Home
last modified time | relevance | path

Searched full:decrypt (Results 1 – 25 of 786) sorted by relevance

12345678910>>...32

/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_rsa_common.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
250 # RSA decrypt
252 Decrypt = RSA-2048
259 Decrypt = RSA-2048
268 Decrypt = RSA-2048
276 Decrypt = RSA-2048
285 Decrypt = RSA-2048
293 Decrypt = RSA-2048
299 Decrypt = RSA-2048
306 Decrypt = RSA-2048
[all …]
H A Devpciph_camellia.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
53 # ECB-CAMELLIA128.Encrypt and ECB-CAMELLIA128.Decrypt
75 # ECB-CAMELLIA192.Encrypt and ECB-CAMELLIA192.Decrypt
97 # ECB-CAMELLIA256.Encrypt and ECB-CAMELLIA256.Decrypt
121 # CBC-CAMELLIA128.Encrypt and CBC-CAMELLIA128.Decrypt
151 # CBC-CAMELLIA192.Encrypt and CBC-CAMELLIA192.Decrypt
181 # CBC-CAMELLIA256.Encrypt and CBC-CAMELLIA256.Decrypt
248 # CFB128-CAMELLIA128.Decrypt
252 Operation = DECRYPT
260 Operation = DECRYPT
[all …]
H A Devpciph_aes_wrap.txt52 Operation = DECRYPT
76 Operation = DECRYPT
82 Operation = DECRYPT
88 Operation = DECRYPT
94 Operation = DECRYPT
101 Operation = DECRYPT
108 Operation = DECRYPT
133 Operation = DECRYPT
139 Operation = DECRYPT
146 Operation = DECRYPT
[all …]
H A Devpciph_aes_ccm_cavs.txt28 Operation = DECRYPT
38 Operation = DECRYPT
48 Operation = DECRYPT
66 Operation = DECRYPT
76 Operation = DECRYPT
86 Operation = DECRYPT
96 Operation = DECRYPT
106 Operation = DECRYPT
116 Operation = DECRYPT
150 Operation = DECRYPT
[all …]
H A Devppkey_sm2.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
45 Decrypt = SM2_key1
51 Decrypt = SM2_key1
58 Decrypt = SM2_key1
64 Decrypt = SM2_key1
90 Decrypt = SM2_key1
H A Devpciph_aes_common.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
46 # AES 128 ECB tests (from NIST test vectors, decrypt)
50 # AES 192 ECB tests (from NIST test vectors, decrypt)
54 # AES 256 ECB tests (from NIST test vectors, decrypt)
70 # AES 128 CBC tests (from NIST test vectors, decrypt)
77 # ECB-AES128.Encrypt and ECB-AES128.Decrypt
113 # ECB-AES192.Encrypt and ECB-AES192.Decrypt
146 # ECB-AES256.Encrypt and ECB-AES256.Decrypt
181 # CBC-AES128.Encrypt and CBC-AES128.Decrypt
226 # CBC-AES192.Encrypt and CBC-AES192.Decrypt
[all …]
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/
H A Dhcrypto_des.394 Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc).
110 \fIencp\fP if non zero, encrypt. if zero, decrypt.
116 Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback.
134 \fIencp\fP if non zero, encrypt. if zero, decrypt.
155 Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt.
169 \fIencp\fP if non zero, encrypt. if zero, decrypt.
175 Encrypt/decrypt a block using DES.
185 \fIencp\fP if non zero, encrypt. if zero, decrypt.
191 Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc).
211 \fIencp\fP if non zero, encrypt. if zero, decrypt.
