Home
last modified time | relevance | path

Searched full:decryption (Results 1 – 25 of 436) sorted by relevance

12345678910>>...18

/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-cipher.7160 .IP "initialised for decryption using EVP_DecryptInit" 4
161 .IX Item "initialised for decryption using EVP_DecryptInit"
204 | for decryption | | | | for encryption |
217 …| for decryption | <-------------------+ | | for encryption | …
242decryption decryption encryption encryption
246decryption decryption decryption decryption decryption decryption decryption decryption
251decryption decryption
260decryption decryption encryption encryption
262decryption decryption encryption encryption
264decryption decryption encryption encryption
[all …]
H A Dprovider-cipher.7158 \& /* Encryption/decryption */
261 .SS "Encryption/Decryption Functions"
262 .IX Subsection "Encryption/Decryption Functions"
271 initialises the context for a decryption operation.
290 \&\fBOSSL_FUNC_cipher_final()\fR completes an encryption or decryption started through previous
294 Any final encryption/decryption output should be written to \fIout\fR and the
299 \&\fBOSSL_FUNC_cipher_cipher()\fR performs encryption/decryption using the provider side cipher
309 The output from the encryption/decryption should be stored in \fIout\fR and the
H A Dprovider-asym_cipher.7165 \& /* Decryption */
277 .SS "Decryption Functions"
278 .IX Subsection "Decryption Functions"
279 \&\fBOSSL_FUNC_asym_cipher_decrypt_init()\fR initialises a context for an asymmetric decryption
288 \&\fBOSSL_FUNC_asym_cipher_decrypt()\fR performs the actual decryption itself.
/freebsd/contrib/bearssl/inc/
H A Dbearssl_block.h46 * functions are provided, for CBC encryption, CBC decryption, and CTR
47 * encryption/decryption. Each set has its own context structure,
50 * For CBC encryption and decryption, the data to encrypt or decrypt is
94 * expansion. These subkeys are appropriate for CBC decryption. The
100 * Perform key expansion: subkeys for CBC decryption are computed and
107 * Perform CBC decryption of `len` bytes, in place. The decrypted data
117 * decryption. The structure first field is called `vtable` and
122 * Perform key expansion: subkeys for CTR encryption and decryption
129 * Perform CTR encryption/decryption of some data. Processing is done
143 * CTR encryption/decryption and CBC-MAC, as used in the CCM and EAX
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-cipher.pod32 =item initialised for decryption using EVP_DecryptInit
82 | for decryption | | | | for encryption |
95 …| for decryption | <-------------------+ | | for encryption | …
128decryption decryption encryption encryption
132decryption decryption decryption decryption decryption decryption decryption decryption
137decryption decryption
146decryption decryption encryption encryption
148decryption decryption encryption encryption
150decryption decryption encryption encryption
152decryption decryption encryption encryption
[all …]
H A Dprovider-cipher.pod25 /* Encryption/decryption */
126 =head2 Encryption/Decryption Functions
136 initialises the context for a decryption operation.
159 OSSL_FUNC_cipher_final() completes an encryption or decryption started through previous
163 Any final encryption/decryption output should be written to I<out> and the
168 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher
178 The output from the encryption/decryption should be stored in I<out> and the
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/fault/
H A Ddecrypt_fault.ksh23 # Test that injected decryption errors are handled correctly.
27 # 2. Inject decryption errors on the file 20% of the time
29 # 4. Confirm that the decryption injection was added to the ZED logs
32 log_assert "Testing that injected decryption errors are handled correctly"
59 log_pass "Injected decryption errors are handled correctly"
/freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/
H A Daesopt.h74 #define AES_DECRYPT /* if support for decryption is needed */
80 #define AES_REV_DKS /* define to reverse decryption key schedule */
161 * ASSUME_VIA_ACE_PRESENT will remove the ordinary encryption/decryption
169 * VIA ACE also requires the decryption key schedule to be in reverse
190 * assembler code routines for encryption, decryption and key scheduling
194 * encryption and decryption and but with key scheduling in C
196 * encryption, decryption and key scheduling
198 * encryption and decryption and but with key scheduling in C
200 * encryption and decryption and but with key scheduling in C
246 * The code for encryption and decryption cycles through a number of rounds
[all …]
/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_fw_mmp.h397 * Input parameter list for RSA 512 Decryption ,
412 * Input parameter list for RSA 1024 Decryption with CRT ,
475 * Input parameter list for RSA 1024 Decryption ,
490 * Input parameter list for RSA 1024 Decryption with CRT ,
553 * Input parameter list for RSA 1536 Decryption ,
568 * Input parameter list for RSA 1536 Decryption with CRT ,
631 * Input parameter list for RSA 2048 Decryption ,
646 * Input parameter list for RSA 2048 Decryption with CRT ,
709 * Input parameter list for RSA 3072 Decryption ,
724 * Input parameter list for RSA 3072 Decryption with CRT ,
[all …]
H A Dicp_qat_fw_mmp_ids.h72 /**< Functionality ID for ECC SM2 decryption
