| /freebsd-13.1/contrib/file/magic/Magdir/ |
| H A D | mcrypt | 7 >4 string >\0 algorithm: %s, 13 >3 byte 1 algorithm: DES, 14 >3 byte 2 algorithm: 3DES, 15 >3 byte 3 algorithm: 3-WAY, 16 >3 byte 4 algorithm: GOST, 17 >3 byte 6 algorithm: SAFER-SK64, 19 >3 byte 8 algorithm: CAST-128, 20 >3 byte 9 algorithm: xTEA, 22 >3 byte 11 algorithm: RC2, 28 >3 byte 100 algorithm: RC6, [all …]
|
| /freebsd-13.1/usr.sbin/ppp/ |
| H A D | ccp.c | 158 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 279 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 320 return algorithm[ccp->out.algorithm]->o.MTUOverhead; in ccp_MTUOverhead() 453 (*algorithm[ccp->in.algorithm]->i.Term)(ccp->in.state); in CcpLayerDown() 458 (*algorithm[ccp->out.algorithm]->o.Term)(ccp->out.state); in CcpLayerDown() 528 ccp->in.state = (*algorithm[ccp->in.algorithm]->i.Init) in CcpLayerUp() 547 ccp->out.state = (*algorithm[ccp->out.algorithm]->o.Init) in CcpLayerUp() 716 (*algorithm[ccp->in.algorithm]->i.Reset)(ccp->in.state); in CcpRecvResetAck() 733 bp = (*algorithm[l->ccp.out.algorithm]->o.Write) in ccp_LayerPush() 765 bp = (*algorithm[l->ccp.in.algorithm]->i.Read) in ccp_LayerPull() [all …]
|
| /freebsd-13.1/crypto/openssl/crypto/asn1/ |
| H A D | x_algor.c | 17 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 41 ASN1_OBJECT_free(alg->algorithm); 42 alg->algorithm = aobj; 58 *paobj = algor->algorithm; in X509_ALGOR_get0() 88 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 101 if (dest->algorithm) in X509_ALGOR_copy() 102 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 103 dest->algorithm = NULL; in X509_ALGOR_copy() 109 if (src->algorithm) in X509_ALGOR_copy() 110 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy()
|
| /freebsd-13.1/contrib/opie/ |
| H A D | opiekey.c | 154 algorithm = 4; 157 algorithm = 5; 160 algorithm = 3; 185 algorithm = 4; 190 algorithm = 5; 210 algorithm = 3; 277 opiehash(&newkey, algorithm); 286 if (opiekeycrunch(algorithm, &key, seed, secret)) { 292 opiehash(&key, algorithm); 322 sprintf(buf, ":%s 499 %s:", algids[algorithm], newseed); [all …]
|
| H A D | opieauto.c | 54 int algorithm, base, current; member 86 int algorithm, sequence, i; in doreq() local 99 if (((algorithm = strtoul(&cmd[3], &c, 10)) < 3) || (algorithm > 5) || (*c != ' ')) { in doreq() 153 sprintf(cmd, "%c- %d %d %s\n", cmd[0], algorithm, sequence, seed); in doreq() 159 …for (c = &head; *c && (strcmp((*c)->seed, seed) || ((*c)->algorithm != algorithm)); c = &((*c)->ne… in doreq() 165 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, seed); in doreq() 173 (*c)->algorithm = algorithm; in doreq() 184 sprintf(cmd, "S+ %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq() 190 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq() 198 sprintf(cmd, "s- %d %d %s\n", algorithm, sequence, (*c)->seed); in doreq() [all …]
|
| /freebsd-13.1/crypto/openssh/ |
| H A D | dns.c | 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() argument 89 *algorithm = SSHFP_KEY_RSA; in dns_read_key() 92 *algorithm = SSHFP_KEY_DSA; in dns_read_key() 95 *algorithm = SSHFP_KEY_ECDSA; in dns_read_key() 98 *algorithm = SSHFP_KEY_ED25519; in dns_read_key() 101 *algorithm = SSHFP_KEY_XMSS; in dns_read_key() 104 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ in dns_read_key() 118 if (*algorithm && *digest_type) { in dns_read_key() 135 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() argument 140 *algorithm = SSHFP_KEY_RESERVED; in dns_read_rdata() [all …]
