/onnv-gate/usr/src/common/openssl/doc/crypto/ |
H A D | OpenSSL_add_all_algorithms.pod | 6 add algorithms to internal table 20 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 23 OpenSSL_add_all_digests() adds all digest algorithms to the table. 25 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 28 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including 29 password based encryption algorithms. 42 An application does not need to add algorithms to use them explicitly, for example 44 needs to lookup algorithms. 48 cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME libraries. 51 Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a
|
H A D | EVP_VerifyInit.pod | 52 Due to the link between message digests and public key algorithms the correct 54 algorithms and associated public key algorithms appears in
|
H A D | EVP_SignInit.pod | 58 Due to the link between message digests and public key algorithms the correct 60 algorithms and associated public key algorithms appears in
|
H A D | d2i_PKCS8PrivateKey.pod | 35 PKCS#5 v1.5 and PKCS#5 v2.0 password based encryption algorithms. 44 unknown algorithms will occur if an attempt is made to decrypt a private key.
|
H A D | crypto.pod | 12 algorithms used in various Internet standards. The services provided 20 individual algorithms.
|
H A D | EVP_DigestInit.pod | 128 algorithms may not be retained in future versions of OpenSSL. 132 algorithms respectively. The associated signature algorithm is RSA in each case. 135 algorithms but using DSS (DSA) for the signature algorithm. 172 SHA1 is the digest of choice for new applications. The other digest algorithms 233 The link between digests and signing algorithms results in a situation where
|
H A D | evp.pod | 27 All the symmetric algorithms (ciphers) and digests can be replaced by ENGINE
|
H A D | PKCS7_sign.pod | 51 algorithms: triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2. If any 52 of these algorithms is disabled then it will not be included.
|
H A D | PKCS7_decrypt.pod | 21 function or errors about unknown algorithms will occur.
|
H A D | EVP_BytesToKey.pod | 39 Newer applications should use more standard algorithms such as PKCS#5
|
/onnv-gate/usr/src/common/openssl/ssl/ |
H A D | ssl_ciph.c | 268 switch (c->algorithms & SSL_ENC_MASK) in ssl_cipher_get_evp() 311 switch (c->algorithms & SSL_MAC_MASK) in ssl_cipher_get_evp() 411 if ((c != NULL) && c->valid && !(c->algorithms & mask)) in ssl_cipher_collect_ciphers() 419 printf("\t%d: %s %lx %lx\n",i,c->name,c->id,c->algorithms); in ssl_cipher_collect_ciphers() 475 !(cipher_aliases[i].algorithms & mask)) in ssl_cipher_collect_aliases() 485 static void ssl_cipher_apply_rule(unsigned long algorithms, unsigned long mask, in ssl_cipher_apply_rule() argument 496 rule, algorithms, mask, algo_strength, mask_strength, in ssl_cipher_apply_rule() 517 ma = mask & cp->algorithms; in ssl_cipher_apply_rule() 521 …o_strength = %08lx\nMask = %08lx Mask_strength %08lx\n", cp->name, cp->algorithms, cp->algo_streng… in ssl_cipher_apply_rule() 522 …printf("ma = %08lx ma_s %08lx, ma&algo=%08lx, ma_s&algos=%08lx\n", ma, ma_s, ma&algorithms, ma_s&a… in ssl_cipher_apply_rule() [all …]
|
H A D | d1_srvr.c | 309 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) in IMPLEMENT_dtls1_meth_func() 322 l=s->s3->tmp.new_cipher->algorithms; in IMPLEMENT_dtls1_meth_func() 373 ((s->s3->tmp.new_cipher->algorithms & SSL_aNULL) && in IMPLEMENT_dtls1_meth_func() 378 (s->s3->tmp.new_cipher->algorithms & SSL_aKRB5)) in IMPLEMENT_dtls1_meth_func() 798 type=s->s3->tmp.new_cipher->algorithms & SSL_MKEY_MASK; in dtls1_send_server_key_exchange() 903 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) in dtls1_send_server_key_exchange() 1128 (s->s3->tmp.new_cipher->algorithms in dtls1_send_server_certificate()
|
H A D | s3_clnt.c | 268 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) in IMPLEMENT_ssl3_meth_func() 329 l=s->s3->tmp.new_cipher->algorithms; in IMPLEMENT_ssl3_meth_func() 888 && (s->s3->tmp.new_cipher->algorithms & (SSL_MKEY_MASK|SSL_AUTH_MASK)) in ssl3_get_server_certificate() 915 need_cert = ((s->s3->tmp.new_cipher->algorithms in ssl3_get_server_certificate() 923 s->s3->tmp.new_cipher->algorithms, need_cert); in ssl3_get_server_certificate() 1060 alg=s->s3->tmp.new_cipher->algorithms; in ssl3_get_key_exchange() 1481 l=s->s3->tmp.new_cipher->algorithms; in ssl3_get_certificate_request() 1659 l=s->s3->tmp.new_cipher->algorithms; in ssl3_send_client_key_exchange() 2322 algs=s->s3->tmp.new_cipher->algorithms; in ssl3_check_cert_and_algorithm()
