| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 19-mac-then-encrypt.cnf | 5 test-0 = 0-disable-encrypt-then-mac-server-sha 6 test-1 = 1-disable-encrypt-then-mac-client-sha 7 test-2 = 2-disable-encrypt-then-mac-both-sha 8 test-3 = 3-disable-encrypt-then-mac-server-sha2 9 test-4 = 4-disable-encrypt-then-mac-client-sha2 10 test-5 = 5-disable-encrypt-then-mac-both-sha2 11 test-6 = 6-disable-encrypt-then-mac-server-sha-tls1 12 test-7 = 7-disable-encrypt-then-mac-client-sha-tls1 13 test-8 = 8-disable-encrypt-then-mac-both-sha-tls1 16 [0-disable-encrypt-then-mac-server-sha] [all …]
|
| H A D | 19-mac-then-encrypt.cnf.in | 24 name => "disable-encrypt-then-mac-server-sha", 37 name => "disable-encrypt-then-mac-client-sha", 50 name => "disable-encrypt-then-mac-both-sha", 67 name => "disable-encrypt-then-mac-server-sha2", 80 name => "disable-encrypt-then-mac-client-sha2", 93 name => "disable-encrypt-then-mac-both-sha2", 110 name => "disable-encrypt-then-mac-server-sha-tls1", 125 name => "disable-encrypt-then-mac-client-sha-tls1", 140 name => "disable-encrypt-then-mac-both-sha-tls1",
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpciph_camellia.txt | 33 # ECB-CAMELLIA128.Encrypt 36 Operation = ENCRYPT 42 Operation = ENCRYPT 48 Operation = ENCRYPT 53 # ECB-CAMELLIA128.Encrypt and ECB-CAMELLIA128.Decrypt 75 # ECB-CAMELLIA192.Encrypt and ECB-CAMELLIA192.Decrypt 97 # ECB-CAMELLIA256.Encrypt and ECB-CAMELLIA256.Decrypt 121 # CBC-CAMELLIA128.Encrypt and CBC-CAMELLIA128.Decrypt 151 # CBC-CAMELLIA192.Encrypt and CBC-CAMELLIA192.Decrypt 181 # CBC-CAMELLIA256.Encrypt and CBC-CAMELLIA256.Decrypt [all …]
|
| H A D | evpciph_aes_common.txt | 20 Operation = ENCRYPT 24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt) 28 Operation = ENCRYPT 33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 37 Operation = ENCRYPT 42 # AES 128 ECB tests (from NIST test vectors, encrypt) 58 # AES 128 CBC tests (from NIST test vectors, encrypt) 62 # AES 192 CBC tests (from NIST test vectors, encrypt) 66 # AES 256 CBC tests (from NIST test vectors, encrypt) 77 # ECB-AES128.Encrypt and ECB-AES128.Decrypt [all …]
|
| H A D | evpciph_des3_common.txt | 69 CtrlInit = encrypt-check:0 70 Operation = ENCRYPT 80 Operation = ENCRYPT 82 CtrlInit = encrypt-check:0
|
| /freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
| H A D | hcrypto_des.3 | 94 Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc). 100 \fIin\fP data to encrypt 102 \fIout\fP data to encrypt 110 \fIencp\fP if non zero, encrypt. if zero, decrypt. 116 Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback. 122 \fIin\fP data to encrypt 124 \fIout\fP data to encrypt 134 \fIencp\fP if non zero, encrypt. if zero, decrypt. 155 Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt. 159 \fIinput\fP data to encrypt [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | life_cycle-pkey.7 | 93 .IP encrypt 4 94 .IX Item "encrypt" 95 This state represents the PKEY when it is ready to encrypt some plaintext. 150 … EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt | 178 …start newed digest verify verify encrypt decrypt derive … 194 … encrypt encrypt encrypt encrypt encrypt encrypt encrypt … 195 EVP_PKEY_encrypt encrypt 215 …EVP_PKEY_CTX_get_params newed digest verify verify encrypt … 217 …EVP_PKEY_CTX_set_params newed digest verify verify encrypt … 219 …EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt … [all …]
|
| /freebsd/contrib/ntp/libntp/ |