317 /**< Functionality ID for RSA 512 Decryption
325 /**< Functionality ID for RSA 1024 Decryption with CRT
363 /**< Functionality ID for RSA 1024 Decryption
371 /**< Functionality ID for RSA 1024 Decryption with CRT
409 /**< Functionality ID for RSA 1536 Decryption
417 /**< Functionality ID for RSA 1536 Decryption with CRT
455 /**< Functionality ID for RSA 2048 Decryption
463 /**< Functionality ID for RSA 2048 Decryption with CRT
501 /**< Functionality ID for RSA 3072 Decryption
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DCMS_decrypt.pod31 If I<pkey> is NULL the function assumes that decryption was already done
41 On success, it also records in I<cms> the decryption key I<pkey>, and this
43 This call deallocates any decryption key stored in I<cms>.
50 On success, it also records in I<cms> the decryption key used, and this
52 This call deallocates any decryption key stored in I<cms>.
H A DBF_encrypt.pod50 Blowfish consists of a key setup phase and the actual encryption or decryption
56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function.
59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by
81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
H A DSSL_CTX_set_session_ticket_cb.pod42 decryption has been attempted and any session ticket application data is
43 available. If ticket decryption was successful then the B<ss> argument contains
46 ticket decryption. See the L</NOTES> section below for further details. The value
70 decryption. The callback must check the B<status> value before performing any
71 action, as it is called even if ticket decryption fails.
H A DEVP_OpenInit.pod5 EVP_OpenInit, EVP_OpenUpdate, EVP_OpenFinal - EVP envelope decryption
20 decryption. They decrypt a public key encrypted symmetric key and
23 EVP_OpenInit() initializes a cipher context B<ctx> for decryption
H A DEVP_PKEY_decrypt.pod21 context using key I<pkey> for a decryption operation.
24 context using key I<pkey> for a decryption operation and sets the
27 The EVP_PKEY_decrypt() function performs a public key decryption operation
H A DSSL_CTX_set_default_passwd_cb.pod46 password to be used during decryption.
51 callback is used for reading/decryption (rwflag=0) or writing/encryption
69 for comparison in order to catch typos, that would make decryption
/freebsd/crypto/openssl/test/recipes/
H A D15-test_rsaoaep.t92 "RSA OAEP Decryption");
103 "Incorrect digest for RSA OAEP Decryption");
114 "Incorrect mgf1-digest for RSA OAEP Decryption");
138 "RSA OAEP Decryption with default digests");
161 "RSA OAEP Decryption with explicit default digests");
/freebsd/contrib/wpa/src/crypto/
H A Daes-cbc.c53 * aes_128_cbc_decrypt - AES-128 CBC decryption
54 * @key: Decryption key
55 * @iv: Decryption IV for CBC mode (16 bytes)
/freebsd/secure/lib/libcrypto/man/man3/
H A DBF_encrypt.3187 Blowfish consists of a key setup phase and the actual encryption or decryption
193 \&\fBBF_ecb_encrypt()\fR is the basic Blowfish encryption and decryption function.
196 or decryption (\fB\s-1BF_DECRYPT\s0\fR) shall be performed. The vector pointed at by
218 decryption (\s-1BF_DECRYPT\s0) shall be performed. \fBivec\fR must point at an 8 byte
224 or decryption (\fB\s-1BF_DECRYPT\s0\fR) shall be performed. \fBivec\fR must point at an
H A DCMS_decrypt.3166 If \fIpkey\fR is \s-1NULL\s0 the function assumes that decryption was already done
176 On success, it also records in \fIcms\fR the decryption key \fIpkey\fR, and this
178 This call deallocates any decryption key stored in \fIcms\fR.
185 On success, it also records in \fIcms\fR the decryption key used, and this
187 This call deallocates any decryption key stored in \fIcms\fR.
H A DSSL_CTX_set_session_ticket_cb.3177 decryption has been attempted and any session ticket application data is
178 available. If ticket decryption was successful then the \fBss\fR argument contains
181 ticket decryption. See the \*(L"\s-1NOTES\*(R"\s0 section below for further details. The value
204 decryption. The callback must check the \fBstatus\fR value before performing any
205 action, as it is called even if ticket decryption fails.
/freebsd/sys/contrib/openzfs/include/sys/
H A Dqat.h102 * Number of jobs submitted to QAT decryption engine.
106 * Total bytes sent to QAT decryption engine.
110 * Total bytes output from QAT decryption engine.
114 * Number of fails in the QAT encryption / decryption engine.
/freebsd/share/man/man9/
H A Dcrypto_session.9165 Decryption operations require the digest, or tag,
175 Decryption operations fail without decrypting the data if the provided digest
220 Length of encryption or decryption key in bytes.
223 Pointer to encryption or decryption key.
/freebsd/crypto/libecc/src/examples/hash/
H A Dtdes.h26 u64 sk[16]; /* encryption/decryption subkeys */
68 /* DES encryption/decryption */
74 /* TDES encryption/decryption */
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-enc.pod.in51 either by itself or in addition to the encryption or decryption.
97 the data is base64 encoded after encryption. If decryption is set then
156 again during decryption.
181 or decryption.
202 decryption. This option exists only if OpenSSL was compiled with the zlib
207 Use NULL cipher (no encryption or decryption of input).
269 Conversely, when the B<-S> option is used during decryption, the ciphertext

12345678910>>...18