Lines Matching full:cipher

164 \&\- EVP cipher routines
172 \& int EVP_CIPHER_up_ref(EVP_CIPHER *cipher);
173 \& void EVP_CIPHER_free(EVP_CIPHER *cipher);
203 \& int EVP_CipherInit_SKEY(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
225 \& int EVP_CIPHER_can_pipeline(const EVP_CIPHER *cipher, int enc);
227 \& const EVP_CIPHER *cipher,
232 \& const EVP_CIPHER *cipher,
257 \& int EVP_CIPHER_is_a(const EVP_CIPHER *cipher, const char *name);
258 \& int EVP_CIPHER_names_do_all(const EVP_CIPHER *cipher,
261 \& const char *EVP_CIPHER_get0_name(const EVP_CIPHER *cipher);
262 \& const char *EVP_CIPHER_get0_description(const EVP_CIPHER *cipher);
263 \& const OSSL_PROVIDER *EVP_CIPHER_get0_provider(const EVP_CIPHER *cipher);
269 \& int EVP_CIPHER_get_type(const EVP_CIPHER *cipher);
276 \& int EVP_CIPHER_get_params(EVP_CIPHER *cipher, OSSL_PARAM params[]);
279 \& const OSSL_PARAM *EVP_CIPHER_gettable_params(const EVP_CIPHER *cipher);
280 \& const OSSL_PARAM *EVP_CIPHER_settable_ctx_params(const EVP_CIPHER *cipher);
281 \& const OSSL_PARAM *EVP_CIPHER_gettable_ctx_params(const EVP_CIPHER *cipher);
300 \& void (*fn)(EVP_CIPHER *cipher, void *arg),
339 The EVP cipher routines are a high-level interface to certain
342 The \fBEVP_CIPHER\fR type is a structure for cipher method implementation.
345 Fetches the cipher implementation for the given \fIalgorithm\fR from any provider
362 Allocates and returns a cipher context.
365 Clears all information from a cipher context and frees any allocated memory
367 after all operations using a cipher are complete so sensitive information does
371 Can be used to duplicate the cipher state from \fIin\fR. This is useful
376 Can be used to copy the cipher state from \fIin\fR to \fIout\fR.
383 Performs cipher-specific control actions on context \fIctx\fR. The control command
386 may apply depending on the control type and cipher implementation.
397 Retrieves the requested list of algorithm \fIparams\fR from a CIPHER \fIcipher\fR.
401 Retrieves the requested list of \fIparams\fR from CIPHER context \fIctx\fR.
405 Sets the list of \fIparams\fR into a CIPHER context \fIctx\fR.
427 Sets up cipher context \fIctx\fR for encryption with cipher \fItype\fR. \fIctx\fR \fBMUST NOT\fR be…
432 on the cipher. The parameters \fIparams\fR will be set on the context after
435 which have \fItype\fR set to NULL. This is done when the default cipher parameters
461 For wrap cipher modes, the amount of data written can be anything
474 one cipher block. The number of bytes written is placed in \fIoutl\fR. After
499 Clears all information from a cipher context and free up any allocated memory
506 \&\fBEVP_CipherInit_ex()\fR except if the \fItype\fR is not a fetched cipher they use the
519 For legacy ciphers \- If the cipher doesn't have the flag
521 \&\fBEVP_CIPHER_get_block_size()\fR. If it isn't, the result is undefined. If the cipher
530 cipher pipelining. If the cipher supports pipelining, it returns 1, otherwise 0.
534 Cipher pipelining support allows an application to submit multiple chunks of
547 cipher supports pipelining. These functions are analogous to
572 Returns an \fBEVP_CIPHER\fR structure when passed a cipher name, a cipher \fBNID\fR or
581 since it does not attempt to "fetch" an implementation of the cipher.
586 When the cipher objects returned by these functions are used (such as in a call
587 to \fBEVP_EncryptInit_ex()\fR) an implementation of the cipher will be implicitly
594 The cipher objects returned from these functions do not need to be freed with
598 Return the NID of a cipher when passed an \fBEVP_CIPHER\fR or \fBEVP_CIPHER_CTX\fR
601 nid is unknown or if the cipher has not been properly initialized via a call to
608 fetched cipher has been assigned to the \fIctx\fR. It is recommended to use
622 Return the key length of a cipher when passed an \fBEVP_CIPHER\fR or
625 a given cipher, the value of \fBEVP_CIPHER_CTX_get_key_length()\fR may be different for