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-pkey.779 .IP decrypt 4
80 .IX Item "decrypt"
81 This state represents the PKEY when it is ready to decrypt some ciphertext.
140 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt |
178 …start newed digest verify verify encrypt decrypt derive …
196decrypt decrypt decrypt decrypt decrypt decrypt decrypt
197 …crypt decrypt
215 … newed digest verify verify encrypt decrypt derive …
217 … newed digest verify verify encrypt decrypt derive …
219 … newed digest verify verify encrypt decrypt derive …
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Daes-test.c292 krb5_data decrypt; in krb_enc() local
295 krb5_data_zero(&decrypt); in krb_enc()
302 &decrypt); in krb_enc()
309 if (decrypt.length != clear->length || in krb_enc()
310 memcmp(decrypt.data, clear->data, decrypt.length) != 0) { in krb_enc()
315 krb5_data_free(&decrypt); in krb_enc()
328 krb5_data decrypt; in krb_enc_iov2() local
366 * Plain decrypt in krb_enc_iov2()
375 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); in krb_enc_iov2()
379 krb5_data_free(&decrypt); in krb_enc_iov2()
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-pkey.pod27 =item decrypt
29 This state represents the PKEY when it is ready to decrypt some ciphertext.
103 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt |
149 …start newed digest verify verify encrypt decrypt derive …
167decrypt decrypt decrypt decrypt decrypt decrypt decrypt
168 …crypt decrypt
186 … newed digest verify verify encrypt decrypt derive …
188 … newed digest verify verify encrypt decrypt derive …
190 … newed digest verify verify encrypt decrypt derive …
192 … newed digest verify verify encrypt decrypt derive …
[all …]
/freebsd/crypto/openssl/test/
H A Dbio_enc_test.c18 #define DECRYPT 0 macro
129 /* Decrypt tests */ in do_bio_cipher()
135 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) in do_bio_cipher()
165 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { in do_bio_cipher()
166 TEST_info("Split decrypt failed @ operation %d", i); in do_bio_cipher()
178 TEST_info("Decrypt overstep check failed @ operation %d", i); in do_bio_cipher()
185 TEST_info("Decrypt compare failed @ operation %d", i); in do_bio_cipher()
197 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { in do_bio_cipher()
198 TEST_info("Small chunk decrypt failed @ operation %d", i); in do_bio_cipher()
212 TEST_info("Small chunk decrypt compare failed @ operation %d", i); in do_bio_cipher()
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D15-test_mp_rsa.t74 '-decrypt', '-in', "rsamptest-$name.enc",
76 "rsa $name decrypt");
89 '-decrypt', '-in', "rsamptest-$name.enc",
91 "rsa $name decrypt");
98 '-decrypt', '-in', "rsamptest-$name.enc",
100 "rsa $name decrypt");
H A D15-test_rsaoaep.t83 '-decrypt',
96 '-decrypt',
107 '-decrypt',
131 '-decrypt',
152 '-decrypt',
/freebsd/tests/sys/opencrypto/
H A Dcryptotest.py89 self.runGCM(i, 'DECRYPT')
96 elif mode == 'DECRYPT':
98 curfun = Crypto.decrypt
151 c.decrypt, *args)
154 rpt, rtag = c.decrypt(*args)
176 elif mode == 'DECRYPT':
178 curfun = Crypto.decrypt
208 elif mode == 'DECRYPT':
210 curfun = Crypto.decrypt
313 c.decrypt, payload, nonce, aad, tag)
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-cms.179 [\fB\-decrypt\fR]
224 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages.
228 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt,
258 key has been compromised, others may be able to decrypt the text.
259 .IP \fB\-decrypt\fR 4
260 .IX Item "-decrypt"
261 Decrypt data using the supplied certificate and private key. Expects
320 Decrypt content using supplied symmetric key and algorithm using a CMS
388 \&\fB\-EncryptedData_decrypt\fR, \fB\-encrypt\fR and \fB\-decrypt\fR options. When used
389 with \fB\-encrypt\fR or \fB\-decrypt\fR the supplied key is used to wrap or unwrap the
[all …]
/freebsd/sbin/decryptcore/
H A Ddecryptcore.830 .Nd "decrypt a core dump of the operating system"
50 and then uses the resulting key to decrypt
57 Alternatively a user can decrypt a core dump numbered
93 Specify location of a private key file which will be used to decrypt a dump key
/freebsd/crypto/openssl/doc/man3/
H A DBIO_f_cipher.pod51 decrypt.
