/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-list.pod.in | 6 openssl-list - list algorithms and features 17 [B<-digest-algorithms>] 21 -}[B<-kdf-algorithms>] 22 [B<-mac-algorithms>] 25 [B<-cipher-algorithms>] 32 [B<-key-exchange-algorithms>] 33 [B<-kem-algorithms>] 34 [B<-signature-algorithms>] 35 [B<-asymcipher-algorithms>] 36 [B<-public-key-algorithms>] [all …]
|
H A D | openssl-speed.pod.in | 32 This command is used to test the performance of cryptographic algorithms. 55 To see the algorithms supported with this option, use 56 C<openssl list -digest-algorithms> or C<openssl list -cipher-algorithms> 119 If any I<algorithm> is given, then those algorithms are tested, otherwise a 130 There is no way to test the speed of any additional public key algorithms
|
H A D | openssl-pkcs8.pod.in | 37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms. 131 Some implementations may not support custom PRF algorithms and may require 166 encryption algorithms such as 56 bit DES. 168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 179 Various algorithms can be used with the B<-v1> command line option, 187 These algorithms were included in the original PKCS#5 v1.5 specification. 192 These algorithms are not mentioned in the original PKCS#5 v1.5 specification 199 These algorithms use the PKCS#12 password based encryption algorithm and 200 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used. 254 algorithms are concerned.
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
H A D | list.pod | 6 list - list algorithms and features 15 [B<-digest-algorithms>] 17 [B<-cipher-algorithms>] 18 [B<-public-key-algorithms>] 24 This command is used to generate list of algorithms or disabled 49 =item B<-digest-algorithms> 51 Display a list of message digest algorithms. 61 =item B<-cipher-algorithms> 63 Display a list of cipher algorithms. 68 =item B<-public-key-algorithms> [all …]
|
H A D | speed.pod | 25 This command is used to test the performance of cryptographic algorithms. 26 To see the list of supported algorithms, use the I<list --digest-commands> 43 for all available algorithms. 88 =item B<[zero or more test algorithms]> 90 If any options are given, B<speed> tests those algorithms, otherwise a
|
H A D | pkcs8.pod | 38 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms. 134 Some implementations may not support custom PRF algorithms and may require 148 for all available algorithms. 191 encryption algorithms such as 56 bit DES. 204 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 213 =head1 PKCS#5 v1.5 and PKCS#12 algorithms. 215 Various algorithms can be used with the B<-v1> command line option, 223 These algorithms were included in the original PKCS#5 v1.5 specification. 228 These algorithms are not mentioned in the original PKCS#5 v1.5 specification 235 These algorithms use the PKCS#12 password based encryption algorithm and [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 27 algorithms for B<ctx> or B<ssl>. The array B<slist> of length B<slistlen> 29 algorithms. 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 40 signature algorithms related to client authentication, otherwise they are 50 If an application wishes to allow the setting of signature algorithms 54 The signature algorithms set by a client are used directly in the supported 57 The supported signature algorithms set by a server are not sent to the 58 client but are used to determine the set of shared signature algorithms 62 The client authentication signature algorithms set by a server are sent [all …]
|
H A D | OpenSSL_add_all_algorithms.pod | 6 add algorithms to internal table 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 27 OpenSSL_add_all_digests() adds all digest algorithms to the table. 29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including 33 password based encryption algorithms.
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 50 signature algorithms can be determined: which can be zero. 53 signature algorithms: after a client hello (for servers) or a certificate 57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. 61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_CTX_set1_sigalgs.pod | 8 SSL_set1_client_sigalgs_list - set supported signature algorithms 27 algorithms for B<ctx> or B<ssl>. The array B<slist> of length B<slistlen> 29 algorithms. 32 signature algorithms for B<ctx> or B<ssl>. The B<str> parameter 40 signature algorithms related to client authentication, otherwise they are 50 If an application wishes to allow the setting of signature algorithms 54 The signature algorithms set by a client are used directly in the supported 57 The supported signature algorithms set by a server are not sent to the 58 client but are used to determine the set of shared signature algorithms 62 The client authentication signature algorithms set by a server are sent [all …]
|
H A D | OpenSSL_add_all_algorithms.pod | 6 add algorithms to internal table 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 27 OpenSSL_add_all_digests() adds all digest algorithms to the table. 29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including 33 password based encryption algorithms.
