| /freebsd-12.1/contrib/file/magic/Magdir/ |
| H A D | mcrypt | 7 >4 string >\0 algorithm: %s, 13 >3 byte 1 algorithm: DES, 14 >3 byte 2 algorithm: 3DES, 15 >3 byte 3 algorithm: 3-WAY, 16 >3 byte 4 algorithm: GOST, 17 >3 byte 6 algorithm: SAFER-SK64, 19 >3 byte 8 algorithm: CAST-128, 20 >3 byte 9 algorithm: xTEA, 22 >3 byte 11 algorithm: RC2, 28 >3 byte 100 algorithm: RC6, [all …]
|
| /freebsd-12.1/usr.sbin/ppp/ |
| H A D | ccp.c | 158 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 279 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 320 return algorithm[ccp->out.algorithm]->o.MTUOverhead; in ccp_MTUOverhead() 453 (*algorithm[ccp->in.algorithm]->i.Term)(ccp->in.state); in CcpLayerDown() 458 (*algorithm[ccp->out.algorithm]->o.Term)(ccp->out.state); in CcpLayerDown() 528 ccp->in.state = (*algorithm[ccp->in.algorithm]->i.Init) in CcpLayerUp() 547 ccp->out.state = (*algorithm[ccp->out.algorithm]->o.Init) in CcpLayerUp() 716 (*algorithm[ccp->in.algorithm]->i.Reset)(ccp->in.state); in CcpRecvResetAck() 733 bp = (*algorithm[l->ccp.out.algorithm]->o.Write) in ccp_LayerPush() 765 bp = (*algorithm[l->ccp.in.algorithm]->i.Read) in ccp_LayerPull() [all …]
|
| /freebsd-12.1/contrib/opie/ |
| H A D | opiekey.c | 154 algorithm = 4; 157 algorithm = 5; 160 algorithm = 3; 185 algorithm = 4; 190 algorithm = 5; 210 algorithm = 3; 277 opiehash(&newkey, algorithm); 286 if (opiekeycrunch(algorithm, &key, seed, secret)) { 292 opiehash(&key, algorithm); 322 sprintf(buf, ":%s 499 %s:", algids[algorithm], newseed); [all …]
|
| H A D | opieauto.c | 54 int algorithm, base, current; member 86 int algorithm, sequence, i; in doreq() local 99 if (((algorithm = strtoul(&cmd[3], &c, 10)) < 3) || (algorithm > 5) || (*c != ' ')) { in doreq() 153 sprintf(cmd, "%c- %d %d %s\n", cmd[0], algorithm, sequence, seed); in doreq() 159 …for (c = &head; *c && (strcmp((*c)->seed, seed) || ((*c)->algorithm != algorithm)); c = &((*c)->ne… in doreq() 165 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, seed); in doreq() 173 (*c)->algorithm = algorithm; in doreq() 184 sprintf(cmd, "S+ %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq() 190 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq() 198 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq() [all …]
|
| /freebsd-12.1/crypto/openssl/doc/man1/ |
| H A D | genpkey.pod | 18 [B<-algorithm alg>] 62 =item B<-algorithm alg> 256 openssl genpkey -algorithm RSA -out key.pem 264 openssl genpkey -algorithm RSA -out key.pem \ 269 openssl genpkey -genparam -algorithm DSA -out dsap.pem \ 278 openssl genpkey -genparam -algorithm DH -out dhp.pem \ 283 openssl genpkey -genparam -algorithm DH -out dhpx.pem \ 297 openssl genpkey -genparam -algorithm EC -out ecp.pem \ 307 openssl genpkey -algorithm EC -out eckey.pem \ 313 openssl genpkey -algorithm X25519 -out xkey.pem [all …]
|
| H A D | passwd.pod | 34 The Unix standard algorithm B<crypt> and the MD5-based BSD password 35 algorithm B<1>, its Apache variant B<apr1>, and its AIX variant are available. 47 Use the B<crypt> algorithm (default). 51 Use the MD5 based BSD password algorithm B<1>. 55 Use the B<apr1> algorithm (Apache variant of the BSD algorithm). 59 Use the B<AIX MD5> algorithm (AIX variant of the BSD algorithm).
