| /freebsd-14.2/crypto/openssl/test/recipes/ |
| H A D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
| /freebsd-14.2/contrib/file/magic/Magdir/ |
| H A D | mcrypt | 15 >4 string >\0 algorithm: %s, 27 >3 byte 1 algorithm: DES, 28 >3 byte 2 algorithm: 3DES, 29 >3 byte 3 algorithm: 3-WAY, 30 >3 byte 4 algorithm: GOST, 31 >3 byte 6 algorithm: SAFER-SK64, 33 >3 byte 8 algorithm: CAST-128, 34 >3 byte 9 algorithm: xTEA, 36 >3 byte 11 algorithm: RC2, 42 >3 byte 100 algorithm: RC6, [all …]
|
| /freebsd-14.2/usr.sbin/ppp/ |
| H A D | ccp.c | 156 #define NALGORITHMS (sizeof algorithm/sizeof algorithm[0]) 277 ccp->in.algorithm = ccp->out.algorithm = -1; in ccp_Setup() 318 return algorithm[ccp->out.algorithm]->o.MTUOverhead; in ccp_MTUOverhead() 451 (*algorithm[ccp->in.algorithm]->i.Term)(ccp->in.state); in CcpLayerDown() 456 (*algorithm[ccp->out.algorithm]->o.Term)(ccp->out.state); in CcpLayerDown() 526 ccp->in.state = (*algorithm[ccp->in.algorithm]->i.Init) in CcpLayerUp() 545 ccp->out.state = (*algorithm[ccp->out.algorithm]->o.Init) in CcpLayerUp() 714 (*algorithm[ccp->in.algorithm]->i.Reset)(ccp->in.state); in CcpRecvResetAck() 731 bp = (*algorithm[l->ccp.out.algorithm]->o.Write) in ccp_LayerPush() 763 bp = (*algorithm[l->ccp.in.algorithm]->i.Read) in ccp_LayerPull() [all …]
|
| /freebsd-14.2/contrib/llvm-project/libcxx/include/ |
| H A D | libcxx.imp | 2 { include: [ "<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public" ] }, 3 { include: [ "<__algorithm/all_of.h>", "private", "<algorithm>", "public" ] }, 4 { include: [ "<__algorithm/any_of.h>", "private", "<algorithm>", "public" ] }, 6 { include: [ "<__algorithm/clamp.h>", "private", "<algorithm>", "public" ] }, 7 { include: [ "<__algorithm/comp.h>", "private", "<algorithm>", "public" ] }, 9 { include: [ "<__algorithm/copy.h>", "private", "<algorithm>", "public" ] }, 13 { include: [ "<__algorithm/copy_n.h>", "private", "<algorithm>", "public" ] }, 14 { include: [ "<__algorithm/count.h>", "private", "<algorithm>", "public" ] }, 16 { include: [ "<__algorithm/equal.h>", "private", "<algorithm>", "public" ] }, 18 { include: [ "<__algorithm/fill.h>", "private", "<algorithm>", "public" ] }, [all …]
|
| /freebsd-14.2/crypto/openssl/crypto/asn1/ |
| H A D | x_algor.c | 43 ASN1_OBJECT_free(alg->algorithm); 44 alg->algorithm = aobj; 60 *paobj = algor->algorithm; in X509_ALGOR_get0() 90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 103 if (dest->algorithm) in X509_ALGOR_copy() 104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 105 dest->algorithm = NULL; in X509_ALGOR_copy() 111 if (src->algorithm) in X509_ALGOR_copy() 112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy() 151 md = EVP_get_digestbyobj(alg->algorithm); in ossl_x509_algor_get_md() [all …]
|
| /freebsd-14.2/sys/dev/qat/qat_api/common/crypto/sym/include/ |
| H A D | lac_sym_hash_defs.h | 288 #define IS_HMAC_ALG(algorithm) \ argument 289 ((algorithm == CPA_CY_SYM_HASH_MD5) || \ 290 (algorithm == CPA_CY_SYM_HASH_SHA1) || \ 291 (algorithm == CPA_CY_SYM_HASH_SHA224) || \ 292 (algorithm == CPA_CY_SYM_HASH_SHA256) || \ 293 (algorithm == CPA_CY_SYM_HASH_SHA384) || \ 294 (algorithm == CPA_CY_SYM_HASH_SHA512) || \ 295 (algorithm == CPA_CY_SYM_HASH_SM3)) || \ 296 (LAC_HASH_IS_SHA3(algorithm))
|
| /freebsd-14.2/crypto/openssh/ |
| H A D | dns.c | 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() argument 89 *algorithm = SSHFP_KEY_RSA; in dns_read_key() 92 *algorithm = SSHFP_KEY_DSA; in dns_read_key() 95 *algorithm = SSHFP_KEY_ECDSA; in dns_read_key() 98 *algorithm = SSHFP_KEY_ED25519; in dns_read_key() 101 *algorithm = SSHFP_KEY_XMSS; in dns_read_key() 104 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ in dns_read_key() 118 if (*algorithm && *digest_type) { in dns_read_key() 135 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() argument 140 *algorithm = SSHFP_KEY_RESERVED; in dns_read_rdata() [all …]
