Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 486) sorted by relevance

12345678910>>...20

/freebsd-12.1/contrib/file/magic/Magdir/
H A Dmcrypt7 >4 string >\0 algorithm: %s,
13 >3 byte 1 algorithm: DES,
14 >3 byte 2 algorithm: 3DES,
15 >3 byte 3 algorithm: 3-WAY,
16 >3 byte 4 algorithm: GOST,
17 >3 byte 6 algorithm: SAFER-SK64,
19 >3 byte 8 algorithm: CAST-128,
20 >3 byte 9 algorithm: xTEA,
22 >3 byte 11 algorithm: RC2,
28 >3 byte 100 algorithm: RC6,
[all …]
/freebsd-12.1/usr.sbin/ppp/
H A Dccp.c158 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0])
279 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup()
320 return algorithm[ccp->out.algorithm]->o.MTUOverhead; in ccp_MTUOverhead()
453 (*algorithm[ccp->in.algorithm]->i.Term)(ccp->in.state); in CcpLayerDown()
458 (*algorithm[ccp->out.algorithm]->o.Term)(ccp->out.state); in CcpLayerDown()
528 ccp->in.state = (*algorithm[ccp->in.algorithm]->i.Init) in CcpLayerUp()
547 ccp->out.state = (*algorithm[ccp->out.algorithm]->o.Init) in CcpLayerUp()
716 (*algorithm[ccp->in.algorithm]->i.Reset)(ccp->in.state); in CcpRecvResetAck()
733 bp = (*algorithm[l->ccp.out.algorithm]->o.Write) in ccp_LayerPush()
765 bp = (*algorithm[l->ccp.in.algorithm]->i.Read) in ccp_LayerPull()
[all …]
/freebsd-12.1/contrib/opie/
H A Dopiekey.c154 algorithm = 4;
157 algorithm = 5;
160 algorithm = 3;
185 algorithm = 4;
190 algorithm = 5;
210 algorithm = 3;
277 opiehash(&newkey, algorithm);
286 if (opiekeycrunch(algorithm, &key, seed, secret)) {
292 opiehash(&key, algorithm);
322 sprintf(buf, ":%s 499 %s:", algids[algorithm], newseed);
[all …]
H A Dopieauto.c54 int algorithm, base, current; member
86 int algorithm, sequence, i; in doreq() local
99 if (((algorithm = strtoul(&cmd[3], &c, 10)) < 3) || (algorithm > 5) || (*c != ' ')) { in doreq()
153 sprintf(cmd, "%c- %d %d %s\n", cmd[0], algorithm, sequence, seed); in doreq()
159 …for (c = &head; *c && (strcmp((*c)->seed, seed) || ((*c)->algorithm != algorithm)); c = &((*c)->ne… in doreq()
165 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, seed); in doreq()
173 (*c)->algorithm = algorithm; in doreq()
184 sprintf(cmd, "S+ %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq()
190 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq()
198 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq()
[all …]
/freebsd-12.1/crypto/openssl/doc/man1/
H A Dgenpkey.pod18 [B<-algorithm alg>]
62 =item B<-algorithm alg>
256 openssl genpkey -algorithm RSA -out key.pem
264 openssl genpkey -algorithm RSA -out key.pem \
269 openssl genpkey -genparam -algorithm DSA -out dsap.pem \
278 openssl genpkey -genparam -algorithm DH -out dhp.pem \
283 openssl genpkey -genparam -algorithm DH -out dhpx.pem \
297 openssl genpkey -genparam -algorithm EC -out ecp.pem \
307 openssl genpkey -algorithm EC -out eckey.pem \
313 openssl genpkey -algorithm X25519 -out xkey.pem
[all …]
H A Dpasswd.pod34 The Unix standard algorithm B<crypt> and the MD5-based BSD password
35 algorithm B<1>, its Apache variant B<apr1>, and its AIX variant are available.