| H A D | a_md5encrypt.c | 108 msyslog(LOG_ERR, "MAC encrypt: CMAC %s CTX new failed.", CMAC); in make_mac() 112 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Init failed.", CMAC); in make_mac() 116 msyslog(LOG_ERR, "MAC encrypt: CMAC %s buf too small.", CMAC); in make_mac() 120 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Update failed.", CMAC); in make_mac() 124 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Final failed.", CMAC); in make_mac() 142 msyslog(LOG_ERR, "MAC encrypt: MAC %s buf too small.", in make_mac() 147 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update key failed.", in make_mac() 152 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update data failed.", in make_mac() 157 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Final failed.", in make_mac() 172 msyslog(LOG_ERR, "%s", "MAC encrypt in make_mac() [all...] |
| /freebsd/contrib/libfido2/src/ |
| H A D | aes256.c | 12 fido_blob_t *out, int encrypt) in aes256_cbc() argument 38 if (EVP_CipherInit(ctx, cipher, key->ptr, iv, encrypt) == 0 || in aes256_cbc() 56 fido_blob_t *out, int encrypt) in aes256_cbc_proto1() argument 62 return aes256_cbc(key, iv, in, out, encrypt); in aes256_cbc_proto1() 67 fido_blob_t *out, int encrypt) in aes256_cbc_fips() argument 83 if (encrypt) { in aes256_cbc_fips() 96 if (aes256_cbc(&key, iv, &cin, &cout, encrypt) < 0) in aes256_cbc_fips() 98 if (encrypt) { in aes256_cbc_fips() 117 int encrypt) in aes256_gcm() argument 135 /* add tag to (on encrypt) or trim tag from the output (on decrypt) */ in aes256_gcm() [all …]
|
| /freebsd/sys/crypto/openssl/ |
| H A D | ossl_aes.c | 88 bool encrypt; in ossl_aes_cbc() local 91 encrypt = CRYPTO_OP_IS_ENCRYPT(crp->crp_op); in ossl_aes_cbc() 99 if (encrypt) in ossl_aes_cbc() 108 if (encrypt) in ossl_aes_cbc() 143 /* Figure out how many blocks we can encrypt/decrypt at once. */ in ossl_aes_cbc() 146 AES_CBC_ENCRYPT(in, out, seglen, &key, iv, encrypt); in ossl_aes_cbc() 183 bool encrypt; in ossl_aes_gcm() local 185 encrypt = CRYPTO_OP_IS_ENCRYPT(crp->crp_op); in ossl_aes_gcm() 188 if (encrypt) in ossl_aes_gcm() 198 } else if (encrypt) { in ossl_aes_gcm() [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | pgp | 109 >11 byte 0x01 RSA (Encrypt or Sign) 1024b 110 >11 byte 0x02 RSA Encrypt-Only 1024b 126 >12 byte 0x01 RSA (Encrypt or Sign) 2048b 127 >12 byte 0x02 RSA Encrypt-Only 2048b 143 >12 byte 0x01 RSA (Encrypt or Sign) 3072b 144 >12 byte 0x02 RSA Encrypt-Only 3072b 160 >12 byte 0x01 RSA (Encrypt or Sign) 4096b 161 >12 byte 0x02 RSA Encrypt-Only 4096b 177 >12 byte 0x01 RSA (Encrypt or Sign) 8192b 178 >12 byte 0x02 RSA Encrypt-Only 8192b [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-cms.1 | 78 [\fB\-encrypt\fR] 224 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages. 228 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt, 251 .IP \fB\-encrypt\fR 4 252 .IX Item "-encrypt" 253 Encrypt data for the given recipient certificates. Input file is the message 316 Encrypt content using supplied symmetric key and algorithm using a CMS 388 \&\fB\-EncryptedData_decrypt\fR, \fB\-encrypt\fR and \fB\-decrypt\fR options. When used 389 with \fB\-encrypt\fR or \fB\-decrypt\fR the supplied key is used to wrap or unwrap the 395 \&\fB\-encrypt\fR. With \fB\-decrypt\fR operations the \fIid\fR is used to locate the [all …]
|