629 Sets the key length of the cipher context.
630 If the cipher is a fixed length cipher then attempting to set the key
634 Return the IV length of a cipher when passed an \fBEVP_CIPHER\fR or
635 \&\fBEVP_CIPHER_CTX\fR. It will return zero if the cipher does not use an IV, if
636 the cipher has not yet been initialized within the \fBEVP_CIPHER_CTX\fR, or if the
637 passed cipher is NULL. The constant \fBEVP_MAX_IV_LENGTH\fR is the maximum IV
641 Returns the tag length of an AEAD cipher when passed a \fBEVP_CIPHER_CTX\fR. It will
642 return zero if the cipher does not support a tag. It returns a default value if
646 Return the block size of a cipher when passed an \fBEVP_CIPHER\fR or
649 A value of 0 is returned if, with \fBEVP_CIPHER_get_block_size()\fR, the cipher
655 Return the type of the passed cipher or context. This "type" is the actual NID
656 of the cipher OBJECT IDENTIFIER and as such it ignores the cipher parameters
657 (40 bit RC2 and 128 bit RC2 have the same NID). If the cipher does not have an
662 Returns 1 if \fIcipher\fR is an implementation of an algorithm that's identifiable
663 with \fIname\fR, otherwise 0. If \fIcipher\fR is a legacy cipher (it's the return
665 \&\fBEVP_CIPHER_fetch()\fR), only cipher names registered with the default library
669 Return the name of the passed cipher or context. For fetched ciphers with
674 Traverses all names for the \fIcipher\fR, and calls \fIfn\fR with each name and
678 Returns a description of the cipher, meant for display and human consumption.
679 The description is at the discretion of the cipher implementation.
691 Return the block cipher mode:
695 If the cipher is a stream cipher then EVP_CIPH_STREAM_CIPHER is returned.
698 Returns any flags associated with the cipher. See "FLAGS"
702 Gets or sets the cipher specific "num" parameter for the associated \fIctx\fR.
714 Sets the AlgorithmIdentifier "parameter" based on the passed cipher. This will
715 typically include any parameters and an IV. The cipher IV (if any) must be set
716 when this call is made. This call should be made before the cipher is actually
718 This function may fail if the cipher does not have any ASN1 support, or if an
719 uninitialized cipher is passed to it.
722 Sets the cipher parameters based on an ASN1 AlgorithmIdentifier "parameter".
723 The precise effect depends on the cipher. In the case of \fBRC2\fR, for example,
725 This function should be called after the base cipher type is set but before
729 possible for this function to fail if the cipher does not have any ASN1 support
734 Generates a random key of the appropriate length based on the cipher context.
754 Gets the mode for the associated cipher algorithm \fIcipher\fR.
759 Gets the key length for the associated cipher algorithm \fIcipher\fR.
763 Gets the IV length for the associated cipher algorithm \fIcipher\fR.
767 Gets the block size for the associated cipher algorithm \fIcipher\fR.
769 Note that the block size for a cipher may be different to the block size for
772 stream cipher), even though AES has a block size of 16.
776 Gets 1 if this is an AEAD cipher algorithm, otherwise it gets 0.
777 Use (EVP_CIPHER_get_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) to retrieve the
781 Gets 1 if the cipher algorithm \fIcipher\fR has a custom IV, otherwise it gets 0.
784 Use (EVP_CIPHER_get_flags(cipher) & EVP_CIPH_CUSTOM_IV) to retrieve the
788 Gets 1 if the cipher algorithm \fIcipher\fR uses ciphertext stealing,
790 This is currently used to indicate that the cipher is a one shot that only
792 Use (EVP_CIPHER_get_flags(cipher) & EVP_CIPH_FLAG_CTS) to retrieve the
796 Gets 1 if the cipher algorithm \fIcipher\fR supports interleaving of crypto blocks,
799 Use (EVP_CIPHER_get_flags(cipher) & EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK) to retrieve the
803 Gets 1 if the cipher algorithm \fIcipher\fR supports the gettable EVP_CIPHER_CTX
808 Gets 1 if the cipher algorithm \fIcipher\fR implementation supports only
817 Gets or sets the padding mode for the cipher context \fIctx\fR.
822 Gets or sets the cipher specific "num" parameter for the cipher context \fIctx\fR.
828 Gets or sets the key length for the cipher context \fIctx\fR.
833 Gets or sets the AEAD tag for the associated cipher context \fIctx\fR.
837 Gets or sets the AEAD tag when using cipher pipelining. The pointer must
843 Gets or sets the effective keybits used for a RC2 cipher.
847 Gets or sets the number of rounds to be used for a cipher.
848 This is used by the RC5 cipher.
851 Used to get the DER encoded AlgorithmIdentifier from the cipher
857 the cipher implementation.
