/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_camellia.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 53 # ECB-CAMELLIA128.Encrypt and ECB-CAMELLIA128.Decrypt 75 # ECB-CAMELLIA192.Encrypt and ECB-CAMELLIA192.Decrypt 97 # ECB-CAMELLIA256.Encrypt and ECB-CAMELLIA256.Decrypt 121 # CBC-CAMELLIA128.Encrypt and CBC-CAMELLIA128.Decrypt 151 # CBC-CAMELLIA192.Encrypt and CBC-CAMELLIA192.Decrypt 181 # CBC-CAMELLIA256.Encrypt and CBC-CAMELLIA256.Decrypt 248 # CFB128-CAMELLIA128.Decrypt 252 Operation = DECRYPT 260 Operation = DECRYPT [all …]
|
H A D | evppkey_rsa_common.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 250 # RSA decrypt 252 Decrypt = RSA-2048 258 Decrypt = RSA-2048 264 Decrypt = RSA-2048 270 Decrypt = RSA-2048 622 Decrypt=RSA-OAEP-1 628 Decrypt=RSA-OAEP-1 634 Decrypt=RSA-OAEP-1 640 Decrypt=RSA-OAEP-1 [all …]
|
H A D | evpciph_aes_wrap.txt | 52 Operation = DECRYPT 76 Operation = DECRYPT 82 Operation = DECRYPT 88 Operation = DECRYPT 94 Operation = DECRYPT 101 Operation = DECRYPT 108 Operation = DECRYPT 133 Operation = DECRYPT 139 Operation = DECRYPT 146 Operation = DECRYPT [all …]
|
H A D | evpciph_aes_common.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 46 # AES 128 ECB tests (from NIST test vectors, decrypt) 50 # AES 192 ECB tests (from NIST test vectors, decrypt) 54 # AES 256 ECB tests (from NIST test vectors, decrypt) 70 # AES 128 CBC tests (from NIST test vectors, decrypt) 77 # ECB-AES128.Encrypt and ECB-AES128.Decrypt 101 # ECB-AES192.Encrypt and ECB-AES192.Decrypt 122 # ECB-AES256.Encrypt and ECB-AES256.Decrypt 145 # CBC-AES128.Encrypt and CBC-AES128.Decrypt 174 # CBC-AES192.Encrypt and CBC-AES192.Decrypt [all …]
|
H A D | evpciph_aes_ccm_cavs.txt | 28 Operation = DECRYPT 38 Operation = DECRYPT 48 Operation = DECRYPT 66 Operation = DECRYPT 76 Operation = DECRYPT 86 Operation = DECRYPT 96 Operation = DECRYPT 106 Operation = DECRYPT 116 Operation = DECRYPT 150 Operation = DECRYPT [all …]
|
H A D | evppkey_sm2.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 45 Decrypt = SM2_key1 51 Decrypt = SM2_key1 58 Decrypt = SM2_key1 64 Decrypt = SM2_key1
|
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
H A D | hcrypto_des.3 | 94 Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc). 110 \fIencp\fP if non zero, encrypt. if zero, decrypt. 116 Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback. 134 \fIencp\fP if non zero, encrypt. if zero, decrypt. 155 Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt. 169 \fIencp\fP if non zero, encrypt. if zero, decrypt. 175 Encrypt/decrypt a block using DES. 185 \fIencp\fP if non zero, encrypt. if zero, decrypt. 191 Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc). 211 \fIencp\fP if non zero, encrypt. if zero, decrypt. [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 155 .IP "decrypt" 4 156 .IX Item "decrypt" 157 This state represents the \s-1PKEY\s0 when it is ready to decrypt some ciphertext. 216 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt | 254 …start newed digest verify verify encrypt decrypt derive … 272 … decrypt decrypt decrypt decrypt decrypt decrypt decrypt … 273 …crypt decrypt 291 … newed digest verify verify encrypt decrypt derive … 293 … newed digest verify verify encrypt decrypt derive … 295 … newed digest verify verify encrypt decrypt derive … [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | bio_enc_test.c | 18 #define DECRYPT 0 macro 122 /* Decrypt tests */ in do_bio_cipher() 128 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) in do_bio_cipher() 148 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { in do_bio_cipher() 149 TEST_info("Split decrypt failed @ operation %d", i); in do_bio_cipher() 161 TEST_info("Decrypt overstep check failed @ operation %d", i); in