/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-cipher.7 | 160 .IP "initialised for decryption using EVP_DecryptInit" 4 161 .IX Item "initialised for decryption using EVP_DecryptInit" 204 | for decryption | | | | for encryption | 217 …| for decryption | <-------------------+ | | for encryption | … 242 … decryption decryption encryption encryption 246 … decryption decryption decryption decryption decryption decryption decryption decryption 251 … decryption decryption 260 … decryption decryption encryption encryption 262 … decryption decryption encryption encryption 264 … decryption decryption encryption encryption [all …]
|
H A D | provider-cipher.7 | 158 \& /* Encryption/decryption */ 261 .SS "Encryption/Decryption Functions" 262 .IX Subsection "Encryption/Decryption Functions" 271 initialises the context for a decryption operation. 290 \&\fBOSSL_FUNC_cipher_final()\fR completes an encryption or decryption started through previous 294 Any final encryption/decryption output should be written to \fIout\fR and the 299 \&\fBOSSL_FUNC_cipher_cipher()\fR performs encryption/decryption using the provider side cipher 309 The output from the encryption/decryption should be stored in \fIout\fR and the
|
H A D | provider-asym_cipher.7 | 165 \& /* Decryption */ 277 .SS "Decryption Functions" 278 .IX Subsection "Decryption Functions" 279 \&\fBOSSL_FUNC_asym_cipher_decrypt_init()\fR initialises a context for an asymmetric decryption 288 \&\fBOSSL_FUNC_asym_cipher_decrypt()\fR performs the actual decryption itself.
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_block.h | 46 * functions are provided, for CBC encryption, CBC decryption, and CTR 47 * encryption/decryption. Each set has its own context structure, 50 * For CBC encryption and decryption, the data to encrypt or decrypt is 94 * expansion. These subkeys are appropriate for CBC decryption. The 100 * Perform key expansion: subkeys for CBC decryption are computed and 107 * Perform CBC decryption of `len` bytes, in place. The decrypted data 117 * decryption. The structure first field is called `vtable` and 122 * Perform key expansion: subkeys for CTR encryption and decryption 129 * Perform CTR encryption/decryption of some data. Processing is done 143 * CTR encryption/decryption and CBC-MAC, as used in the CCM and EAX [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-cipher.pod | 32 =item initialised for decryption using EVP_DecryptInit 82 | for decryption | | | | for encryption | 95 …| for decryption | <-------------------+ | | for encryption | … 128 … decryption decryption encryption encryption 132 … decryption decryption decryption decryption decryption decryption decryption decryption 137 … decryption decryption 146 … decryption decryption encryption encryption 148 … decryption decryption encryption encryption 150 … decryption decryption encryption encryption 152 … decryption decryption encryption encryption [all …]
|
H A D | provider-cipher.pod | 25 /* Encryption/decryption */ 126 =head2 Encryption/Decryption Functions 136 initialises the context for a decryption operation. 159 OSSL_FUNC_cipher_final() completes an encryption or decryption started through previous 163 Any final encryption/decryption output should be written to I<out> and the 168 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher 178 The output from the encryption/decryption should be stored in I<out> and the
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/fault/ |
H A D | decrypt_fault.ksh | 23 # Test that injected decryption errors are handled correctly. 27 # 2. Inject decryption errors on the file 20% of the time 29 # 4. Confirm that the decryption injection was added to the ZED logs 32 log_assert "Testing that injected decryption errors are handled correctly" 59 log_pass "Injected decryption errors are handled correctly"
|
/freebsd/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
H A D | aesopt.h | 74 #define AES_DECRYPT /* if support for decryption is needed */ 80 #define AES_REV_DKS /* define to reverse decryption key schedule */ 161 * ASSUME_VIA_ACE_PRESENT will remove the ordinary encryption/decryption 169 * VIA ACE also requires the decryption key schedule to be in reverse 190 * assembler code routines for encryption, decryption and key scheduling 194 * encryption and decryption and but with key scheduling in C 196 * encryption, decryption and key scheduling 198 * encryption and decryption and but with key scheduling in C 200 * encryption and decryption and but with key scheduling in C 246 * The code for encryption and decryption cycles through a number of rounds [all …]
|
/freebsd/sys/dev/qat/qat_api/firmware/include/ |
H A D | icp_qat_fw_mmp.h | 397 * Input parameter list for RSA 512 Decryption , 412 * Input parameter list for RSA 1024 Decryption with CRT , 475 * Input parameter list for RSA 1024 Decryption , 490 * Input parameter list for RSA 1024 Decryption with CRT , 553 * Input parameter list for RSA 1536 Decryption , 568 * Input parameter list for RSA 1536 Decryption with CRT , 631 * Input parameter list for RSA 2048 Decryption , 646 * Input parameter list for RSA 2048 Decryption with CRT , 709 * Input parameter list for RSA 3072 Decryption , 724 * Input parameter list for RSA 3072 Decryption with CRT , [all …]
|
H A D | icp_qat_fw_mmp_ids.h | 72 /**< Functionality ID for ECC SM2 decryption 317 /**< Functionality ID for RSA 512 Decryption 325 /**< Functionality ID for RSA 1024 Decryption with CRT 363 /**< Functionality ID for RSA 1024 Decryption 371 /**< Functionality ID for RSA 1024 Decryption with CRT 409 /**< Functionality ID for RSA 1536 Decryption 417 /**< Functionality ID for RSA 1536 Decryption with CRT 455 /**< Functionality ID for RSA 2048 Decryption 463 /**< Functionality ID for RSA 2048 Decryption with CRT 501 /**< Functionality ID for RSA 3072 Decryption [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | CMS_decrypt.pod | 31 If I<pkey> is NULL the function assumes that decryption was already done 41 On success, it also records in I<cms> the decryption key I<pkey>, and this 43 This call deallocates any decryption key stored in I<cms>. 50 On success, it also records in I<cms> the decryption key used, and this 52 This call deallocates any decryption key stored in I<cms>.