47 Use the B<crypt> algorithm (default).
51 Use the MD5 based BSD password algorithm B<1>.
55 Use the B<apr1> algorithm (Apache variant of the BSD algorithm).
59 Use the B<AIX MD5> algorithm (AIX variant of the BSD algorithm).
H A Dpkeyutl.pod6 pkeyutl - public key algorithm utility
29 [B<-kdf algorithm>]
42 using any supported algorithm.
126 =item B<-kdf algorithm>
128 Use key derivation function B<algorithm>. The supported algorithms are
133 for the supported string parameters of each algorithm.
181 The operations and options supported vary according to the key algorithm
193 directly as input to the signature algorithm. Depending on the key type,
209 The RSA algorithm generally supports the encrypt, decrypt, sign,
253 The RSA-PSS algorithm is a restricted version of the RSA algorithm which only
[all …]
H A Ddgst.pod41 algorithm to be used.
100 Pass options to the signature algorithm during sign or verify operations.
101 Names and values of these options are algorithm-specific.
128 algorithm is HMAC (hash-based MAC), but there are other MAC algorithms
129 which are not based on hash, for instance B<gost-mac> algorithm,
135 Passes options to MAC algorithm, specified by B<-mac> key.
144 the MAC algorithm for example exactly 32 chars for gost-mac.
149 Key length must conform to any restrictions of the MAC algorithm
215 When signing a file, B<dgst> will automatically determine the algorithm
218 itself, not the related data to identify the signer and algorithm used in
/freebsd-12.1/contrib/opie/libopie/
H A Dgenerator.c139 int algorithm; variable
157 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts))
167 if (i = opiekeycrunch(algorithm, &key, seed, secret))
181 opiehash(&key, algorithm);
186 if (opiekeycrunch(algorithm, &newkey, newseed, secret))
190 opiehash(&newkey, algorithm);
194 if (snprintf(buf, sizeof(buf), ":%s 499 %s:", algids[algorithm],
250 opiehash(&key, algorithm);
290 opiehash(&key, algorithm);
297 if ((snprintf(cmd, sizeof(cmd), "s= %d %d %s\n", algorithm, sequence,
[all …]
H A Dparsechallenge.c26 struct algorithm { struct
31 static struct algorithm algorithms[] = { argument
38 int __opieparsechallenge FUNCTION((buffer, algorithm, sequence, seed, exts), char *buffer AND int *
46 struct algorithm *a;
52 *algorithm = a->num;
H A Dkeycrunch.c27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND
43 if (algorithm & 0x10)
50 if (!(algorithm & 0x10))
54 opiehashlen(algorithm & 0x0f, c, result, i);
H A Dhash.c29 VOIDRET opiehash FUNCTION((x, algorithm), struct opie_otpkey *x AND
30 unsigned algorithm)
34 switch(algorithm) {
H A Dhashlen.c26 VOIDRET opiehashlen FUNCTION((algorithm, in, out, n), int algorithm AND
32 switch(algorithm) {
/freebsd-12.1/crypto/openssh/
H A Ddns.c81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() argument
89 *algorithm = SSHFP_KEY_RSA; in dns_read_key()
94 *algorithm = SSHFP_KEY_DSA; in dns_read_key()
99 *algorithm = SSHFP_KEY_ECDSA; in dns_read_key()
104 *algorithm = SSHFP_KEY_ED25519; in dns_read_key()
109 *algorithm = SSHFP_KEY_XMSS; in dns_read_key()
114 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ in dns_read_key()
129 if (*algorithm && *digest_type) { in dns_read_key()
148 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() argument
153 *algorithm = SSHFP_KEY_RESERVED; in dns_read_rdata()
[all …]
/freebsd-12.1/crypto/openssl/crypto/asn1/
H A Dx_algor.c17 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT),
41 ASN1_OBJECT_free(alg->algorithm);
42 alg->algorithm = aobj;
58 *paobj = algor->algorithm; in X509_ALGOR_get0()
88 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp()
/freebsd-12.1/crypto/openssl/doc/man3/
H A DEVP_PKEY_CTX_new.pod5 EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm c…
18 The EVP_PKEY_CTX_new() function allocates public key algorithm context using
19 the algorithm specified in B<pkey> and ENGINE B<e>.