do_bio_cipher() 168 TEST_info("Decrypt compare failed @ operation %d", i); in do_bio_cipher() 180 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { in do_bio_cipher() 181 TEST_info("Small chunk decrypt failed @ operation %d", i); in do_bio_cipher() 195 TEST_info("Small chunk decrypt compare failed @ operation %d", i); in do_bio_cipher()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 292 krb5_data decrypt; in krb_enc() local 295 krb5_data_zero(&decrypt); in krb_enc() 302 &decrypt); in krb_enc() 309 if (decrypt.length != clear->length || in krb_enc() 310 memcmp(decrypt.data, clear->data, decrypt.length) != 0) { in krb_enc() 315 krb5_data_free(&decrypt); in krb_enc() 328 krb5_data decrypt; in krb_enc_iov2() local 366 * Plain decrypt in krb_enc_iov2() 375 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); in krb_enc_iov2() 379 krb5_data_free(&decrypt); in krb_enc_iov2() [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 27 =item decrypt 29 This state represents the PKEY when it is ready to decrypt some ciphertext. 103 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt | 149 …start newed digest verify verify encrypt decrypt derive … 167 … decrypt decrypt decrypt decrypt decrypt decrypt decrypt … 168 …crypt decrypt 186 … newed digest verify verify encrypt decrypt derive … 188 … newed digest verify verify encrypt decrypt derive … 190 … newed digest verify verify encrypt decrypt derive … 192 … newed digest verify verify encrypt decrypt derive … [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_mp_rsa.t | 74 '-decrypt', '-in', "rsamptest-$name.enc", 76 "rsa $name decrypt"); 89 '-decrypt', '-in', "rsamptest-$name.enc", 91 "rsa $name decrypt"); 98 '-decrypt', '-in', "rsamptest-$name.enc", 100 "rsa $name decrypt");
|
H A D | 15-test_rsaoaep.t | 83 '-decrypt', 96 '-decrypt', 107 '-decrypt', 131 '-decrypt', 152 '-decrypt',
|
H A D | 80-test_cms.t | 209 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1, 220 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", catfile($smdir, "smrsa3.pem"), 231 [ "{cmd2}", @defaultprov, "-decrypt", 244 [ "{cmd2}", @prov, "-decrypt", "-recip", $smrsa1, 305 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1, 315 [ "{cmd2}", @prov, "-decrypt", "-in", "{output}.cms", "-out", "{output}.txt", 327 [ "{cmd2}", "-decrypt", "-in", "{output}.cms", "-out", "{output}.txt", 339 [ "{cmd2}", @prov, "-decrypt", "-in", "{output}.cms", "-out", "{output}.txt", 558 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1, 569 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1, [all …]
|
/freebsd/tests/sys/opencrypto/ |
H A D | cryptotest.py | 89 self.runGCM(i, 'DECRYPT') 96 elif mode == 'DECRYPT': 98 curfun = Crypto.decrypt 151 c.decrypt, *args) 154 rpt, rtag = c.decrypt(*args) 176 elif mode == 'DECRYPT': 178 curfun = Crypto.decrypt 208 elif mode == 'DECRYPT': 210 curfun = Crypto.decrypt 313 c.decrypt, payload, nonce, aad, tag) [all …]
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/ |
H A D | lac_sym_qat_cipher.c | 241 /* Streaming ciphers are a special case. Decrypt = encrypt */ 250 /* AES decrypt key needs to be reversed. Instead of reversing the 263 /* AES decrypt key needs to be reversed. Instead of reversing the 276 /* AES decrypt key needs to be reversed. Instead of reversing the 281 /* Streaming ciphers are a special case. Decrypt = encrypt 292 /* AES decrypt key needs to be reversed. Instead of reversing the 297 /* Streaming ciphers are a special case. Decrypt = encrypt 308 /* AES decrypt key needs to be reversed. Instead of reversing the 313 /* Streaming ciphers are a special case. Decrypt = encrypt 361 /* Streaming ciphers are a special case. Decrypt = encrypt [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | BIO_f_cipher.pod | 51 decrypt. 54 return value from the read operation. A successful decrypt followed 56 should be called to determine if the decrypt was successful. 67 BIO_get_cipher_status() returns 1 for a successful decrypt and <=0