|
H A D | BF_encrypt.pod | 50 Blowfish consists of a key setup phase and the actual encryption or decryption 56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function. 59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by 81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte 87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 42 decryption has been attempted and any session ticket application data is 43 available. If ticket decryption was successful then the B<ss> argument contains 46 ticket decryption. See the L</NOTES> section below for further details. The value 70 decryption. The callback must check the B<status> value before performing any 71 action, as it is called even if ticket decryption fails.
|
H A D | EVP_OpenInit.pod | 5 EVP_OpenInit, EVP_OpenUpdate, EVP_OpenFinal - EVP envelope decryption 20 decryption. They decrypt a public key encrypted symmetric key and 23 EVP_OpenInit() initializes a cipher context B<ctx> for decryption
|
H A D | EVP_PKEY_decrypt.pod | 21 context using key I<pkey> for a decryption operation. 24 context using key I<pkey> for a decryption operation and sets the 27 The EVP_PKEY_decrypt() function performs a public key decryption operation
|
H A D | SSL_CTX_set_default_passwd_cb.pod | 46 password to be used during decryption. 51 callback is used for reading/decryption (rwflag=0) or writing/encryption 69 for comparison in order to catch typos, that would make decryption
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_rsaoaep.t | 92 "RSA OAEP Decryption"); 103 "Incorrect digest for RSA OAEP Decryption"); 114 "Incorrect mgf1-digest for RSA OAEP Decryption"); 138 "RSA OAEP Decryption with default digests"); 161 "RSA OAEP Decryption with explicit default digests");
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | aes-cbc.c | 53 * aes_128_cbc_decrypt - AES-128 CBC decryption 54 * @key: Decryption key 55 * @iv: Decryption IV for CBC mode (16 bytes)
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | BF_encrypt.3 | 187 Blowfish consists of a key setup phase and the actual encryption or decryption 193 \&\fBBF_ecb_encrypt()\fR is the basic Blowfish encryption and decryption function. 196 or decryption (\fB\s-1BF_DECRYPT\s0\fR) shall be performed. The vector pointed at by 218 decryption (\s-1BF_DECRYPT\s0) shall be performed. \fBivec\fR must point at an 8 byte 224 or decryption (\fB\s-1BF_DECRYPT\s0\fR) shall be performed. \fBivec\fR must point at an
|
H A D | CMS_decrypt.3 | 166 If \fIpkey\fR is \s-1NULL\s0 the function assumes that decryption was already done 176 On success, it also records in \fIcms\fR the decryption key \fIpkey\fR, and this 178 This call deallocates any decryption key stored in \fIcms\fR. 185 On success, it also records in \fIcms\fR the decryption key used, and this 187 This call deallocates any decryption key stored in \fIcms\fR.
|
H A D | SSL_CTX_set_session_ticket_cb.3 | 177 decryption has been attempted and any session ticket application data is 178 available. If ticket decryption was successful then the \fBss\fR argument contains 181 ticket decryption. See the \*(L"\s-1NOTES\*(R"\s0 section below for further details. The value 204 decryption. The callback must check the \fBstatus\fR value before performing any 205 action, as it is called even if ticket decryption fails.
|
/freebsd/sys/contrib/openzfs/include/sys/ |
H A D | qat.h | 102 * Number of jobs submitted to QAT decryption engine. 106 * Total bytes sent to QAT decryption engine. 110 * Total bytes output from QAT decryption engine. 114 * Number of fails in the QAT encryption / decryption engine.
|
/freebsd/share/man/man9/ |
H A D | crypto_session.9 | 165 Decryption operations require the digest, or tag, 175 Decryption operations fail without decrypting the data if the provided digest 220 Length of encryption or decryption key in bytes. 223 Pointer to encryption or decryption key.
|
/freebsd/crypto/libecc/src/examples/hash/ |
H A D | tdes.h | 26 u64 sk[16]; /* encryption/decryption subkeys */ 68 /* DES encryption/decryption */ 74 /* TDES encryption/decryption */
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-enc.pod.in | 51 either by itself or in addition to the encryption or decryption. 97 the data is base64 encoded after encryption. If decryption is set then 156 again during decryption. 181 or decryption. 202 decryption. This option exists only if OpenSSL was compiled with the zlib 207 Use NULL cipher (no encryption or decryption of input). 269 Conversely, when the B<-S> option is used during decryption, the ciphertext
|