54 return value from the read operation. A successful decrypt followed
56 should be called to determine if the decrypt was successful.
67 BIO_get_cipher_status() returns 1 for a successful decrypt and <=0
H A DCMS_decrypt.pod7 - decrypt content from a CMS envelopedData structure
25 It uses CMS_decrypt_set1_pkey() to decrypt the content
55 Although the recipients certificate is not needed to decrypt the data it is
62 not. If no recipient succeeds then a random symmetric key is used to decrypt
65 error when all recipient encrypted keys failed to decrypt an attacker could
/freebsd/crypto/openssl/demos/
H A DREADME.txt15 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt
16 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt
17 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
32 rsa_encrypt.c Encrypt and decrypt data using an RSA keypair.
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/
H A Dlac_sym_qat_cipher.c246 /* Streaming ciphers are a special case. Decrypt = encrypt */
255 /* AES decrypt key needs to be reversed. Instead of reversing the
268 /* AES decrypt key needs to be reversed. Instead of reversing the
281 /* AES decrypt key needs to be reversed. Instead of reversing the
286 /* Streaming ciphers are a special case. Decrypt = encrypt
297 /* AES decrypt key needs to be reversed. Instead of reversing the
302 /* Streaming ciphers are a special case. Decrypt = encrypt
313 /* AES decrypt key needs to be reversed. Instead of reversing the
318 /* Streaming ciphers are a special case. Decrypt = encrypt
366 /* Streaming ciphers are a special case. Decrypt = encrypt
[all …]
/freebsd/crypto/openssl/doc/life-cycles/
H A Dpkey.dot11 decrypt [fontcolor="#425F06", color="#425F06"]
32 newed -> decrypt [label="EVP_PKEY_decrypt_init", fontcolor="#425F06", color="#425F06"];
33 decrypt -> decrypt [label="EVP_PKEY_decrypt", fontcolor="#425F06", color="#425F06"];
/freebsd/secure/lib/libcrypto/man/man3/
H A DCMS_decrypt.366 \&\- decrypt content from a CMS envelopedData structure
84 It uses \fBCMS_decrypt_set1_pkey()\fR to decrypt the content
113 Although the recipients certificate is not needed to decrypt the data it is
120 not. If no recipient succeeds then a random symmetric key is used to decrypt
123 error when all recipient encrypted keys failed to decrypt an attacker could
/freebsd/contrib/bearssl/inc/
H A Dbearssl_block.h50 * For CBC encryption and decryption, the data to encrypt or decrypt is
270 * - `decrypt`
492 * \param data data to decrypt.
548 * The data to encrypt or decrypt is updated "in place". Its
558 * \param data data to encrypt or decrypt.
642 * The data to decrypt is updated "in place". Its length (`len`
648 * \param data data to decrypt.
651 void (*decrypt)(const br_block_ctrcbc_class *const *ctx, member
661 * The data to decrypt is updated "in place". Its length (`len`
666 * \param data data to decrypt.
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-cms.pod.in24 [B<-decrypt>]
131 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages.
136 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt,
179 key has been compromised, others may be able to decrypt the text.
181 =item B<-decrypt>
183 Decrypt data using the supplied certificate and private key. Expects
254 Decrypt content using supplied symmetric key and algorithm using a CMS
343 B<-EncryptedData_decrypt>, B<-encrypt> and B<-decrypt> options. When used
344 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the
351 B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the
[all …]
/freebsd/sys/opencrypto/
H A Dxform_enc.h65 * Encrypt/decrypt a single block. For stream ciphers this
69 void (*decrypt) (void *, const uint8_t *, uint8_t *); member
72 * Encrypt/decrypt multiple blocks. For stream ciphers this
80 * For stream ciphers, encrypt/decrypt the final partial block

12345678910>>...32