|
H A D | SSL_get_shared_sigalgs.pod | 5 SSL_get_shared_sigalgs, SSL_get_sigalgs - get supported signature algorithms 22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index 29 information about all signature algorithms supported by B<s> in the order 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 50 signature algorithms can be determined: which can be zero. 53 signature algorithms: after a client hello (for servers) or a certificate 57 Only TLS 1.2, TLS 1.3 and DTLS 1.2 currently support signature algorithms. 61 The shared signature algorithms returned by SSL_get_shared_sigalgs() are
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
H A D | 01-simple.conf | 6 test-1 = 1-Server signature algorithms bug 33 [1-Server signature algorithms bug] 34 ssl_conf = 1-Server signature algorithms bug-ssl 36 [1-Server signature algorithms bug-ssl] 37 server = 1-Server signature algorithms bug-server 38 client = 1-Server signature algorithms bug-client 40 [1-Server signature algorithms bug-server] 46 [1-Server signature algorithms bug-client]
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/ |
H A D | 01-simple.cnf | 6 test-1 = 1-Server signature algorithms bug 34 [1-Server signature algorithms bug] 35 ssl_conf = 1-Server signature algorithms bug-ssl 37 [1-Server signature algorithms bug-ssl] 38 server = 1-Server signature algorithms bug-server 39 client = 1-Server signature algorithms bug-client 41 [1-Server signature algorithms bug-server] 47 [1-Server signature algorithms bug-client]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/otp/ |
H A D | otp.c | 44 static OtpAlgorithm algorithms[] = { variable 55 for (i = 0; i < sizeof(algorithms)/sizeof(*algorithms); ++i) in otp_find_alg() 56 if (strcmp (name, algorithms[i].name) == 0) in otp_find_alg() 57 return &algorithms[i]; in otp_find_alg()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | OSSL_PROVIDER-legacy.pod | 9 The OpenSSL legacy provider supplies OpenSSL implementations of algorithms 10 that have been deemed legacy. Such algorithms have commonly fallen out of 14 We can consider this the retirement home of cryptographic algorithms. 37 The OpenSSL legacy provider supports these operations and algorithms: 57 Not all of these symmetric cipher algorithms are enabled by default. 94 When algorithms for other operations start appearing, the
|
H A D | evp.pod | 29 asymmetric algorithms. To create a new EVP_PKEY see 69 All the symmetric algorithms (ciphers), digests and asymmetric algorithms 70 (public key algorithms) can be replaced by ENGINE modules providing alternative 76 Although low-level algorithm specific functions exist for many algorithms 78 versions of new algorithms cannot be accessed using the low-level functions. 79 Also makes code harder to adapt to new algorithms and some options are not
|
H A D | fips_module.pod | 51 use the FIPS module for cryptographic algorithms by default. 99 enabled to prevent accidental use of non-FIPS validated algorithms via broken 106 cryptographic algorithms (and therefore does not impact the validation status of 107 any cryptographic operations), but does include other supporting algorithms that 132 The algorithms available in the FIPS module are a subset of the algorithms 135 If any applications attempt to use any algorithms that are not present, 217 This loads a sub-set of algorithms that are also available in the default 219 with the FIPS provider. For example this contains algorithms for encoding and 268 All algorithms implemented in a provider have this property set on them. 270 There is also the C<fips> property. All FIPS algorithms match against the [all …]
|
H A D | EVP_CIPHER-DES.pod | 13 The following algorithms are available in the FIPS provider as well as the 24 The following algorithms are available in the default provider, but not the 43 The following algorithms are available in the legacy provider:
|
H A D | crypto.pod | 14 cryptographic algorithms used in various Internet standards. The services 27 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 36 Different algorithms can be grouped together by their purpose. For example there 37 are algorithms for encryption, and different algorithms for digesting data. 234 Internally OpenSSL caches similar algorithms on the first fetch 283 that some algorithms have aliases. So "SHA256" and "SHA2-256" are synonymous: 346 The algorithms available in each of these providers may vary due to build time 348 currently available algorithms. 350 The names of the algorithms shown from L<openssl-list(1)> can be used as an 353 algorithms available in each of the providers. [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man7/ |
H A D | evp.pod | 29 asymmetric algorithms. To create a new EVP_PKEY see 68 All the symmetric algorithms (ciphers), digests and asymmetric algorithms 69 (public key algorithms) can be replaced by ENGINE modules providing alternative 75 Although low-level algorithm specific functions exist for many algorithms 77 versions of new algorithms cannot be accessed using the low-level functions. 78 Also makes code harder to adapt to new algorithms and some options are not
|
/netbsd-src/external/mpl/bind/dist/contrib/scripts/ |
H A D | check-secure-delegation.pl.in | 32 my %algorithms = (); 49 $algorithms{"$words[5]"} = 1; 104 foreach $alg ( keys %algorithms ) {
|
/netbsd-src/external/bsd/libfido2/dist/src/ |
H A D | info.c | 314 return (decode_algorithms(val, &ci->algorithms)); in parse_reply_element() 440 fido_algo_array_free(&ci->algorithms); in fido_cbor_info_reset() 604 return (ci->algorithms.len); in fido_cbor_info_algorithm_count() 610 if (idx >= ci->algorithms.len) in fido_cbor_info_algorithm_type() 613 return (ci->algorithms.ptr[idx].type); in fido_cbor_info_algorithm_type() 619 if (idx >= ci->algorithms.len) in fido_cbor_info_algorithm_cose() 622 return (ci->algorithms.ptr[idx].cose); in fido_cbor_info_algorithm_cose()
|
/netbsd-src/external/mpl/bind/dist/doc/notes/ |
H A D | notes-9.18.6.rst |
|
/netbsd-src/crypto/external/bsd/openssl/dist/ |
H A D | README-PROVIDERS.md | 43 The legacy provider is a collection of legacy algorithms that are either no 45 However, some applications may need to use these algorithms for backwards 48 may find that some algorithms are no longer available unless they load the 58 from the default provider, consisting of algorithms conforming to FIPS standards. 68 The base provider contains a small sub-set of non-cryptographic algorithms 69 available in the default provider. For example, it contains algorithms to
|