Home
last modified time | relevance | path

Searched refs:decryption (Results 1 – 25 of 91) sorted by relevance

1234

/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-cipher.pod32 =item initialised for decryption using EVP_DecryptInit
82 | for decryption | | | | for encryption |
95 …| for decryption | <-------------------+ | | for encryption | …
128decryption decryption encryption encryption
132decryption decryption decryption decryption decryption decryption decryption decryption
137decryption decryption
146decryption decryption encryption encryption
148decryption decryption encryption encryption
150decryption decryption encryption encryption
152decryption decryption encryption encryption
[all …]
H A Dprovider-cipher.pod25 /* Encryption/decryption */
45 /* Encryption/decryption using cipher pipeline */
167 except that it initialises the context for a decryption operation.
195 OSSL_FUNC_cipher_final() completes an encryption or decryption started through previous
199 Any final encryption/decryption output should be written to I<out> and the
204 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher
214 The output from the encryption/decryption should be stored in I<out> and the
H A Devp.pod17 functions provide public key encryption and decryption to implement digital "envelopes".
51 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)>
53 these functions perform encryption and decryption only. As public key
H A Dprovider-asym_cipher.pod145 OSSL_FUNC_asym_cipher_decrypt_init() initialises a context for an asymmetric decryption
154 OSSL_FUNC_asym_cipher_decrypt() performs the actual decryption itself.
240 decryption. When set (non zero value), the decryption API will return
243 if the code using the RSA decryption API is not implemented in side-channel
/freebsd/crypto/openssl/doc/man3/
H A DEVP_OpenInit.pod5 EVP_OpenInit, EVP_OpenUpdate, EVP_OpenFinal - EVP envelope decryption
20 decryption. They decrypt a public key encrypted symmetric key and
23 EVP_OpenInit() initializes a cipher context B<ctx> for decryption
H A DCMS_decrypt.pod31 If I<pkey> is NULL the function assumes that decryption was already done
40 On success, it also records in I<cms> the decryption key I<pkey>, and then
42 This call deallocates any decryption key stored in I<cms>.
49 On success, it also records in I<cms> the decryption key used, and then
51 This call deallocates any decryption key stored in I<cms>.
H A DBF_encrypt.pod50 Blowfish consists of a key setup phase and the actual encryption or decryption
56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function.
59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by
81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
H A DSSL_CTX_set_session_ticket_cb.pod42 decryption has been attempted and any session ticket application data is
43 available. If ticket decryption was successful then the B<ss> argument contains
46 ticket decryption. See the L</NOTES> section below for further details. The value
70 decryption. The callback must check the B<status> value before performing any
71 action, as it is called even if ticket decryption fails.
H A DSSL_CTX_set_default_passwd_cb.pod46 password to be used during decryption.
51 callback is used for reading/decryption (rwflag=0) or writing/encryption
69 for comparison in order to catch typos, that would make decryption
H A DEVP_PKEY_decrypt.pod21 context using key I<pkey> for a decryption operation.
24 context using key I<pkey> for a decryption operation and sets the
27 The EVP_PKEY_decrypt() function performs a public key decryption operation
H A DRC4_set_key.pod35 decryption phase.
45 key stream to produce the output), decryption uses the same function
H A DBIO_f_cipher.pod35 decryption.
40 decryption operation was successful.
H A DPKCS12_PBE_keyivgen.pod37 encryption (I<en_de>=1) or decryption (I<en_de>=0).
47 encryption (I<en_de>=1) or decryption (I<en_de>=0).
H A DPKCS12_key_gen_utf8_ex.pod47 as key material for performing encryption or decryption.
52 as an IV (Initial Value) for encryption or decryption.
H A DEVP_EncryptInit.pod443 These functions are the corresponding decryption operations.
451 These functions can be used for decryption or encryption. The operation
453 for encryption, 0 for decryption and -1 to leave the value unchanged
514 These functions can be used to perform multiple encryption or decryption
586 is set up for encryption or decryption with EVP_EncryptInit_ex2(),
696 Reports whether the I<ctx> is being used for encryption or decryption.
774 the underlying encryption/decryption primitive.
819 the decryption operation such as the 3DES ciphers in the fips provider.
1063 encryption/ decryption for the associated cipher context.
1064 TLS record encryption/decryption always occurs "in place" so that the input and
[all …]
H A DRSA_blinding_on.pod24 measure the time of RSA decryption or signature operations, blinding
/freebsd/contrib/file/magic/Magdir/
H A Dvms16 >44032 string PK\003\004 \b, Info-ZIP SFX archive v5.12 w/decryption
30 >>75264 string PK\003\004 \b, Info-ZIP SFX archive v5.12 w/decryption
/freebsd/crypto/openssl/doc/life-cycles/
H A Dcipher.dot12 d_initialised [label="initialised\n(decryption)", fontcolor="#c94c4c"];
13 d_updated [label="updated\n(decryption)", fontcolor="#c94c4c"];
/freebsd/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_aes_hw_rv64i.inc78 * for both encryption and decryption.
104 /* Zvkned supports aes-128/192/256 encryption and decryption. */
/freebsd/crypto/openssl/crypto/des/asm/
H A Ddes_enc.m4122 ! parameter 6 1/2 for include encryption/decryption
273 ! parameter 6 optional address for key next encryption/decryption
490 ifelse($6,{}, {}, {ld [$6], out0}) ! key next encryption/decryption
513 ifelse($6,{}, {}, {ld [$6+4], out1}) ! key next encryption/decryption
1092 ! loads key next encryption/decryption first round from [in4]
1105 ! loads key next encryption/decryption first round from [in3]
1134 ! parameter 6 1/2 for include encryption/decryption
1151 ! parameter 6 1/2 for include encryption/decryption
1305 ! parameter 6 1/2 for include encryption/decryption
1350 ! parameter 6 1/2 for include encryption/decryption
[all …]
/freebsd/crypto/krb5/src/lib/crypto/builtin/aes/
H A Daes.txt104 aescrypt.c the main C source code file for encryption and decryption
462 6. ecbmd<nn>.txt ECB monte carlo decryption test vectors
464 8. cbcmd<nn>.txt CBC monte carlo decryption test vectors
483 contexts for encryption and decryption:
509 Similarly, the AES decryption key is set by one of:
520 Encryption and decryption for a single 16 byte block is then achieved using:
574 use AES encryption contexts even during decryption operations.
615 decryption operations.
618 of mode (but encryption and decryption keys must
/freebsd/crypto/heimdal/lib/hx509/
H A Dhx509_err.et66 error_code RSA_PUBLIC_DECRYPT, "RSA public decryption failed"
67 error_code RSA_PRIVATE_DECRYPT, "RSA private decryption failed"
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-enc.pod.in54 either by itself or in addition to the encryption or decryption.
100 the data is base64 encoded after encryption. If decryption is set then
168 again during decryption. This salt may be truncated or zero padded to
194 or decryption.
215 decryption. This option exists only if OpenSSL was compiled with the zlib
220 Use NULL cipher (no encryption or decryption of input).
297 Conversely, when the B<-S> option is used during decryption, the ciphertext
/freebsd/crypto/openssh/
H A DPROTOCOL.chacha20poly130551 as a decryption oracle can learn nothing about the payload contents or
72 before decryption. A per-packet Poly1305 key is generated as described
H A DPROTOCOL.key55 to both checkint fields so successful decryption can be

1234