|
| H A D | pkeyutl.pod | 6 pkeyutl - public key algorithm utility 29 [B<-kdf algorithm>] 42 using any supported algorithm. 126 =item B<-kdf algorithm> 128 Use key derivation function B<algorithm>. The supported algorithms are 133 for the supported string parameters of each algorithm. 181 The operations and options supported vary according to the key algorithm 193 directly as input to the signature algorithm. Depending on the key type, 209 The RSA algorithm generally supports the encrypt, decrypt, sign, 253 The RSA-PSS algorithm is a restricted version of the RSA algorithm which only [all …]
|
| H A D | dgst.pod | 41 algorithm to be used. 100 Pass options to the signature algorithm during sign or verify operations. 101 Names and values of these options are algorithm-specific. 128 algorithm is HMAC (hash-based MAC), but there are other MAC algorithms 129 which are not based on hash, for instance B<gost-mac> algorithm, 135 Passes options to MAC algorithm, specified by B<-mac> key. 144 the MAC algorithm for example exactly 32 chars for gost-mac. 149 Key length must conform to any restrictions of the MAC algorithm 215 When signing a file, B<dgst> will automatically determine the algorithm 218 itself, not the related data to identify the signer and algorithm used in
|
| /freebsd-12.1/contrib/opie/libopie/ |
| H A D | generator.c | 139 int algorithm; variable 157 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts)) 167 if (i = opiekeycrunch(algorithm, &key, seed, secret)) 181 opiehash(&key, algorithm); 186 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 190 opiehash(&newkey, algorithm); 194 if (snprintf(buf, sizeof(buf), ":%s 499 %s:", algids[algorithm], 250 opiehash(&key, algorithm); 290 opiehash(&key, algorithm); 297 if ((snprintf(cmd, sizeof(cmd), "s= %d %d %s\n", algorithm, sequence, [all …]
|
| H A D | parsechallenge.c | 26 struct algorithm { struct 31 static struct algorithm algorithms[] = { argument 38 int __opieparsechallenge FUNCTION((buffer, algorithm, sequence, seed, exts), char *buffer AND int *… 46 struct algorithm *a; 52 *algorithm = a->num;
|
| H A D | keycrunch.c | 27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND 43 if (algorithm & 0x10) 50 if (!(algorithm & 0x10)) 54 opiehashlen(algorithm & 0x0f, c, result, i);
|
| H A D | hash.c | 29 VOIDRET opiehash FUNCTION((x, algorithm), struct opie_otpkey *x AND 30 unsigned algorithm) 34 switch(algorithm) {
|
| H A D | hashlen.c | 26 VOIDRET opiehashlen FUNCTION((algorithm, in, out, n), int algorithm AND 32 switch(algorithm) {
|
| /freebsd-12.1/crypto/openssh/ |
| H A D | dns.c | 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() argument 89 *algorithm = SSHFP_KEY_RSA; in dns_read_key() 94 *algorithm = SSHFP_KEY_DSA; in dns_read_key() 99 *algorithm = SSHFP_KEY_ECDSA; in dns_read_key() 104 *algorithm = SSHFP_KEY_ED25519; in dns_read_key() 109 *algorithm = SSHFP_KEY_XMSS; in dns_read_key() 114 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ in dns_read_key() 129 if (*algorithm && *digest_type) { in dns_read_key() 148 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() argument 153 *algorithm = SSHFP_KEY_RESERVED; in dns_read_rdata() [all …]
|
| /freebsd-12.1/crypto/openssl/crypto/asn1/ |
| H A D | x_algor.c | 17 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 41 ASN1_OBJECT_free(alg->algorithm); 42 alg->algorithm = aobj; 58 *paobj = algor->algorithm; in X509_ALGOR_get0() 88 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp()
|
| /freebsd-12.1/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_CTX_new.pod | 5 EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm c… 18 The EVP_PKEY_CTX_new() function allocates public key algorithm context using 19 the algorithm specified in B<pkey> and ENGINE B<e>. 21 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 22 using the algorithm specified by B<id> and ENGINE B<e>. It is normally used 33 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used
|
| H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 8 - EVP_PKEY RSA-PSS algorithm support functions 48 they have exactly the same meaning as for the RSA algorithm. 57 EVP_PKEY_CTX_set_rsa_pss_keygen_md() restricts the digest algorithm the 60 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() restricts the MGF1 algorithm the 68 A context for the B<RSA-PSS> algorithm can be obtained by calling: 76 the public key algorithm.
