Lines Matching full:scheme
179 However, the scheme specified in the certificate must be compatible
361 Each cryptographic configuration involves selection of a signature scheme
362 and identification scheme, called a cryptotype,
407 scheme than the default, run
420 If it is necessary to use a different certificate scheme than the default,
424 .Fl c Ar scheme
426 .Ar scheme
431 using the same scheme and sign key, and soft link.
451 identity scheme is vulnerable to a middleman attack.
476 The PC scheme supports only one trusted host in the group.
497 In this scheme it is not possible to refresh
503 scheme proceed as in the
505 scheme to generate keys
526 scheme is independent
546 scheme proceed as in the
548 scheme to generate keys
573 scheme updates the
580 scheme, proceed as in the
582 scheme to generate keys
617 scheme is independent of keys and certificates,
629 .It Fl c Fl \-certificate Ns = Ar scheme
630 Select certificate signature encryption/message digest scheme.
632 .Ar scheme
652 scheme must be used.
681 parameters and key file for the Guillou\-Quisquater (GQ) identity scheme.
694 key file for the Schnorr (IFF) identity scheme.
703 This is used in the identity scheme parameter file names of
755 identity scheme.
757 Note: the PC identity scheme is not recommended for new installations.
791 identity scheme client parameter files.
809 identity scheme.
1021 .It Fl c Ar scheme , Fl \-certificate Ns = Ns Ar scheme
1022 certificate scheme.
1024 scheme is one of
1028 Select the certificate signature encryption/message digest scheme.
1057 Generate parameters and keys for the GQ identification scheme,
1066 Generate parameters for the IFF identification scheme, obsoleting
1144 trusted certificate (TC scheme).
1153 identification scheme.