866 Gets or sets the cipher text stealing mode. For all modes the output size is the
874 The NIST variant of cipher text stealing.
876 using a "AES-XXX-CBC" or "CAMELLIA-XXX-CBC" cipher otherwise the second last
877 cipher text block is a partial block.
881 using a "AES-XXX-CBC" or "CAMELLIA-XXX-CBC" cipher, otherwise it is the same as
885 The Kerberos5 variant of cipher text stealing which always swaps the last
886 cipher text block with the previous block (which may be a partial or full block
888 then this is equivalent to using a "AES-XXX-CBC" or "CAMELLIA-XXX-CBC" cipher.
899 cipher operation (either 4 or 8 records).
905 Gets the IV length for the cipher context \fIctx\fR.
910 Gets the IV used to initialize the associated cipher context \fIctx\fR.
914 Gets the updated pseudo-IV state for the associated cipher context, e.g.,
922 cipher context \fIctx\fR. This is currently only supported by DES and 3DES (which set
926 Gets the tag length to be used for an AEAD cipher for the associated cipher
933 tag for the associated cipher context \fIctx\fR.
945 Gets the maximum record length for a TLS1 multiblock cipher operation.
958 This may be used after calling a cipher final operation such as
964 This may be used by GCM ciphers after calling a cipher final operation such
967 cipher initialisation call such as \fBEVP_CipherInit_ex()\fR.
977 Sets the speed option for the associated cipher context. This is only supported
997 Sets TLSv1.2 AAD information for the associated cipher context \fIctx\fR.
1002 Sets the fixed portion of an IV for an AEAD cipher used in a TLS record
1003 encryption/ decryption for the associated cipher context.
1008 Setting a TLS fixed IV changes a cipher to encrypt/decrypt TLS records.
1014 cipher in use and will be defined in the RFC for the relevant ciphersuite.
1024 The cipher implementation should generate the explicit IV and write it to the
1039 Triggers a multiblock TLS1 encrypt operation for a TLS1 aware cipher that
1041 The cipher performs both the MAC and encrypt stages and constructs the record
1048 Supplies the data to encrypt for a TLS1 multiblock cipher operation.
1051 Sets the maximum send fragment size for a TLS1 multiblock cipher operation.
1056 Sets the authenticated additional data used by a TLS1 multiblock cipher operation.
1099 If required this parameter should be set early via an cipher encrypt init
1220 cipher handled wrapping.
1285 \&\fBEVP_CIPH_FLAG_CUSTOM_CIPHER\fR is not set for the cipher, or if the cipher has
1289 AAD for an AEAD cipher, if the flag \fBEVP_CIPH_FLAG_CUSTOM_CIPHER\fR is set for
1290 the cipher.
1292 \&\fBEVP_CIPHER_can_pipeline()\fR returns 1 if the cipher can be used in a pipeline, 0 otherwise.
1316 length, zero if the cipher does not use an IV and a negative value on error.
1318 \&\fBEVP_CIPHER_CTX_get_tag_length()\fR return the tag length or zero if the cipher
1322 cipher's OBJECT IDENTIFIER or NID_undef if it has no defined
1345 .SH "CIPHER LISTING"
1346 .IX Header "CIPHER LISTING"
1353 Null cipher: does nothing.
1371 \&\fBEVP_CipherUpdate()\fR depends on the cipher used. Stream ciphers, such as ChaCha20
1462 the cipher text. Instead, it is stored as the tag within the EVP_CIPHER_CTX.
1466 This differs from RFC5297 in that the cipher output from encryption, and
1467 the cipher input to decryption, does not contain the SIV. This also means
1468 that the plain text and cipher text lengths are identical.
1517 transparent to the cipher used and much more flexible. Additionally, the
1712 \& EVP_CIPHER *cipher = NULL;
1716 \& cipher = EVP_CIPHER_fetch(NULL, "AES\-256\-CBC\-CTS", NULL);
1717 \& if (ctx == NULL || cipher == NULL)
1728 \& if (!EVP_CipherInit_ex2(ctx, cipher, key, iv, encrypt, params))
1738 \& EVP_CIPHER_free(cipher);
1748 \&\fBprovider\-cipher\fR\|(7),
1749 \&\fBlife_cycle\-cipher\fR\|(7)