|
| /freebsd-12.1/crypto/heimdal/lib/roken/ |
| H A D | resolve.h | 142 unsigned algorithm; member 149 unsigned algorithm; member 163 unsigned algorithm; member 169 unsigned algorithm; member 177 unsigned algorithm; member
|
| H A D | resolve-test.c | 139 sig->algorithm, sig->labels, sig->orig_ttl, in main() 148 key->flags, key->protocol, key->algorithm); in main() 155 printf ("alg %u type %u length %lu data ", sshfp->algorithm, in main() 168 ds->key_tag, ds->algorithm, ds->digest_type, in main()
|
| /freebsd-12.1/contrib/libc++/include/experimental/ |
| H A D | algorithm | 2 //===-------------------------- algorithm ---------------------------------===// 15 experimental/algorithm synopsis 17 #include <algorithm> 36 #include <algorithm>
|
| /freebsd-12.1/contrib/ldns/ldns/ |
| H A D | dnssec_sign.h | 144 uint8_t algorithm, 266 uint8_t algorithm, 297 uint8_t algorithm, 353 uint8_t algorithm, 378 ldns_zone *ldns_zone_sign_nsec3(ldns_zone *zone, ldns_key_list *key_list, uint8_t algorithm, uint8_…
|
| /freebsd-12.1/crypto/openssl/doc/man7/ |
| H A D | SM2.pod | 5 SM2 - Chinese SM2 signature and encryption algorithm support 9 The B<SM2> algorithm was first defined by the Chinese national standard GM/T 11 an elliptic curve based algorithm. The current implementation in OpenSSL supports 14 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier 47 a message with the SM2 signature algorithm and the SM3 hash algorithm:
|
| H A D | RSA-PSS.pod | 5 RSA-PSS - EVP_PKEY RSA-PSS algorithm support 10 algorithm which only supports signing, verification and key generation 15 This algorithm shares several control operations with the B<RSA> algorithm 20 Signing and verification is similar to the B<RSA> algorithm except the
|
| H A D | des_modes.pod | 17 Normally, this is found as the function I<algorithm>_ecb_encrypt(). 42 Normally, this is found as the function I<algorithm>_cbc_encrypt(). 76 Normally, this is found as the function I<algorithm>_cfb_encrypt(). 108 the encipherment algorithm per unit of plaintext and thus cause 123 Normally, this is found as the function I<algorithm>_ofb_encrypt(). 152 the encipherment algorithm per unit of plaintext and thus cause 183 Normally, this is found as the function I<algorithm>_ecb3_encrypt(). 218 Normally, this is found as the function I<algorithm>_ede3_cbc_encrypt(). 242 Part 5.2: Modes of operation for an n-bit block cipher algorithm
|
| /freebsd-12.1/contrib/serf/auth/ |
| H A D | auth_digest.c | 53 const char *algorithm; member 225 if (digest_info->algorithm) { in build_auth_header() 227 digest_info->algorithm); in build_auth_header() 248 const char *algorithm = NULL; in serf__handle_digest_auth() local 307 algorithm = val; in serf__handle_digest_auth() 350 digest_info->algorithm = apr_pstrdup(digest_info->pool, algorithm); in serf__handle_digest_auth()
|