Lines Matching +full:128 +full:a
19 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
20 .\" double quote, and \*(R" will give a right double quote. \*(C+ will
21 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
122 . ds o a
153 [\fB\-a\fR]
155 [\fB\-A\fR]
195 Print out a usage message.
218 .IP "\fB\-a\fR" 4
219 .IX Item "-a"
225 Same as \fB\-a\fR
226 .IP "\fB\-A\fR" 4
227 .IX Item "-A"
228 If the \fB\-a\fR option is set then base64 process the data on one line.
244 Use a given number of iterations on the password in deriving the encryption key.
249 Use \s-1PBKDF2\s0 algorithm with a default iteration count of 10000
253 Don't use a salt in the key derivation routines. This option \fB\s-1SHOULD NOT\s0\fR be
262 The actual salt to use: this must be represented as a string of hex digits.
267 The actual key to use: this must be represented as a string comprised only
269 using the \fB\-iv\fR option. When both a key and a password are specified, the
275 The actual \s-1IV\s0 to use: this must be represented as a string comprised only
277 \&\s-1IV\s0 must explicitly be defined. When a password is being specified using
328 Use the \fBopenssl\-list\fR\|(1) command to get a list of supported ciphers.
340 A password will be prompted for to derive the key and \s-1IV\s0 if necessary.
343 from a password unless you want compatibility with previous versions of
351 When the salt is generated at random (that means when encrypting using a
356 implications if not used correctly. A beginner is advised to just use
357 a strong block cipher, such as \s-1AES,\s0 in \s-1CBC\s0 mode.
360 block padding. This allows a rudimentary integrity or password check to
362 is better than 1 in 256 it isn't a very good test.
364 If padding is disabled then the input data must be a multiple of the cipher
369 Blowfish and \s-1RC5\s0 algorithms use a 128 bit key.
375 is expected to not have a prepended salt value.
389 a list of ciphers, supported by your version of OpenSSL, including
396 When this command is used in a pipeline, the receiving end will not be
404 functionality cannot be removed with a stable release branch.
406 modes or other modes, \fBopenssl\-cms\fR\|(1) is recommended, as it provides a
456 \& rc2\-cbc 128 bit RC2 in CBC mode
458 \& rc2\-cfb 128 bit RC2 in CFB mode
459 \& rc2\-ecb 128 bit RC2 in ECB mode
460 \& rc2\-ofb 128 bit RC2 in OFB mode
464 \& rc4 128 bit RC4
487 \& aes\-[128|192|256]\-cbc 128/192/256 bit AES in CBC mode
488 \& aes[128|192|256] Alias for aes\-[128|192|256]\-cbc
489 \& aes\-[128|192|256]\-cfb 128/192/256 bit AES in 128 bit CFB mode
490 \& aes\-[128|192|256]\-cfb1 128/192/256 bit AES in 1 bit CFB mode
491 \& aes\-[128|192|256]\-cfb8 128/192/256 bit AES in 8 bit CFB mode
492 \& aes\-[128|192|256]\-ctr 128/192/256 bit AES in CTR mode
493 \& aes\-[128|192|256]\-ecb 128/192/256 bit AES in ECB mode
494 \& aes\-[128|192|256]\-ofb 128/192/256 bit AES in OFB mode
496 \& aria\-[128|192|256]\-cbc 128/192/256 bit ARIA in CBC mode
497 \& aria[128|192|256] Alias for aria\-[128|192|256]\-cbc
498 \& aria\-[128|192|256]\-cfb 128/192/256 bit ARIA in 128 bit CFB mode
499 \& aria\-[128|192|256]\-cfb1 128/192/256 bit ARIA in 1 bit CFB mode
500 \& aria\-[128|192|256]\-cfb8 128/192/256 bit ARIA in 8 bit CFB mode
501 \& aria\-[128|192|256]\-ctr 128/192/256 bit ARIA in CTR mode
502 \& aria\-[128|192|256]\-ecb 128/192/256 bit ARIA in ECB mode
503 \& aria\-[128|192|256]\-ofb 128/192/256 bit ARIA in OFB mode
505 \& camellia\-[128|192|256]\-cbc 128/192/256 bit Camellia in CBC mode
506 \& camellia[128|192|256] Alias for camellia\-[128|192|256]\-cbc
507 \& camellia\-[128|192|256]\-cfb 128/192/256 bit Camellia in 128 bit CFB mode
508 \& camellia\-[128|192|256]\-cfb1 128/192/256 bit Camellia in 1 bit CFB mode
509 \& camellia\-[128|192|256]\-cfb8 128/192/256 bit Camellia in 8 bit CFB mode
510 \& camellia\-[128|192|256]\-ctr 128/192/256 bit Camellia in CTR mode
511 \& camellia\-[128|192|256]\-ecb 128/192/256 bit Camellia in ECB mode
512 \& camellia\-[128|192|256]\-ofb 128/192/256 bit Camellia in OFB mode
516 Just base64 encode a binary file:
528 Encrypt a file using \s-1AES\-128\s0 using a prompted password
535 Decrypt a file using a supplied password:
542 Encrypt a file then base64 encode it (so it can be sent via mail for example)
546 \& openssl enc \-aes\-256\-ctr \-pbkdf2 \-a \-in file.txt \-out file.aes256
549 Base64 decode a file then decrypt it using a password supplied in a file:
552 \& openssl enc \-aes\-256\-ctr \-pbkdf2 \-d \-a \-in file.aes256 \-out file.txt \e
557 The \fB\-A\fR option when used with large files doesn't work properly.
559 The \fBopenssl enc\fR command only supports a fixed number of algorithms with
560 certain parameters. So if, for example, you want to use \s-1RC2\s0 with a
574 this file except in compliance with the License. You can obtain a copy