|
H A D | s3_srvr.c | 304 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) in IMPLEMENT_ssl3_meth_func() 317 l=s->s3->tmp.new_cipher->algorithms; in IMPLEMENT_ssl3_meth_func() 377 ((s->s3->tmp.new_cipher->algorithms & SSL_aNULL) && in IMPLEMENT_ssl3_meth_func() 382 (s->s3->tmp.new_cipher->algorithms & SSL_aKRB5)) in IMPLEMENT_ssl3_meth_func() 992 if (c->algorithms & SSL_eNULL) in ssl3_get_client_hello() 1164 type=s->s3->tmp.new_cipher->algorithms & SSL_MKEY_MASK; in ssl3_send_server_key_exchange() 1396 if (!(s->s3->tmp.new_cipher->algorithms & SSL_aNULL)) in ssl3_send_server_key_exchange() 1693 l=s->s3->tmp.new_cipher->algorithms; in ssl3_get_client_key_exchange() 2535 (s->s3->tmp.new_cipher->algorithms in ssl3_send_server_certificate()
|
H A D | d1_lib.c | 205 if ((ciph->algorithms&SSL_ENC_MASK) == SSL_RC4) in dtls1_get_cipher()
|
H A D | t1_enc.c | 251 printf("\talg= %ld, comp= %p\n", s->s3->tmp.new_cipher->algorithms, in tls1_change_cipher_state() 507 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) in tls1_setup_key_block() 511 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) in tls1_setup_key_block()
|
/onnv-gate/usr/src/common/openssl/doc/apps/ |
H A D | speed.pod | 39 This command is used to test the performance of cryptographic algorithms. 50 for all available algorithms. 52 =item B<[zero or more test algorithms]> 54 If any options are given, B<speed> tests those algorithms, otherwise all of
|
H A D | pkcs8.pod | 30 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms. 109 This option enables the use of PKCS#5 v2.0 algorithms. Normally PKCS#8 113 the B<-v2> option PKCS#5 v2.0 algorithms are used which can use any 124 list of possible algorithms is included below. 131 for all available algorithms. 148 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 156 Some software may use PKCS#12 password based encryption algorithms 164 =head1 PKCS#5 v1.5 and PKCS#12 algorithms. 166 Various algorithms can be used with the B<-v1> command line option, 174 These algorithms were included in the original PKCS#5 v1.5 specification. [all …]
|
H A D | ciphers.pod | 30 authentication, encryption and mac algorithms used along with any key size 71 algorithms. 76 algorithms. 136 "low" encryption cipher suites, currently those using 64 or 56 bit encryption algorithms 141 export encryption algorithms. Including 40 and 56 bits algorithms. 145 40 bit export encryption algorithms 149 56 bit export encryption algorithms. 160 DH algorithms. These cipher suites are vulnerable to a "man in the middle" 192 FORTEZZA algorithms. Not implemented.
|
H A D | pkcs12.pod | 104 output additional information about the PKCS#12 file structure, algorithms used and 204 certificates to be selected. Although any PKCS#5 v1.5 or PKCS#12 algorithms 205 can be selected it is advisable only to use PKCS#12 algorithms. See the list 221 these options affect the iteration counts on the MAC and key algorithms. 269 The B<-keypbe> and B<-certpbe> algorithms allow the precise encryption 270 algorithms for private keys and certificates to be specified. Normally 274 description of all algorithms is contained in the B<pkcs8> manual page.
|
H A D | gendsa.pod | 46 for all available algorithms.
|
/onnv-gate/usr/src/cmd/vi/misc/ |
H A D | del.h.cb | 33 ** defined in /etc/termcap and the delay algorithms on a 37 ** algorithms. Algorithms which are not fixed delays (such
|
/onnv-gate/usr/src/common/openssl/doc/ssl/ |
H A D | SSL_library_init.pod | 6 - initialize SSL library by registering algorithms
|
/onnv-gate/usr/src/common/openssl/ |
H A D | README | 51 MD5 and MD2 message digest algorithms, fast implementations, 52 SHA (SHA-0) and SHA-1 message digest algorithms, 96 Various companies hold various patents for various algorithms in various 98 of any algorithms is legal by checking if there are any patents in your
|
/onnv-gate/usr/src/cmd/cmd-inet/etc/ |
H A D | ipsecalgs | 41 ## Note: Parameters and flags only apply to certain algorithms.
|