Home
last modified time | relevance | path

Searched full:encrypt (Results 1 – 25 of 854) sorted by relevance

12345678910>>...35

/freebsd/crypto/openssl/test/ssl-tests/
H A D19-mac-then-encrypt.cnf5 test-0 = 0-disable-encrypt-then-mac-server-sha
6 test-1 = 1-disable-encrypt-then-mac-client-sha
7 test-2 = 2-disable-encrypt-then-mac-both-sha
8 test-3 = 3-disable-encrypt-then-mac-server-sha2
9 test-4 = 4-disable-encrypt-then-mac-client-sha2
10 test-5 = 5-disable-encrypt-then-mac-both-sha2
11 test-6 = 6-disable-encrypt-then-mac-server-sha-tls1
12 test-7 = 7-disable-encrypt-then-mac-client-sha-tls1
13 test-8 = 8-disable-encrypt-then-mac-both-sha-tls1
16 [0-disable-encrypt-then-mac-server-sha]
[all …]
H A D19-mac-then-encrypt.cnf.in24 name => "disable-encrypt-then-mac-server-sha",
37 name => "disable-encrypt-then-mac-client-sha",
50 name => "disable-encrypt-then-mac-both-sha",
67 name => "disable-encrypt-then-mac-server-sha2",
80 name => "disable-encrypt-then-mac-client-sha2",
93 name => "disable-encrypt-then-mac-both-sha2",
110 name => "disable-encrypt-then-mac-server-sha-tls1",
125 name => "disable-encrypt-then-mac-client-sha-tls1",
140 name => "disable-encrypt-then-mac-both-sha-tls1",
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpciph_camellia.txt33 # ECB-CAMELLIA128.Encrypt
36 Operation = ENCRYPT
42 Operation = ENCRYPT
48 Operation = ENCRYPT
53 # ECB-CAMELLIA128.Encrypt and ECB-CAMELLIA128.Decrypt
75 # ECB-CAMELLIA192.Encrypt and ECB-CAMELLIA192.Decrypt
97 # ECB-CAMELLIA256.Encrypt and ECB-CAMELLIA256.Decrypt
121 # CBC-CAMELLIA128.Encrypt and CBC-CAMELLIA128.Decrypt
151 # CBC-CAMELLIA192.Encrypt and CBC-CAMELLIA192.Decrypt
181 # CBC-CAMELLIA256.Encrypt and CBC-CAMELLIA256.Decrypt
[all …]
H A Devpciph_aes_common.txt20 Operation = ENCRYPT
24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt)
28 Operation = ENCRYPT
33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt)
37 Operation = ENCRYPT
42 # AES 128 ECB tests (from NIST test vectors, encrypt)
58 # AES 128 CBC tests (from NIST test vectors, encrypt)
62 # AES 192 CBC tests (from NIST test vectors, encrypt)
66 # AES 256 CBC tests (from NIST test vectors, encrypt)
77 # ECB-AES128.Encrypt and ECB-AES128.Decrypt
[all …]
H A Devpciph_des3_common.txt69 CtrlInit = encrypt-check:0
70 Operation = ENCRYPT
80 Operation = ENCRYPT
82 CtrlInit = encrypt-check:0
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/
H A Dhcrypto_des.394 Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc).
100 \fIin\fP data to encrypt
102 \fIout\fP data to encrypt
110 \fIencp\fP if non zero, encrypt. if zero, decrypt.
116 Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback.
122 \fIin\fP data to encrypt
124 \fIout\fP data to encrypt
134 \fIencp\fP if non zero, encrypt. if zero, decrypt.
155 Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt.