|
| /freebsd-14.2/crypto/openssl/doc/man1/ |
| H A D | openssl-genpkey.pod.in | 22 [B<-algorithm> I<alg>] 67 =item B<-algorithm> I<alg> 315 The B<algorithm> option must be B<"DH">. 320 The B<algorithm> option must be B<"DHX">. 325 The B<algorithm> option must be B<"DHX">. 331 The B<algorithm> option must be B<"DH">. 397 openssl genpkey -algorithm RSA -out key.pem 405 openssl genpkey -algorithm RSA -out key.pem \ 474 openssl genpkey -algorithm EC -out eckey.pem \ 480 openssl genpkey -algorithm X25519 -out xkey.pem [all …]
|
| H A D | openssl-speed.pod.in | 28 [I<algorithm> ...] 50 Use the specified cipher or message digest algorithm via the EVP interface. 73 Time the HMAC algorithm using the specified message digest. 77 Time the CMAC algorithm using the specified cipher e.g. 95 is only effective if RSA algorithm is specified to test. 117 =item I<algorithm> ... 119 If any I<algorithm> is given, then those algorithms are tested, otherwise a 126 The I<algorithm> can be selected only from a pre-compiled subset of things 128 or cipher algorithm supported by OpenSSL use the C<-evp> option.
|
| H A D | openssl-pkeyutl.pod.in | 6 openssl-pkeyutl - public key algorithm command 14 [B<-digest> I<algorithm>] 31 [B<-kdf> I<algorithm>] 45 operations using any supported algorithm. 65 which is not hashed by any message digest algorithm. 69 the default digest algorithm is SHA-256. For SM2, it is SM3. 74 =item B<-digest> I<algorithm> 180 =item B<-kdf> I<algorithm> 187 for the supported string parameters of each algorithm. 258 The RSA algorithm generally supports the encrypt, decrypt, sign, [all …]
|
| /freebsd-14.2/crypto/openssl/doc/man3/ |
| H A D | EVP_PBE_CipherInit.pod | 35 I<pass> of length I<passlen>. The PBE algorithm type and parameters are extracted 39 I<libctx> and property query I<propq> to select appropriate algorithm 42 =head2 PBE algorithm search 46 1. An algorithm type I<type> which can be: 52 EVP_PBE_TYPE_OUTER - A PBE algorithm 64 2. A I<pbe_nid> which can represent the algorithm identifier with parameters e.g. 65 B<NID_pbeWithSHA1AndRC2_CBC> or an algorithm class e.g. B<NID_pbes2>. 67 They return the algorithm's cipher ID I<pcnid>, digest ID I<pmnid> and a key 68 generation function for the algorithm I<pkeygen>. EVP_PBE_CipherInit_ex() also 75 =head2 PBE algorithm add [all …]
|
| H A D | OSSL_ALGORITHM.pod | 5 OSSL_ALGORITHM - OpenSSL Core type to define a fetchable algorithm 22 algorithm that a L<provider(7)> provides. Arrays of this type are returned 41 L<EVP_MD_fetch(3)>, etc) to find the desired algorithm. 44 fetched multiple ways. For example, the RSA algorithm has the following 72 The OpenSSL libraries use the first of the algorithm names as the main 73 or canonical name, on a per algorithm implementation basis. 82 algorithm implementation, and is used by the appropriate fetching 85 case multiple implementations of the same algorithm are available. 93 functions of a particular algorithm implementation. 97 A string with a short human-readable description of the algorithm. [all …]
|
| H A D | PKCS12_pack_p7encdata.pod | 23 type from the set of safeBags I<bags>. The algorithm ID in I<pbe_nid> can be 24 a PKCS#12 or PKCS#5 password based encryption algorithm, or a cipher algorithm. 25 If a cipher algorithm is passed, the PKCS#5 PBES2 algorithm will be used with 32 algorithm implementation.