21 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context
22 using the algorithm specified by B<id> and ENGINE B<e>. It is normally used
33 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod8 - EVP_PKEY RSA-PSS algorithm support functions
48 they have exactly the same meaning as for the RSA algorithm.
57 EVP_PKEY_CTX_set_rsa_pss_keygen_md() restricts the digest algorithm the
60 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() restricts the MGF1 algorithm the
68 A context for the B<RSA-PSS> algorithm can be obtained by calling:
76 the public key algorithm.
/freebsd-12.1/crypto/heimdal/lib/roken/
H A Dresolve.h142 unsigned algorithm; member
149 unsigned algorithm; member
163 unsigned algorithm; member
169 unsigned algorithm; member
177 unsigned algorithm; member
H A Dresolve-test.c139 sig->algorithm, sig->labels, sig->orig_ttl, in main()
148 key->flags, key->protocol, key->algorithm); in main()
155 printf ("alg %u type %u length %lu data ", sshfp->algorithm, in main()
168 ds->key_tag, ds->algorithm, ds->digest_type, in main()
/freebsd-12.1/contrib/libc++/include/experimental/
H A Dalgorithm2 //===-------------------------- algorithm ---------------------------------===//
15 experimental/algorithm synopsis
17 #include <algorithm>
36 #include <algorithm>
/freebsd-12.1/contrib/ldns/ldns/
H A Ddnssec_sign.h144 uint8_t algorithm,
266 uint8_t algorithm,
297 uint8_t algorithm,
353 uint8_t algorithm,
378 ldns_zone *ldns_zone_sign_nsec3(ldns_zone *zone, ldns_key_list *key_list, uint8_t algorithm, uint8_…
/freebsd-12.1/crypto/openssl/doc/man7/
H A DSM2.pod5 SM2 - Chinese SM2 signature and encryption algorithm support
9 The B<SM2> algorithm was first defined by the Chinese national standard GM/T
11 an elliptic curve based algorithm. The current implementation in OpenSSL supports
14 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier
47 a message with the SM2 signature algorithm and the SM3 hash algorithm:
H A DRSA-PSS.pod5 RSA-PSS - EVP_PKEY RSA-PSS algorithm support
10 algorithm which only supports signing, verification and key generation
15 This algorithm shares several control operations with the B<RSA> algorithm
20 Signing and verification is similar to the B<RSA> algorithm except the
H A Ddes_modes.pod17 Normally, this is found as the function I<algorithm>_ecb_encrypt().
42 Normally, this is found as the function I<algorithm>_cbc_encrypt().
76 Normally, this is found as the function I<algorithm>_cfb_encrypt().
108 the encipherment algorithm per unit of plaintext and thus cause
123 Normally, this is found as the function I<algorithm>_ofb_encrypt().
152 the encipherment algorithm per unit of plaintext and thus cause
183 Normally, this is found as the function I<algorithm>_ecb3_encrypt().
218 Normally, this is found as the function I<algorithm>_ede3_cbc_encrypt().
242 Part 5.2: Modes of operation for an n-bit block cipher algorithm
/freebsd-12.1/contrib/serf/auth/
H A Dauth_digest.c53 const char *algorithm; member
225 if (digest_info->algorithm) { in build_auth_header()
227 digest_info->algorithm); in build_auth_header()
248 const char *algorithm = NULL; in serf__handle_digest_auth() local
307 algorithm = val; in serf__handle_digest_auth()
350 digest_info->algorithm = apr_pstrdup(digest_info->pool, algorithm); in serf__handle_digest_auth()

12345678910>>...20