159 \fIinput\fP data to encrypt
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-pkey.793 .IP encrypt 4
94 .IX Item "encrypt"
95 This state represents the PKEY when it is ready to encrypt some plaintext.
150 … EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt |
178 …start newed digest verify verify encrypt decrypt derive …
194encrypt encrypt encrypt encrypt encrypt encrypt encrypt
195 EVP_PKEY_encrypt encrypt
215 …EVP_PKEY_CTX_get_params newed digest verify verify encrypt
217 …EVP_PKEY_CTX_set_params newed digest verify verify encrypt
219 …EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt
[all …]
/freebsd/contrib/ntp/libntp/
H A Da_md5encrypt.c108 msyslog(LOG_ERR, "MAC encrypt: CMAC %s CTX new failed.", CMAC); in make_mac()
112 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Init failed.", CMAC); in make_mac()
116 msyslog(LOG_ERR, "MAC encrypt: CMAC %s buf too small.", CMAC); in make_mac()
120 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Update failed.", CMAC); in make_mac()
124 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Final failed.", CMAC); in make_mac()
142 msyslog(LOG_ERR, "MAC encrypt: MAC %s buf too small.", in make_mac()
147 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update key failed.", in make_mac()
152 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update data failed.", in make_mac()
157 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Final failed.", in make_mac()
172 msyslog(LOG_ERR, "%s", "MAC encrypt in make_mac()
[all...]
/freebsd/contrib/libfido2/src/
H A Daes256.c12 fido_blob_t *out, int encrypt) in aes256_cbc() argument
38 if (EVP_CipherInit(ctx, cipher, key->ptr, iv, encrypt) == 0 || in aes256_cbc()
56 fido_blob_t *out, int encrypt) in aes256_cbc_proto1() argument
62 return aes256_cbc(key, iv, in, out, encrypt); in aes256_cbc_proto1()
67 fido_blob_t *out, int encrypt) in aes256_cbc_fips() argument
83 if (encrypt) { in aes256_cbc_fips()
96 if (aes256_cbc(&key, iv, &cin, &cout, encrypt) < 0) in aes256_cbc_fips()
98 if (encrypt) { in aes256_cbc_fips()
117 int encrypt) in aes256_gcm() argument
135 /* add tag to (on encrypt) or trim tag from the output (on decrypt) */ in aes256_gcm()
[all …]
/freebsd/sys/crypto/openssl/
H A Dossl_aes.c88 bool encrypt; in ossl_aes_cbc() local
91 encrypt = CRYPTO_OP_IS_ENCRYPT(crp->crp_op); in ossl_aes_cbc()
99 if (encrypt) in ossl_aes_cbc()
108 if (encrypt) in ossl_aes_cbc()
143 /* Figure out how many blocks we can encrypt/decrypt at once. */ in ossl_aes_cbc()
146 AES_CBC_ENCRYPT(in, out, seglen, &key, iv, encrypt); in ossl_aes_cbc()
183 bool encrypt; in ossl_aes_gcm() local
185 encrypt = CRYPTO_OP_IS_ENCRYPT(crp->crp_op); in ossl_aes_gcm()
188 if (encrypt) in ossl_aes_gcm()
198 } else if (encrypt) { in ossl_aes_gcm()
[all …]
/freebsd/contrib/file/magic/Magdir/
H A Dpgp109 >11 byte 0x01 RSA (Encrypt or Sign) 1024b
110 >11 byte 0x02 RSA Encrypt-Only 1024b
126 >12 byte 0x01 RSA (Encrypt or Sign) 2048b
127 >12 byte 0x02 RSA Encrypt-Only 2048b
143 >12 byte 0x01 RSA (Encrypt or Sign) 3072b
144 >12 byte 0x02 RSA Encrypt-Only 3072b
160 >12 byte 0x01 RSA (Encrypt or Sign) 4096b
161 >12 byte 0x02 RSA Encrypt-Only 4096b
177 >12 byte 0x01 RSA (Encrypt or Sign) 8192b
178 >12 byte 0x02 RSA Encrypt-Only 8192b
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-cms.178 [\fB\-encrypt\fR]
224 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages.
