Searched refs:decapsulate (Results 1 – 19 of 19) sorted by relevance
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | pkey.dot | 14 decapsulate [fontcolor="#A16AE8", color="#A16AE8"] 41 newed -> decapsulate [label="EVP_PKEY_decapsulate_init", fontcolor="#A16AE8", color="#A16AE8"]; 42 decapsulate -> decapsulate [label="EVP_PKEY_decapsulate", fontcolor="#A16AE8", color="#A16AE8"];
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 22 =item decapsulate 103 …| decapsulate | EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt … 149 … verify encrypt decrypt derive encapsulate decapsulate parameter … 174 … decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate decapsulate d… 175 … decapsulate 186 … verify encrypt decrypt derive encapsulate decapsulate parameter … 188 … verify encrypt decrypt derive encapsulate decapsulate parameter … 190 … verify encrypt decrypt derive encapsulate decapsulate parameter … 192 … verify encrypt decrypt derive encapsulate decapsulate parameter … 213 <th style="border:1px solid" align="center">decapsulate</th> [all …]
|
H A D | EVP_KEM-RSA.pod | 28 The decapsulate function recovers the secret using the RSA private key.
|
H A D | EVP_KEM-X25519.pod | 32 The decapsulate function uses the recipient private key and the
|
H A D | EVP_KEM-EC.pod | 31 The decapsulate function uses the recipient private key and the
|
H A D | provider-base.pod | 621 resulting I<ciphertext>, finally the client executes I<decapsulate> to retrieve
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | kem.c | 280 return ctx->op.encap.kem->decapsulate(ctx->op.encap.algctx, in EVP_PKEY_decapsulate() 359 if (kem->decapsulate != NULL) in evp_kem_from_algorithm() 361 kem->decapsulate = OSSL_FUNC_kem_decapsulate(fns); in evp_kem_from_algorithm()
|
H A D | evp_local.h | 258 OSSL_FUNC_kem_decapsulate_fn *decapsulate; member
|
/freebsd/kerberos5/lib/libgssapi_krb5/ |
H A D | Makefile | 27 decapsulate.c \
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_encapsulate.pod | 111 * decapsulate it using their private key to retrieve the 'secret'.
|
/freebsd/crypto/heimdal/lib/gssapi/ |
H A D | Makefile.am | 38 krb5/decapsulate.c \
|
H A D | Makefile.in | 140 krb5/context_time.lo krb5/copy_ccache.lo krb5/decapsulate.lo \ 576 krb5/decapsulate.c \ 933 krb5/decapsulate.lo: krb5/$(am__dirstamp) \ 1341 -rm -f krb5/decapsulate.$(OBJEXT) 1342 -rm -f krb5/decapsulate.lo 1669 @AMDEP_TRUE@@am__include@ @am__quote@krb5/$(DEPDIR)/decapsulate.Plo@am__quote@
|
H A D | ChangeLog | 1429 * decapsulate.c: Use const void * to instead of unsigned char * to 1432 * decapsulate.c: Less pointer signedness warnings. 1631 * decapsulate.c: use rk_UNCONST 2040 * decapsulate.c (gssapi_krb5_get_mech): make non static 2130 * decapsulate.c (_gssapi_verify_pad): verify padding of a gss 2179 * decapsulate.c: add _gssapi_decapsulate, from Luke Howard 2201 * decapsulate.c: add decap functions that doesn't take the token 2831 * decapsulate.c (gssapi_krb5_verify_header): sanity-check length
|
/freebsd/crypto/openssl/doc/designs/ |
H A D | ML-KEM.md | 138 **decapsulate** implementation **must** return success and a synthetic
|
/freebsd/crypto/openssl/test/ |
H A D | evp_test.c | 2305 static int decapsulate(EVP_TEST *t, EVP_PKEY_CTX *ctx, const char *op, in decapsulate() function 2412 ret = decapsulate(t, kdata->ctx, kdata->op, wrapped, wrappedlen, in kem_test_run() 2415 ret = decapsulate(t, kdata->ctx, kdata->op, kdata->input, kdata->inputlen, in kem_test_run()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 248 encapsulate and decapsulate shared secrets with the chosen key type.
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.1998 | 2508 * lib/gssapi/decapsulate.c: New function
|
/freebsd/share/doc/IPv6/ |
H A D | IMPLEMENTATION | 2008 encapsulate decapsulate
|
/freebsd/share/dict/ |
H A D | web2 | 49330 decapsulate
|