|
| /freebsd-13.1/contrib/opie/libopie/ |
| H A D | generator.c | 139 int algorithm; variable 157 if (__opieparsechallenge(challenge, &algorithm, &sequence, &seed, &exts)) 167 if (i = opiekeycrunch(algorithm, &key, seed, secret)) 181 opiehash(&key, algorithm); 186 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 190 opiehash(&newkey, algorithm); 194 if (snprintf(buf, sizeof(buf), ":%s 499 %s:", algids[algorithm], 250 opiehash(&key, algorithm); 290 opiehash(&key, algorithm); 297 if ((snprintf(cmd, sizeof(cmd), "s= %d %d %s\n", algorithm, sequence, [all …]
|
| H A D | parsechallenge.c | 26 struct algorithm { struct 31 static struct algorithm algorithms[] = { argument 38 int __opieparsechallenge FUNCTION((buffer, algorithm, sequence, seed, exts), char *buffer AND int *… 46 struct algorithm *a; 52 *algorithm = a->num;
|
| H A D | keycrunch.c | 27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND 43 if (algorithm & 0x10) 50 if (!(algorithm & 0x10)) 54 opiehashlen(algorithm & 0x0f, c, result, i);
|
| H A D | hash.c | 29 VOIDRET opiehash FUNCTION((x, algorithm), struct opie_otpkey *x AND 30 unsigned algorithm) 34 switch(algorithm) {
|
| /freebsd-13.1/sbin/md5/tests/ |
| H A D | self-test.sh_inp | 3 while read algorithm; do 4 $algorithm -x > self-test.$algorithm.out || exitcode=$? 5 diff %%TESTSBASE%%/sbin/md5/self-test.$algorithm.chk self-test.$algorithm.out
|
| H A D | self-test.SH | 3 while read algorithm; do 4 $algorithm -x > self-test.$algorithm.out || exitcode=$? 5 diff %%TESTSBASE%%/sbin/md5/self-test.$algorithm.chk self-test.$algorithm.out
|
| H A D | coreutils-c-test.SH | 10 while read algorithm; do 11 ${algorithm}sum -c %%TESTSBASE%%/sbin/md5/${algorithm}.digest || exitcode=1 12 ${algorithm}sum -c %%TESTSBASE%%/sbin/md5/${algorithm}sum.digest || exitcode=1
|
| H A D | bsd-c-test.SH | 8 while read algorithm; do 12 expected=$(head -$n %%TESTSBASE%%/sbin/md5/$algorithm.digest | tail -1 | cut -w -f4) 13 hash=$($algorithm $opt -c "$expected" $f) || exitcode=1
|
| H A D | bsd-p-test.SH | 9 for algorithm in sha512; do 12 $algorithm$sum $opt -p < $f > $outbase.out 13 diff %%TESTSBASE%%/sbin/md5/$outbase.$algorithm$sum-p.chk $outbase.out || exitcode=1
|
| H A D | bsd-s-test.SH | 10 while read algorithm; do 15 hash=$($algorithm$sum $opt -s "$text" | cut -d= -f$field) 17 expected=$(head -$n %%TESTSBASE%%/sbin/md5/$algorithm.digest | tail -1 | cut -w -f4)
|
| /freebsd-13.1/crypto/openssl/doc/man1/ |
| H A D | genpkey.pod | 18 [B<-algorithm alg>] 62 =item B<-algorithm alg> 256 openssl genpkey -algorithm RSA -out key.pem 264 openssl genpkey -algorithm RSA -out key.pem \ 269 openssl genpkey -genparam -algorithm DSA -out dsap.pem \ 278 openssl genpkey -genparam -algorithm DH -out dhp.pem \ 283 openssl genpkey -genparam -algorithm DH -out dhpx.pem \ 297 openssl genpkey -genparam -algorithm EC -out ecp.pem \ 307 openssl genpkey -algorithm EC -out eckey.pem \ 313 openssl genpkey -algorithm X25519 -out xkey.pem [all …]
|