|
| H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 10 - EVP_PKEY RSA-PSS algorithm support functions 55 they have exactly the same meaning as for the RSA algorithm. 64 EVP_PKEY_CTX_set_rsa_pss_keygen_md() restricts the digest algorithm the 67 passes the algorithm by name rather than by B<EVP_MD>. 69 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() restricts the MGF1 algorithm the 72 passes the algorithm by name rather than by B<EVP_MD>. 79 A context for the B<RSA-PSS> algorithm can be obtained by calling: 87 the public key algorithm.
|
| H A D | EVP_PKEY_CTX_new.pod | 8 - public key algorithm context functions 28 The EVP_PKEY_CTX_new() function allocates public key algorithm context using 31 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 34 The EVP_PKEY_CTX_new_from_name() function allocates a public key algorithm 41 The EVP_PKEY_CTX_new_from_pkey() function allocates a public key algorithm 43 algorithm specified by I<pkey> and the property query I<propquery>. None of the 64 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used 72 as "algorithm" in most cases, allowing either term to be used 74 I<algorithm> of the operations that use the keys are not the same,
|
| H A D | EVP_KEM_free.pod | 9 - Functions to manage EVP_KEM algorithm objects 15 EVP_KEM *EVP_KEM_fetch(OSSL_LIB_CTX *ctx, const char *algorithm, 32 EVP_KEM_fetch() fetches the implementation for the given B<algorithm> from any 34 scope of the given library context B<ctx> (see L<OSSL_LIB_CTX(3)>). The algorithm 49 algorithm that's identifiable with I<name>, otherwise 0. 58 EVP_KEM_get0_name() returns the algorithm name from the provided 61 algorithm definition is returned. Ownership of the returned string is retained 73 parameters that can be retrieved or set by a key encapsulation algorithm using
|
| H A D | EVP_SIGNATURE.pod | 11 - Functions to manage EVP_SIGNATURE algorithm objects 19 EVP_SIGNATURE *EVP_SIGNATURE_fetch(OSSL_LIB_CTX *ctx, const char *algorithm, 41 B<algorithm> from any provider offering it, within the criteria given 43 The algorithm will be one offering functions for performing signature related 58 algorithm that's identifiable with I<name>, otherwise 0. 68 EVP_SIGNATURE_get0_name() returns the algorithm name from the provided 71 algorithm definition is returned. Ownership of the returned string is retained 83 parameters that can be retrieved or set by a signature algorithm using
|
| H A D | EVP_ASYM_CIPHER_free.pod | 10 - Functions to manage EVP_ASYM_CIPHER algorithm objects 16 EVP_ASYM_CIPHER *EVP_ASYM_CIPHER_fetch(OSSL_LIB_CTX *ctx, const char *algorithm, 37 B<algorithm> from any provider offering it, within the criteria given 39 L<OSSL_LIB_CTX(3)>). The algorithm will be one offering functions for performing 54 algorithm that's identifiable with I<name>, otherwise 0. 64 EVP_ASYM_CIPHER_get0_name() returns the algorithm name from the provided 67 algorithm definition is returned. Ownership of the returned string is retained 79 parameters that can be retrieved or set by a key encryption algorithm using
|
| /freebsd-14.2/sys/dev/qat/qat_api/common/crypto/sym/ |
