Lines Matching +full:128 +full:a

20 [B<-a>]
22 [B<-A>]
63 Print out a usage message.
94 =item B<-a>
100 When the B<-A> option not given,
101 on encoding a newline is inserted after each 64 characters, and
102 on decoding a newline is expected among the first 1024 bytes of input.
106 Same as B<-a>
108 =item B<-A>
110 If the B<-a> option is set then base64 encoding produces output without any
112 Therefore it can be helpful to use the B<-A> option when decoding unknown input.
132 Use a given number of iterations on the password in deriving the encryption key.
138 Use PBKDF2 algorithm with a default iteration count of 10000
143 Don't use a salt in the key derivation routines. This option B<SHOULD NOT> be
154 The actual salt to use: this must be represented as a string of hex digits.
160 The actual key to use: this must be represented as a string comprised only
162 using the B<-iv> option. When both a key and a password are specified, the
169 The actual IV to use: this must be represented as a string comprised only
171 IV must explicitly be defined. When a password is being specified using
223 Use the L<openssl-list(1)> command to get a list of supported ciphers.
235 A password will be prompted for to derive the key and IV if necessary.
238 from a password unless you want compatibility with previous versions of
246 When the salt is generated at random (that means when encrypting using a
251 implications if not used correctly. A beginner is advised to just use
252 a strong block cipher, such as AES, in CBC mode.
255 block padding. This allows a rudimentary integrity or password check to
257 is better than 1 in 256 it isn't a very good test.
259 If padding is disabled then the input data must be a multiple of the cipher
264 Blowfish and RC5 algorithms use a 128 bit key.
270 is expected to not have a prepended salt value.
285 a list of ciphers, supported by your version of OpenSSL, including
292 When this command is used in a pipeline, the receiving end will not be
300 functionality cannot be removed with a stable release branch.
302 modes or other modes, L<openssl-cms(1)> is recommended, as it provides a
352 rc2-cbc 128 bit RC2 in CBC mode
354 rc2-cfb 128 bit RC2 in CFB mode
355 rc2-ecb 128 bit RC2 in ECB mode
356 rc2-ofb 128 bit RC2 in OFB mode
360 rc4 128 bit RC4
383 aes-[128|192|256]-cbc 128/192/256 bit AES in CBC mode
384 aes[128|192|256] Alias for aes-[128|192|256]-cbc
385 aes-[128|192|256]-cfb 128/192/256 bit AES in 128 bit CFB mode
386 aes-[128|192|256]-cfb1 128/192/256 bit AES in 1 bit CFB mode
387 aes-[128|192|256]-cfb8 128/192/256 bit AES in 8 bit CFB mode
388 aes-[128|192|256]-ctr 128/192/256 bit AES in CTR mode
389 aes-[128|192|256]-ecb 128/192/256 bit AES in ECB mode
390 aes-[128|192|256]-ofb 128/192/256 bit AES in OFB mode
392 aria-[128|192|256]-cbc 128/192/256 bit ARIA in CBC mode
393 aria[128|192|256] Alias for aria-[128|192|256]-cbc
394 aria-[128|192|256]-cfb 128/192/256 bit ARIA in 128 bit CFB mode
395 aria-[128|192|256]-cfb1 128/192/256 bit ARIA in 1 bit CFB mode
396 aria-[128|192|256]-cfb8 128/192/256 bit ARIA in 8 bit CFB mode
397 aria-[128|192|256]-ctr 128/192/256 bit ARIA in CTR mode
398 aria-[128|192|256]-ecb 128/192/256 bit ARIA in ECB mode
399 aria-[128|192|256]-ofb 128/192/256 bit ARIA in OFB mode
401 camellia-[128|192|256]-cbc 128/192/256 bit Camellia in CBC mode
402 camellia[128|192|256] Alias for camellia-[128|192|256]-cbc
403 camellia-[128|192|256]-cfb 128/192/256 bit Camellia in 128 bit CFB mode
404 camellia-[128|192|256]-cfb1 128/192/256 bit Camellia in 1 bit CFB mode
405 camellia-[128|192|256]-cfb8 128/192/256 bit Camellia in 8 bit CFB mode
406 camellia-[128|192|256]-ctr 128/192/256 bit Camellia in CTR mode
407 camellia-[128|192|256]-ecb 128/192/256 bit Camellia in ECB mode
408 camellia-[128|192|256]-ofb 128/192/256 bit Camellia in OFB mode
412 Just base64 encode a binary file:
420 Encrypt a file using AES-128 using a prompted password
425 Decrypt a file using a supplied password:
430 Encrypt a file then base64 encode it (so it can be sent via mail for example)
433 openssl enc -aes-256-ctr -pbkdf2 -a -in file.txt -out file.aes256
435 Base64 decode a file then decrypt it using a password supplied in a file:
437 openssl enc -aes-256-ctr -pbkdf2 -d -a -in file.aes256 -out file.txt \
442 The B<-A> option when used with large files doesn't work properly.
443 On the other hand, when base64 decoding without the B<-A> option,
444 if the first 1024 bytes of input do not include a newline character
447 The B<openssl enc> command only supports a fixed number of algorithms with
448 certain parameters. So if, for example, you want to use RC2 with a
464 this file except in compliance with the License. You can obtain a copy