| /freebsd-13.1/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_CTX_new.pod | 5 EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm c… 18 The EVP_PKEY_CTX_new() function allocates public key algorithm context using 19 the algorithm specified in B<pkey> and ENGINE B<e>. 21 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 22 using the algorithm specified by B<id> and ENGINE B<e>. It is normally used 33 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used
|
| /freebsd-13.1/crypto/heimdal/lib/roken/ |
| H A D | resolve.h | 142 unsigned algorithm; member 149 unsigned algorithm; member 163 unsigned algorithm; member 169 unsigned algorithm; member 177 unsigned algorithm; member
|
| /freebsd-13.1/contrib/llvm-project/libcxx/include/experimental/ |
| H A D | algorithm | 2 //===-------------------------- algorithm ---------------------------------===// 14 experimental/algorithm synopsis 16 #include <algorithm> 35 #include <algorithm>
|
| /freebsd-13.1/contrib/ldns/ldns/ |
| H A D | dnssec_sign.h | 144 uint8_t algorithm, 266 uint8_t algorithm, 297 uint8_t algorithm, 353 uint8_t algorithm, 378 ldns_zone *ldns_zone_sign_nsec3(ldns_zone *zone, ldns_key_list *key_list, uint8_t algorithm, uint8_…
|
| /freebsd-13.1/crypto/openssl/doc/man7/ |
| H A D | SM2.pod | 5 SM2 - Chinese SM2 signature and encryption algorithm support 9 The B<SM2> algorithm was first defined by the Chinese national standard GM/T 11 an elliptic curve based algorithm. The current implementation in OpenSSL supports 14 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier 47 a message with the SM2 signature algorithm and the SM3 hash algorithm:
|
| H A D | RSA-PSS.pod | 5 RSA-PSS - EVP_PKEY RSA-PSS algorithm support 10 algorithm which only supports signing, verification and key generation 15 This algorithm shares several control operations with the B<RSA> algorithm 20 Signing and verification is similar to the B<RSA> algorithm except the
|
| /freebsd-13.1/contrib/bc/manuals/ |
| H A D | algorithms.md | 192 The algorithm used is to use the formula `e(y*l(x))`. 200 The algorithm is a simple method to check if rounding away from zero is 209 The algorithm is a simple add of one less decimal place than `p`. 217 The algorithm is a simple multiplication loop. 226 The algorithm is to use the formula `n!/(n-k)!`. 234 The algorithm is to use the formula `n!/r!*(n-r)!`. 285 algorithm. 291 The algorithm uses the formula `a*b/gcd(a,b)`. 299 The algorithm uses the formula `4*a(1)`. 307 The algorithm uses the formula `s(x)/c(x)`. [all …]
|
| /freebsd-13.1/contrib/apr-util/crypto/ |
| H A D | apr_crypto_commoncrypto.c | 54 CCAlgorithm algorithm; member 278 key->algorithm = kCCAlgorithm3DES; in crypto_cipher_mechanism() 284 key->algorithm = kCCAlgorithm3DES; in crypto_cipher_mechanism() 295 key->algorithm = kCCAlgorithmAES128; in crypto_cipher_mechanism() 301 key->algorithm = kCCAlgorithmAES128; in crypto_cipher_mechanism() 312 key->algorithm = kCCAlgorithmAES128; in crypto_cipher_mechanism() 318 key->algorithm = kCCAlgorithmAES128; in crypto_cipher_mechanism() 329 key->algorithm = kCCAlgorithmAES128; in crypto_cipher_mechanism() 335 key->algorithm = kCCAlgorithmAES128; in crypto_cipher_mechanism() 568 switch ((block->f->result->rc = CCCryptorCreate(kCCEncrypt, key->algorithm, in crypto_block_encrypt_init() [all …]
|