/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-cipher.pod | 32 =item initialised for decryption using EVP_DecryptInit 82 | for decryption | | | | for encryption | 95 …| for decryption | <-------------------+ | | for encryption | … 128 … decryption decryption encryption encryption 132 … decryption decryption decryption decryption decryption decryption decryption decryption 137 … decryption decryption 146 … decryption decryption encryption encryption 148 … decryption decryption encryption encryption 150 … decryption decryption encryption encryption 152 … decryption decryption encryption encryption [all …]
|
H A D | provider-cipher.pod | 25 /* Encryption/decryption */ 45 /* Encryption/decryption using cipher pipeline */ 167 except that it initialises the context for a decryption operation. 195 OSSL_FUNC_cipher_final() completes an encryption or decryption started through previous 199 Any final encryption/decryption output should be written to I<out> and the 204 OSSL_FUNC_cipher_cipher() performs encryption/decryption using the provider side cipher 214 The output from the encryption/decryption should be stored in I<out> and the
|
H A D | evp.pod | 17 functions provide public key encryption and decryption to implement digital "envelopes". 51 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)> 53 these functions perform encryption and decryption only. As public key
|
H A D | provider-asym_cipher.pod | 145 OSSL_FUNC_asym_cipher_decrypt_init() initialises a context for an asymmetric decryption 154 OSSL_FUNC_asym_cipher_decrypt() performs the actual decryption itself. 240 decryption. When set (non zero value), the decryption API will return 243 if the code using the RSA decryption API is not implemented in side-channel
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_OpenInit.pod | 5 EVP_OpenInit, EVP_OpenUpdate, EVP_OpenFinal - EVP envelope decryption 20 decryption. They decrypt a public key encrypted symmetric key and 23 EVP_OpenInit() initializes a cipher context B<ctx> for decryption
|
H A D | CMS_decrypt.pod | 31 If I<pkey> is NULL the function assumes that decryption was already done 40 On success, it also records in I<cms> the decryption key I<pkey>, and then 42 This call deallocates any decryption key stored in I<cms>. 49 On success, it also records in I<cms> the decryption key used, and then 51 This call deallocates any decryption key stored in I<cms>.
|
H A D | BF_encrypt.pod | 50 Blowfish consists of a key setup phase and the actual encryption or decryption 56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function. 59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by 81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte 87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 42 decryption has been attempted and any session ticket application data is 43 available. If ticket decryption was successful then the B<ss> argument contains 46 ticket decryption. See the L</NOTES> section below for further details. The value 70 decryption. The callback must check the B<status> value before performing any 71 action, as it is called even if ticket decryption fails.
|
H A D | SSL_CTX_set_default_passwd_cb.pod | 46 password to be used during decryption. 51 callback is used for reading/decryption (rwflag=0) or writing/encryption 69 for comparison in order to catch typos, that would make decryption
|
H A D | EVP_PKEY_decrypt.pod | 21 context using key I<pkey> for a decryption operation. 24 context using key I<pkey> for a decryption operation and sets the 27 The EVP_PKEY_decrypt() function performs a public key decryption operation
|
H A D | RC4_set_key.pod | 35 decryption phase. 45 key stream to produce the output), decryption uses the same function
|
H A D | BIO_f_cipher.pod | 35 decryption. 40 decryption operation was successful.
|
H A D | PKCS12_PBE_keyivgen.pod | 37 encryption (I<en_de>=1) or decryption (I<en_de>=0). 47 encryption (I<en_de>=1) or decryption (I<en_de>=0).
|
H A D | PKCS12_key_gen_utf8_ex.pod | 47 as key material for performing encryption or decryption. 52 as an IV (Initial Value) for encryption or decryption.
|
H A D | EVP_EncryptInit.pod | 443 These functions are the corresponding decryption operations. 451 These functions can be used for decryption or encryption. The operation 453 for encryption, 0 for decryption and -1 to leave the value unchanged 514 These functions can be used to perform multiple encryption or decryption 586 is set up for encryption or decryption with EVP_EncryptInit_ex2(), 696 Reports whether the I<ctx> is being used for encryption or decryption. 774 the underlying encryption/decryption primitive. 819 the decryption operation such as the 3DES ciphers in the fips provider. 1063 encryption/ decryption for the associated cipher context. 1064 TLS record encryption/decryption always occurs "in place" so that the input and [all …]
|
H A D | RSA_blinding_on.pod | 24 measure the time of RSA decryption or signature operations, blinding
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | vms | 16 >44032 string PK\003\004 \b, Info-ZIP SFX archive v5.12 w/decryption 30 >>75264 string PK\003\004 \b, Info-ZIP SFX archive v5.12 w/decryption
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | cipher.dot | 12 d_initialised [label="initialised\n(decryption)", fontcolor="#c94c4c"]; 13 d_updated [label="updated\n(decryption)", fontcolor="#c94c4c"];
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_hw_rv64i.inc | 78 * for both encryption and decryption. 104 /* Zvkned supports aes-128/192/256 encryption and decryption. */
|
/freebsd/crypto/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 122 ! parameter 6 1/2 for include encryption/decryption 273 ! parameter 6 optional address for key next encryption/decryption 490 ifelse($6,{}, {}, {ld [$6], out0}) ! key next encryption/decryption 513 ifelse($6,{}, {}, {ld [$6+4], out1}) ! key next encryption/decryption 1092 ! loads key next encryption/decryption first round from [in4] 1105 ! loads key next encryption/decryption first round from [in3] 1134 ! parameter 6 1/2 for include encryption/decryption 1151 ! parameter 6 1/2 for include encryption/decryption 1305 ! parameter 6 1/2 for include encryption/decryption 1350 ! parameter 6 1/2 for include encryption/decryption [all …]
|
/freebsd/crypto/krb5/src/lib/crypto/builtin/aes/ |
H A D | aes.txt | 104 aescrypt.c the main C source code file for encryption and decryption 462 6. ecbmd<nn>.txt ECB monte carlo decryption test vectors 464 8. cbcmd<nn>.txt CBC monte carlo decryption test vectors 483 contexts for encryption and decryption: 509 Similarly, the AES decryption key is set by one of: 520 Encryption and decryption for a single 16 byte block is then achieved using: 574 use AES encryption contexts even during decryption operations. 615 decryption operations. 618 of mode (but encryption and decryption keys must
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | hx509_err.et | 66 error_code RSA_PUBLIC_DECRYPT, "RSA public decryption failed" 67 error_code RSA_PRIVATE_DECRYPT, "RSA private decryption failed"
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-enc.pod.in | 54 either by itself or in addition to the encryption or decryption. 100 the data is base64 encoded after encryption. If decryption is set then 168 again during decryption. This salt may be truncated or zero padded to 194 or decryption. 215 decryption. This option exists only if OpenSSL was compiled with the zlib 220 Use NULL cipher (no encryption or decryption of input). 297 Conversely, when the B<-S> option is used during decryption, the ciphertext
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 51 as a decryption oracle can learn nothing about the payload contents or 72 before decryption. A per-packet Poly1305 key is generated as described
|
H A D | PROTOCOL.key | 55 to both checkint fields so successful decryption can be
|