| H A D | openssl-smime.1 | 69 [\fB\-encrypt\fR] 152 This command handles S/MIME mail. It can encrypt, decrypt, sign 157 \&\fB\-encrypt\fR, \fB\-decrypt\fR, \fB\-sign\fR, \fB\-resign\fR, \fB\-verify\fR, and \fB\-pk7out\f… 163 .IP \fB\-encrypt\fR 4 164 .IX Item "-encrypt" 165 Encrypt mail for the given recipient certificates. Input file is the message 250 If not specified, AES\-256\-CBC is used as the default. Only used with \fB\-encrypt\fR. 386 The options \fB\-encrypt\fR and \fB\-decrypt\fR reflect common usage in S/MIME 396 and no longer DER. Streaming is supported for the \fB\-encrypt\fR operation and the 471 \& openssl smime \-encrypt \-in in.txt \-out mail.msg \-from steve@openssl.org \e [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/des/doc/ |
| H A D | libdes.doc | 60 ecb_encrypt(input,output,schedule,encrypt) 63 int encrypt; /* 0 ==> decrypt, else encrypt */ 70 If encrypt is non-zero, the input (cleartext) is encrypted into the 73 If encrypt is zero, the input (now ciphertext) is decrypted into 84 cbc_encrypt(input,output,length,schedule,ivec,encrypt) 93 int encrypt /* 0 ==> decrypt; else encrypt*/ 96 If encrypt is non-zero, the routine cipher-block-chain encrypts 103 If encrypt is zero, the routine cipher-block chain decrypts the INPUT
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | life_cycle-pkey.pod | 45 =item encrypt 47 This state represents the PKEY when it is ready to encrypt some plaintext. 113 … EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt | 149 …start newed digest verify verify encrypt decrypt derive … 165 … encrypt encrypt encrypt encrypt encrypt encrypt encrypt … 166 EVP_PKEY_encrypt encrypt 186 …EVP_PKEY_CTX_get_params newed digest verify verify encrypt … 188 …EVP_PKEY_CTX_set_params newed digest verify verify encrypt … 190 …EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt … 192 …EVP_PKEY_CTX_settable_params newed digest verify verify encrypt … [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | bio_enc_test.c | 17 #define ENCRYPT 1 macro 50 /* Encrypt tests */ in do_bio_cipher() 56 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) in do_bio_cipher() 70 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { in do_bio_cipher() 71 TEST_info("Split encrypt failed @ operation %d", i); in do_bio_cipher() 86 TEST_info("Encrypt overstep check failed @ operation %d", i); in do_bio_cipher() 97 TEST_info("Encrypt compare failed @ operation %d", i); in do_bio_cipher() 109 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { in do_bio_cipher() 110 TEST_info("Small chunk encrypt failed @ operation %d", i); in do_bio_cipher() 124 TEST_info("Small chunk encrypt compare failed @ operation %d", i); in do_bio_cipher() [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-cms.pod.in | 23 [B<-encrypt>] 131 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages. 136 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt, 172 =item B<-encrypt> 174 Encrypt data for the given recipient certificates. Input file is the message 249 Encrypt content using supplied symmetric key and algorithm using a CMS 343 B<-EncryptedData_decrypt>, B<-encrypt> and B<-decrypt> options. When used 344 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the 351 B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the 426 If not specified, AES-256-CBC is used as the default. Only used with B<-encrypt> and [all …]
|
| /freebsd/crypto/openssl/demos/ |
| H A D | README.txt | 15 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt 16 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt 17 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt 31 encrypt: 32 rsa_encrypt.c Encrypt and decrypt data using an RSA keypair.