228 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt,
251 .IP \fB\-encrypt\fR 4
252 .IX Item "-encrypt"
253 Encrypt data for the given recipient certificates. Input file is the message
316 Encrypt content using supplied symmetric key and algorithm using a CMS
388 \&\fB\-EncryptedData_decrypt\fR, \fB\-encrypt\fR and \fB\-decrypt\fR options. When used
389 with \fB\-encrypt\fR or \fB\-decrypt\fR the supplied key is used to wrap or unwrap the
395 \&\fB\-encrypt\fR. With \fB\-decrypt\fR operations the \fIid\fR is used to locate the
[all …]
H A Dopenssl-smime.169 [\fB\-encrypt\fR]
152 This command handles S/MIME mail. It can encrypt, decrypt, sign
157 \&\fB\-encrypt\fR, \fB\-decrypt\fR, \fB\-sign\fR, \fB\-resign\fR, \fB\-verify\fR, and \fB\-pk7out\f…
163 .IP \fB\-encrypt\fR 4
164 .IX Item "-encrypt"
165 Encrypt mail for the given recipient certificates. Input file is the message
250 If not specified, AES\-256\-CBC is used as the default. Only used with \fB\-encrypt\fR.
386 The options \fB\-encrypt\fR and \fB\-decrypt\fR reflect common usage in S/MIME
396 and no longer DER. Streaming is supported for the \fB\-encrypt\fR operation and the
471 \& openssl smime \-encrypt \-in in.txt \-out mail.msg \-from steve@openssl.org \e
[all …]
/freebsd/crypto/krb5/src/lib/crypto/builtin/des/doc/
H A Dlibdes.doc60 ecb_encrypt(input,output,schedule,encrypt)
63 int encrypt; /* 0 ==> decrypt, else encrypt */
70 If encrypt is non-zero, the input (cleartext) is encrypted into the
73 If encrypt is zero, the input (now ciphertext) is decrypted into
84 cbc_encrypt(input,output,length,schedule,ivec,encrypt)
93 int encrypt /* 0 ==> decrypt; else encrypt*/
96 If encrypt is non-zero, the routine cipher-block-chain encrypts
103 If encrypt is zero, the routine cipher-block chain decrypts the INPUT
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-pkey.pod45 =item encrypt
47 This state represents the PKEY when it is ready to encrypt some plaintext.
113 … EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt |
149 …start newed digest verify verify encrypt decrypt derive …
165encrypt encrypt encrypt encrypt encrypt encrypt encrypt
166 EVP_PKEY_encrypt encrypt
186 …EVP_PKEY_CTX_get_params newed digest verify verify encrypt
188 …EVP_PKEY_CTX_set_params newed digest verify verify encrypt
190 …EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt
192 …EVP_PKEY_CTX_settable_params newed digest verify verify encrypt
[all …]
/freebsd/crypto/openssl/test/
H A Dbio_enc_test.c17 #define ENCRYPT 1 macro
50 /* Encrypt tests */ in do_bio_cipher()
56 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) in do_bio_cipher()
70 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { in do_bio_cipher()
71 TEST_info("Split encrypt failed @ operation %d", i); in do_bio_cipher()
86 TEST_info("Encrypt overstep check failed @ operation %d", i); in do_bio_cipher()
97 TEST_info("Encrypt compare failed @ operation %d", i); in do_bio_cipher()
109 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { in do_bio_cipher()
110 TEST_info("Small chunk encrypt failed @ operation %d", i); in do_bio_cipher()
124 TEST_info("Small chunk encrypt compare failed @ operation %d", i); in do_bio_cipher()
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-cms.pod.in23 [B<-encrypt>]
131 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages.
136 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt,
172 =item B<-encrypt>
174 Encrypt data for the given recipient certificates. Input file is the message
249 Encrypt content using supplied symmetric key and algorithm using a CMS
343 B<-EncryptedData_decrypt>, B<-encrypt> and B<-decrypt> options. When used
344 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the
351 B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the
426 If not specified, AES-256-CBC is used as the default. Only used with B<-encrypt> and
[all …]
/freebsd/crypto/openssl/demos/
H A DREADME.txt15 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt
16 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt
17 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
31 encrypt:
32 rsa_encrypt.c Encrypt and decrypt data using an RSA keypair.
