algorithm is available as 41 encryption operation using AES (or any other encryption algorithm) you would use 46 =head1 ALGORITHM FETCHING 48 In order to use an algorithm an implementation for it must first be "fetched". 58 Explicit fetching involves directly calling a specific API to fetch an algorithm 62 can be used to explicitly fetch a digest algorithm implementation. The user is 82 For all currently implemented fetching functions this is the algorithm name. 83 Each provider supports a list of algorithm implementations. See the provider 84 specific documentation for information on the algorithm implementations [all …]
|
| H A D | openssl-glossary.pod | 13 =item Algorithm 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 41 A decoder is a type of algorithm used for decoding keys and parameters from some 48 An OpenSSL Provider that contains the most common OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 67 An encoder is a type of algorithm used for encoding keys and parameters to some 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have [all …]
|
| /freebsd/crypto/openssl/crypto/asn1/ |
| H A D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 40 ASN1_OBJECT_free(alg->algorithm); 41 alg->algorithm = aobj; 64 alg->algorithm = NULL; /* precaution to prevent double free */ in ossl_X509_ALGOR_from_nid() 76 *paobj = algor->algorithm; in X509_ALGOR_get0() 100 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 113 if (dest->algorithm) in X509_ALGOR_copy() 114 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 115 dest->algorithm = NULL; in X509_ALGOR_copy() 121 if (src->algorithm) in X509_ALGOR_copy() [all …]
|
| /illumos-gate/usr/src/man/man7/ |
| H A D | crypt_unix.7 | 8 crypt_unix \- traditional UNIX crypt algorithm 12 The \fBcrypt_unix\fR algorithm is the traditional UNIX crypt algorithm. It is 15 \fBcrypt_bsdbf\fR(7) algorithm should be used instead. 18 The algorithm identifier for \fBpolicy.conf\fR(5) is \fB__unix__\fR. There is 19 no entry in \fBcrypt.conf\fR(5) for this algorithm. 22 The \fBcrypt_unix\fR algorithm is internal to \fBlibc\fR and provides the 27 This algorithm is based on a one-way encryption algorithm with variations 30 are used with this algorithm; the rest are silently ignored. The salt is a 32 perturb the hashing algorithm in one of 4096 different ways. 39 The return value of the \fBcrypt_unix\fR algorithm might not be portable among
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_sigcrypt.h | 57 /** number of entries in algorithm needs array */ 61 * Storage for algorithm needs. DNSKEY algorithms. 68 * Indexed by algorithm number. 80 * @param sigalg: adds to signalled algorithm list too. 88 * @param sigalg: signalled algorithm list, numbers ends with 0. 104 * Mark this algorithm as a success, sec_secure, and see if we are done. 106 * @param algo: the algorithm processed to be secure. 112 * Mark this algorithm a failure, sec_bogus. It can later be overridden 113 * by a success for this algorithm (with a different signature). 115 * @param algo: the algorithm processed to be bogus. [all …]
|
| /freebsd/usr.bin/cksum/ |
| H A D | cksum.1 | 59 utility, except that it defaults to using historic algorithm 1, as 68 Algorithm 1 is the algorithm used by historic 72 algorithm and by historic 76 algorithm when using the 82 Algorithm 2 is the algorithm used by historic 87 algorithm. 95 Algorithm 3 is what is commonly called the 97 algorithm. 100 Both algorithm 1 and 2 write to the standard output the same fields as 101 the default algorithm except that the size of the file in bytes is [all …]
|
| /freebsd/contrib/ofed/opensm/man/ |
| H A D | opensm.8 | 158 algorithm (default). Multiple routing engines can be specified 172 This option sets the starting VL to use for the lash routing algorithm. 191 violate "pure" deadlock free algorithm, so use it carefully. 209 algorithm to the guids provided in the given file (one to a line). 239 using a round-robin algorithm (which is the default). Value supplied 249 by Up/Down routing algorithm instead of node GUIDs 304 equalization algorithm. 317 1. While using DOR routing algorithm. 326 2. While using general routing algorithm. 875 1. Min Hop Algorithm - based on the minimum hops to each node where the [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | OSSL_ALGORITHM.3 | 64 OSSL_ALGORITHM \- OpenSSL Core type to define a fetchable algorithm 81 algorithm that a \fBprovider\fR\|(7) provides. Arrays of this type are returned 97 \&\fBEVP_MD_fetch\fR\|(3), etc) to find the desired algorithm. 99 Multiple names / identities allow a specific algorithm implementation to be 100 fetched multiple ways. For example, the RSA algorithm has the following 108 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the 123 The OpenSSL libraries use the first of the algorithm names as the main 124 or canonical name, on a per algorithm implementation basis. 126 See the notes "On the subject of algorithm names" below for a more in 133 algorithm implementation, and is used by the appropriate fetching [all …]
|