|
H A D | CMS_decrypt.pod | 7 - decrypt content from a CMS envelopedData structure 25 It uses CMS_decrypt_set1_pkey() to decrypt the content 56 Although the recipients certificate is not needed to decrypt the data it is 63 not. If no recipient succeeds then a random symmetric key is used to decrypt 66 error when all recipient encrypted keys failed to decrypt an attacker could
|
/freebsd/sbin/decryptcore/ |
H A D | decryptcore.8 | 30 .Nd "decrypt a core dump of the operating system" 50 and then uses the resulting key to decrypt 57 Alternatively a user can decrypt a core dump numbered 93 Specify location of a private key file which will be used to decrypt a dump key
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | pkey.dot | 11 decrypt [fontcolor="#425F06", color="#425F06"] 32 newed -> decrypt [label="EVP_PKEY_decrypt_init", fontcolor="#425F06", color="#425F06"]; 33 decrypt -> decrypt [label="EVP_PKEY_decrypt", fontcolor="#425F06", color="#425F06"];
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-cms.1 | 155 [\fB\-decrypt\fR] 297 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages. 301 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt, 331 key has been compromised, others may be able to decrypt the text. 332 .IP "\fB\-decrypt\fR" 4 333 .IX Item "-decrypt" 334 Decrypt data using the supplied certificate and private key. Expects 380 Decrypt content using supplied symmetric key and algorithm using a \s-1CMS\s0 448 \&\fB\-EncryptedData_decrypt\fR, \fB\-encrypt\fR and \fB\-decrypt\fR options. When used 449 with \fB\-encrypt\fR or \fB\-decrypt\fR the supplied key is used to wrap or unwrap the [all …]
|
/freebsd/crypto/openssl/demos/ |
H A D | README.txt | 11 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt 12 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt 13 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_block.h | 50 * For CBC encryption and decryption, the data to encrypt or decrypt is 270 * - `decrypt` 492 * \param data data to decrypt. 548 * The data to encrypt or decrypt is updated "in place". Its 558 * \param data data to encrypt or decrypt. 642 * The data to decrypt is updated "in place". Its length (`len` 648 * \param data data to decrypt. 651 void (*decrypt)(const br_block_ctrcbc_class *const *ctx, member 661 * The data to decrypt is updated "in place". Its length (`len` 666 * \param data data to decrypt. [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 22 [B<-decrypt>] 127 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages. 132 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt, 175 key has been compromised, others may be able to decrypt the text. 177 =item B<-decrypt> 179 Decrypt data using the supplied certificate and private key. Expects 236 Decrypt content using supplied symmetric key and algorithm using a CMS 325 B<-EncryptedData_decrypt>, B<-encrypt> and B<-decrypt> options. When used 326 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the 333 B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the [all …]
|
/freebsd/sys/contrib/openzfs/include/sys/ |
H A D | dmu_objset.h | 214 int dmu_objset_hold_flags(const char *name, boolean_t decrypt, const void *tag, 217 boolean_t readonly, boolean_t decrypt, const void *tag, objset_t **osp); 219 dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt, 222 struct dsl_dataset **newds, boolean_t decrypt, const void *tag); 224 void dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, const void *tag); 225 void dmu_objset_disown(objset_t *os, boolean_t decrypt, const void *tag);
|