/freebsd/crypto/openssl/test/recipes/
H A D15-test_mp_rsa.t70 '-encrypt', '-in', $cleartext,
72 "rsa $name encrypt");
85 '-encrypt', '-in', $cleartext,
87 "rsa $name encrypt");
94 '-encrypt', '-in', $cleartext,
96 "rsa $name encrypt");
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dencrypt.c72 #include "encrypt.h"
229 printf("Usage: encrypt enable <type> [input|output]\n"); in EncryptEnable()
245 printf("Usage: encrypt disable <type> [input|output]\n"); in EncryptDisable()
278 printf("Usage: encrypt type <type> [input|output]\n"); in EncryptType()
312 printf("Usage: encrypt start [input|output]\n"); in EncryptStart()
315 printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode); in EncryptStart()
355 printf("Usage: encrypt stop [input|output]\n"); in EncryptStop()
358 printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode); in EncryptStop()
494 /* Called when we receive a WONT or a DONT ENCRYPT after we sent a DO
495 encrypt */
[all …]
/freebsd/crypto/openssh/
H A DPROTOCOL.chacha20poly130541 to encrypt the 4 byte packet length field. The second instance,
43 (Authenticated Encryption with Associated Data) that is used to encrypt
49 the MAC. By using an independently-keyed cipher instance to encrypt the
80 To send a packet, first encode the 4 byte length and encrypt it using
81 K_1. Encrypt the packet payload (using K_2) and append it to the
88 used to encrypt more than 2^70 bytes under the same {key, nonce}. The
/freebsd/tests/sys/opencrypto/
H A Dcryptotest.py86 self.runGCM(i, 'ENCRYPT')
93 if mode == 'ENCRYPT':
95 curfun = Crypto.encrypt
132 if mode == 'ENCRYPT':
134 rct, rtag = c.encrypt(pt, iv, aad)
173 if mode == 'ENCRYPT':
175 curfun = Crypto.encrypt
205 if mode == 'ENCRYPT':
207 curfun = Crypto.encrypt
265 r, tag = Crypto.encrypt(c, payload,
[all …]
/freebsd/contrib/telnet/libtelnet/
H A Dencrypt.c32 static const char sccsid[] = "@(#)encrypt.c 8.2 (Berkeley) 5/30/95";
65 #include "encrypt.h"
228 printf("Usage: encrypt enable <type> [input|output]\n"); in EncryptEnable()
244 printf("Usage: encrypt disable <type> [input|output]\n"); in EncryptDisable()
277 printf("Usage: encrypt type <type> [input|output]\n"); in EncryptType()
311 printf("Usage: encrypt start [input|output]\n"); in EncryptStart()
314 printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode); in EncryptStart()
354 printf("Usage: encrypt stop [input|output]\n"); in EncryptStop()
357 printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode); in EncryptStop()
472 * Called when ENCRYPT SUPPORT is received.
[all …]
/freebsd/crypto/heimdal/appl/telnet/telnet/
H A Dtelnet.1329 .It Ic encrypt Ar argument ...
330 The encrypt command manipulates the information sent through the
331 .Dv TELNET ENCRYPT
335 .Dv TELNET ENCRYPT
338 Valid arguments for the encrypt command are as follows:
347 .Ic encrypt disable ?\&
355 .Ic encrypt enable ?\&
359 .Ic encrypt start input
363 .Ic encrypt stop input
367 .Ic encrypt start output
[all …]
/freebsd/crypto/openssl/demos/cipher/
H A Dariacbc.c34 /* Example plaintext to encrypt */
63 printf("ARIA CBC Encrypt:\n"); in aria_cbc_encrypt()
67 /* Create a context for the encrypt operation */ in aria_cbc_encrypt()
76 * Initialise an encrypt operation with the cipher/mode, key and IV. in aria_cbc_encrypt()
82 /* Encrypt plaintext */ in aria_cbc_encrypt()
131 * Initialise an encrypt operation with the cipher/mode, key and IV. in aria_cbc_decrypt()

12345678910>>...35