| H A D | lac_sym_cipher.c | 68 CpaCySymCipherAlgorithm algorithm = pSessionDesc->cipherAlgorithm; in LacCipher_PerformIvCheck() local 71 switch (algorithm) { in LacCipher_PerformIvCheck() 85 ivLenInBytes = LacSymQat_CipherIvSizeBytesGet(algorithm); in LacCipher_PerformIvCheck() 89 (LAC_CIPHER_IS_GCM(algorithm) && in LacCipher_PerformIvCheck() 93 LAC_CIPHER_IS_CCM(algorithm))) { in LacCipher_PerformIvCheck() 362 LacCipher_PerformParamCheck(CpaCySymCipherAlgorithm algorithm, in LacCipher_PerformParamCheck() argument 379 switch (algorithm) { in LacCipher_PerformParamCheck() 422 (LacSymQat_CipherBlockSizeBytesGet(algorithm) - in LacCipher_PerformParamCheck()
|
| /freebsd-14.2/crypto/openssl/doc/man7/ |
| H A D | openssl-glossary.pod | 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 48 An OpenSSL Provider that contains the most common OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have 101 criteria the first time the algorithm is used. 127 An OpenSSL Provider that contains no algorithm implementations. This can be 175 A property is a way of classifying and selecting algorithm implementations. [all …]
|
| H A D | EVP_PKEY-SM2.pod | 10 The B<SM2> algorithm was first defined by the Chinese national standard GM/T 12 an elliptic curve based algorithm. The current implementation in OpenSSL supports 15 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier 41 Note that the SM2 algorithm requires the presence of the public key for signatures, 59 Currently, the only valid algorithm name is B<sm2>. 67 a message with the SM2 signature algorithm and the SM3 hash algorithm:
|
| /freebsd-14.2/contrib/llvm-project/clang/lib/Tooling/Inclusions/Stdlib/ |
| H A D | StdSymbolMap.inc | 600 SYMBOL(all_of, std::, <algorithm>) 610 SYMBOL(any_of, std::, <algorithm>) 877 SYMBOL(clamp, std::, <algorithm>) 945 SYMBOL(copy, std::, <algorithm>) 980 SYMBOL(count, std::, <algorithm>) 1081 SYMBOL(equal, std::, <algorithm>) 1242 SYMBOL(fill, std::, <algorithm>) 1244 SYMBOL(find, std::, <algorithm>) 2099 SYMBOL(max, std::, <algorithm>) 2173 SYMBOL(min, std::, <algorithm>) [all …]
|
| /freebsd-14.2/sys/dev/qat/qat_api/common/crypto/sym/qat/ |
| H A D | lac_sym_qat.c | 257 icp_qat_hw_cipher_algo_t algorithm; in LacSymQat_UseSymConstantsTable() local 268 pSession, &algorithm, &mode, &dir, &key_convert); in LacSymQat_UseSymConstantsTable() 272 algorithm, in LacSymQat_UseSymConstantsTable() 289 icp_qat_hw_auth_algo_t algorithm; in LacSymQat_UseSymConstantsTable() local 308 &algorithm, in LacSymQat_UseSymConstantsTable() 313 algorithm, in LacSymQat_UseSymConstantsTable()
|
| /freebsd-14.2/crypto/heimdal/lib/roken/ |
| H A D | resolve.h | 142 unsigned algorithm; member 149 unsigned algorithm; member 163 unsigned algorithm; member 169 unsigned algorithm; member 177 unsigned algorithm; member
|
| /freebsd-14.2/contrib/ldns/ldns/ |
| H A D | dnssec_sign.h | 148 uint8_t algorithm, 270 uint8_t algorithm, 301 uint8_t algorithm, 357 uint8_t algorithm, 382 ldns_zone *ldns_zone_sign_nsec3(ldns_zone *zone, ldns_key_list *key_list, uint8_t algorithm, uint8_…
|