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 15-test_mp_rsa.t | 70 '-encrypt', '-in', $cleartext, 72 "rsa $name encrypt"); 85 '-encrypt', '-in', $cleartext, 87 "rsa $name encrypt"); 94 '-encrypt', '-in', $cleartext, 96 "rsa $name encrypt");
|
| /freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
| H A D | encrypt.c | 72 #include "encrypt.h" 229 printf("Usage: encrypt enable <type> [input|output]\n"); in EncryptEnable() 245 printf("Usage: encrypt disable <type> [input|output]\n"); in EncryptDisable() 278 printf("Usage: encrypt type <type> [input|output]\n"); in EncryptType() 312 printf("Usage: encrypt start [input|output]\n"); in EncryptStart() 315 printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode); in EncryptStart() 355 printf("Usage: encrypt stop [input|output]\n"); in EncryptStop() 358 printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode); in EncryptStop() 494 /* Called when we receive a WONT or a DONT ENCRYPT after we sent a DO 495 encrypt */ [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL.chacha20poly1305 | 41 to encrypt the 4 byte packet length field. The second instance, 43 (Authenticated Encryption with Associated Data) that is used to encrypt 49 the MAC. By using an independently-keyed cipher instance to encrypt the 80 To send a packet, first encode the 4 byte length and encrypt it using 81 K_1. Encrypt the packet payload (using K_2) and append it to the 88 used to encrypt more than 2^70 bytes under the same {key, nonce}. The
|
| /freebsd/tests/sys/opencrypto/ |
| H A D | cryptotest.py | 86 self.runGCM(i, 'ENCRYPT') 93 if mode == 'ENCRYPT': 95 curfun = Crypto.encrypt 132 if mode == 'ENCRYPT': 134 rct, rtag = c.encrypt(pt, iv, aad) 173 if mode == 'ENCRYPT': 175 curfun = Crypto.encrypt 205 if mode == 'ENCRYPT': 207 curfun = Crypto.encrypt 265 r, tag = Crypto.encrypt(c, payload, [all …]
|
| /freebsd/contrib/telnet/libtelnet/ |
| H A D | encrypt.c | 32 static const char sccsid[] = "@(#)encrypt.c 8.2 (Berkeley) 5/30/95"; 65 #include "encrypt.h" 228 printf("Usage: encrypt enable <type> [input|output]\n"); in EncryptEnable() 244 printf("Usage: encrypt disable <type> [input|output]\n"); in EncryptDisable() 277 printf("Usage: encrypt type <type> [input|output]\n"); in EncryptType() 311 printf("Usage: encrypt start [input|output]\n"); in EncryptStart() 314 printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode); in EncryptStart() 354 printf("Usage: encrypt stop [input|output]\n"); in EncryptStop() 357 printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode); in EncryptStop() 472 * Called when ENCRYPT SUPPORT is received. [all …]
|
| /freebsd/crypto/heimdal/appl/telnet/telnet/ |
| H A D | telnet.1 | 329 .It Ic encrypt Ar argument ... 330 The encrypt command manipulates the information sent through the 331 .Dv TELNET ENCRYPT 335 .Dv TELNET ENCRYPT 338 Valid arguments for the encrypt command are as follows: 347 .Ic encrypt disable ?\& 355 .Ic encrypt enable ?\& 359 .Ic encrypt start input 363 .Ic encrypt stop input 367 .Ic encrypt start output [all …]
|
| /freebsd/crypto/openssl/demos/cipher/ |
| H A D | ariacbc.c | 34 /* Example plaintext to encrypt */ 63 printf("ARIA CBC Encrypt:\n"); in aria_cbc_encrypt() 67 /* Create a context for the encrypt operation */ in aria_cbc_encrypt() 76 * Initialise an encrypt operation with the cipher/mode, key and IV. in aria_cbc_encrypt() 82 /* Encrypt plaintext */ in aria_cbc_encrypt() 131 * Initialise an encrypt operation with the cipher/mode, key and IV. in aria_cbc_decrypt()
|