/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-cipher.pod | 32 =item initialised for decryption using EVP_DecryptInit 82 | for decryption | | | | for encryption | 95 …| for decryption | <-------------------+ | | for encryption | … 128 … decryption decryption encryption encryption 132 … decryption decryption decryption decryption decryption decryption decryption decryption 137 … decryption decryption 146 … decryption decryption encryption encryption 148 … decryption decryption encryption encryption 150 … decryption decryption encryption encryption 152 … decryption decryption encryption encryption [all …]
|
H A D | provider-cipher.pod | 25 /* Encryption/decryption */ 136 initialises the context for a decryption operation. 159 OSSL_FUNC_cipher_final() completes an encryption or decryption started through previous 163 Any final encryption/decryption output should be written to I<out> and the 168 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher 178 The output from the encryption/decryption should be stored in I<out> and the
|
H A D | evp.pod | 17 functions provide public key encryption and decryption to implement digital "envelopes". 51 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)> 53 these functions perform encryption and decryption only. As public key
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_OpenInit.pod | 5 EVP_OpenInit, EVP_OpenUpdate, EVP_OpenFinal - EVP envelope decryption 20 decryption. They decrypt a public key encrypted symmetric key and 23 EVP_OpenInit() initializes a cipher context B<ctx> for decryption
|
H A D | CMS_decrypt.pod | 31 If I<pkey> is NULL the function assumes that decryption was already done 41 On success, it also records in I<cms> the decryption key I<pkey>, and this 43 This call deallocates any decryption key stored in I<cms>. 50 On success, it also records in I<cms> the decryption key used, and this 52 This call deallocates any decryption key stored in I<cms>.
|
H A D | BF_encrypt.pod | 50 Blowfish consists of a key setup phase and the actual encryption or decryption 56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function. 59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by 81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte 87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
|
H A D | EVP_PKEY_decrypt.pod | 21 context using key I<pkey> for a decryption operation. 24 context using key I<pkey> for a decryption operation and sets the 27 The EVP_PKEY_decrypt() function performs a public key decryption operation
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 42 decryption has been attempted and any session ticket application data is 43 available. If ticket decryption was successful then the B<ss> argument contains 46 ticket decryption. See the L</NOTES> section below for further details. The value 70 decryption. The callback must check the B<status> value before performing any 71 action, as it is called even if ticket decryption fails.
|
H A D | SSL_CTX_set_default_passwd_cb.pod | 46 password to be used during decryption. 51 callback is used for reading/decryption (rwflag=0) or writing/encryption 69 for comparison in order to catch typos, that would make decryption
|
H A D | RC4_set_key.pod | 35 decryption phase. 45 key stream to produce the output), decryption uses the same function
|
H A D | BIO_f_cipher.pod | 35 decryption. 40 decryption operation was successful.
|
H A D | PKCS12_PBE_keyivgen.pod | 37 encryption (I<en_de>=1) or decryption (I<en_de>=0). 47 encryption (I<en_de>=1) or decryption (I<en_de>=0).
|
H A D | PKCS12_key_gen_utf8_ex.pod | 47 as key material for performing encryption or decryption. 52 as an IV (Initial Value) for encryption or decryption.
|
H A D | EVP_EncryptInit.pod | 401 These functions are the corresponding decryption operations. 412 These functions can be used for decryption or encryption. The operation 414 for encryption, 0 for decryption and -1 to leave the value unchanged 495 is set up for encryption or decryption with EVP_EncryptInit_ex2(), 597 Reports whether the I<ctx> is being used for encryption or decryption. 674 the underlying encryption/decryption primitive. 921 encryption/ decryption for the associated cipher context. 922 TLS record encryption/decryption always occurs "in place" so that the input and 929 For a record decryption the first bytes of the input buffer will be the explicit 933 In order to allow for "in place" decryption the plaintext output should be [all …]
|
H A D | RSA_blinding_on.pod | 24 measure the time of RSA decryption or signature operations, blinding
|
H A D | PKCS8_encrypt.pod | 38 PKCS8_decrypt() and PKCS8_decrypt_ex() perform decryption of an B<X509_SIG> in
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | vms | 16 >44032 string PK\003\004 \b, Info-ZIP SFX archive v5.12 w/decryption 30 >>75264 string PK\003\004 \b, Info-ZIP SFX archive v5.12 w/decryption
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | cipher.dot | 12 d_initialised [label="initialised\n(decryption)", fontcolor="#c94c4c"]; 13 d_updated [label="updated\n(decryption)", fontcolor="#c94c4c"];
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-enc.pod.in | 51 either by itself or in addition to the encryption or decryption. 97 the data is base64 encoded after encryption. If decryption is set then 156 again during decryption. 181 or decryption. 202 decryption. This option exists only if OpenSSL was compiled with the zlib 207 Use NULL cipher (no encryption or decryption of input). 269 Conversely, when the B<-S> option is used during decryption, the ciphertext
|
/freebsd/crypto/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 122 ! parameter 6 1/2 for include encryption/decryption 273 ! parameter 6 optional address for key next encryption/decryption 490 ifelse($6,{}, {}, {ld [$6], out0}) ! key next encryption/decryption 513 ifelse($6,{}, {}, {ld [$6+4], out1}) ! key next encryption/decryption 1092 ! loads key next encryption/decryption first round from [in4] 1105 ! loads key next encryption/decryption first round from [in3] 1134 ! parameter 6 1/2 for include encryption/decryption 1151 ! parameter 6 1/2 for include encryption/decryption 1305 ! parameter 6 1/2 for include encryption/decryption 1350 ! parameter 6 1/2 for include encryption/decryption [all …]
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | hx509_err.et | 66 error_code RSA_PUBLIC_DECRYPT, "RSA public decryption failed" 67 error_code RSA_PRIVATE_DECRYPT, "RSA private decryption failed"
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 51 as a decryption oracle can learn nothing about the payload contents or 72 before decryption. A per-packet Poly1305 key is generated as described
|
H A D | PROTOCOL.key | 55 to both checkint fields so successful decryption can be
|
/freebsd/sys/contrib/libsodium/ |
H A D | README.markdown | 9 decryption, signatures, password hashing and more.
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_sm2.txt | 66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah…
|