Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 322) sorted by relevance

12345678910>>...13

/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/
H A Dzfs_create_encrypted.ksh89 log_must zfs create -o encryption=off $TESTPOOL/$TESTFS1/c1
90 log_mustnot zfs create -o encryption=off -o keylocation=prompt \
92 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
94 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
97 log_mustnot zfs create -o encryption=on $TESTPOOL/$TESTFS1/c2
98 log_mustnot zfs create -o encryption=on -o keylocation=prompt \
116 log_must zfs create -o encryption=off $TESTPOOL/$TESTFS2/c5
119 log_mustnot zfs create -o encryption=off -o keylocation=prompt \
121 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
123 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-cipher.pod34 =item initialised for encryption using EVP_EncryptInit
82 | for decryption | | | | for encryption |
95 …| for decryption | <-------------------+ | | for encryption | …
106 | (AEAD encryption)
128 … decryption decryption encryption encryption
134encryption encryption encryption encryption encryption encryption encryption encryption
139encryption encryption
146 … decryption decryption encryption encryption
148 … decryption decryption encryption encryption
150 … decryption decryption encryption encryption
[all …]
H A Devp.pod17 functions provide public key encryption and decryption to implement digital "envelopes".
25 Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)>
51 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)>
53 these functions perform encryption and decryption only. As public key
54 encryption is an expensive operation, normally you would wrap
61 based encryption. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/
H A Dzpool_create_encrypted.ksh73 log_must zpool create -O encryption=off $TESTPOOL $DISKS
76 log_mustnot zpool create -O encryption=off -O keylocation=prompt \
78 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
80 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
83 log_mustnot zpool create -O encryption=on $TESTPOOL $DISKS
84 log_mustnot zpool create -O encryption=on -O keylocation=prompt \
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_load-key/
H A Dzfs_load-key_https.ksh50 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
53 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
56 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
59 log_must zfs create -o encryption=on -o keyformat=passphrase \
62 log_must zfs create -o encryption=on -o keyformat=hex \
65 log_must zfs create -o encryption=on -o keyformat=raw \
H A Dzfs_load-key_all.ksh50 log_must zfs create -o encryption=on -o keyformat=passphrase \
53 log_must zfs create -o encryption=on -o keyformat=passphrase \
56 log_must zfs create -V 64M -o encryption=on -o keyformat=passphrase \
61 log_must zpool create -O encryption=on -O keyformat=passphrase \
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption
21 encryption. They generate a random key and IV (if required) then
22 "envelope" it by using public key encryption. Data can then be
25 EVP_SealInit() initializes a cipher context B<ctx> for encryption
65 Envelope encryption is the usual method of using public key encryption
66 on large amounts of data, this is because public key encryption is slow
67 but symmetric encryption is fast. So symmetric encryption is used for
68 bulk encryption and the small random symmetric key used is transferred
69 using public key encryption.
H A DBF_encrypt.pod6 BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption
45 considered good for strong encryption. Blowfish can be used in the same
50 Blowfish consists of a key setup phase and the actual encryption or decryption
56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function.
58 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
80 putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or
86 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
96 encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
H A DPKCS12_create.pod28 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used
30 GCM, CCM, XTS, and OCB are unsupported. I<iter> is the encryption algorithm
42 These defaults are: AES password based encryption (PBES2 with PBKDF2 and
55 it can be used for signing and encryption. This option was useful for old
58 encryption.
74 I<nid_key> or I<nid_cert> can be set to -1 indicating that no encryption
104 The defaults for encryption algorithms, MAC algorithm, and the MAC key
H A DDES_random_key.pod13 DES_fcrypt, DES_crypt - DES encryption
105 This library contains a fast implementation of the DES encryption
108 There are two phases to the use of DES encryption. The first is the
110 actual encryption. A DES key is of type I<DES_cblock>. This type
113 the key; it is used to speed the encryption process.
141 DES_ecb_encrypt() is the basic DES encryption routine that encrypts or
153 three-key Triple-DES encryption in ECB mode. This involves encrypting
157 I<ks2> and I<ks3> are the same, it is equivalent to just encryption
161 encryption by using I<ks1> for the final encryption.
174 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret
[all …]
H A DRC4_set_key.pod5 RC4_set_key, RC4 - RC4 encryption
31 (16 byte) keys are used for strong encryption, but shorter insecure
34 RC4 consists of a key setup phase and the actual encryption or
46 calls as encryption.
H A DBIO_f_cipher.pod29 BIO_flush() on an encryption BIO that is being written through is
34 and IV B<iv>. B<enc> should be set to 1 for encryption and zero for
37 When reading from an encryption BIO the final block is automatically
H A DEVP_cast5_cbc.pod24 The CAST encryption algorithm for EVP.
36 CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively.
H A DEVP_idea_cbc.pod24 The IDEA encryption algorithm for EVP.
34 The IDEA encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_-wR-encrypted-mix.ksh62 create_dataset "$src" -o encryption=on -o keyformat=passphrase
65 create_dataset "$src/u/e" -o encryption=on -o keyformat=passphrase
66 create_dataset "$src/u/e/u" -o encryption=off
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_unload-key/
H A Dzfs_unload-key_all.ksh50 log_must zfs create -o encryption=on -o keyformat=passphrase \
54 log_must zfs create -V 64M -o encryption=on -o keyformat=passphrase \
59 log_must zpool create -O encryption=on -O keyformat=passphrase \
/freebsd/crypto/openssl/doc/life-cycles/
H A Dcipher.dot14 e_initialised [label="initialised\n(encryption)", fontcolor="#c94c4c"];
15 e_updated [label="updated\n(encryption)", fontcolor="#c94c4c"];
24 finaled -> finaled [label="EVP_CIPHER_CTX_get_params\n(AEAD encryption)",
63 finaled -> finaled [label="EVP_CIPHER_CTX_get_params\n(AEAD encryption)",
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-pkcs8.pod.in71 PKCS#8 format using the specified encryption parameters unless B<-nocrypt>
94 default. If any encryption options are set then a pass phrase will be
101 the password in deriving the encryption key for the PKCS#8 output.
111 structures using an appropriate password based encryption algorithm. With
121 The I<alg> argument is the encryption algorithm to use, valid values include
142 Uses the B<scrypt> algorithm for private key encryption using default
166 encryption algorithms such as 56 bit DES.
174 PKCS#8 format because the encryption details are included at an ASN1
199 These algorithms use the PKCS#12 password based encryption algorithm and
200 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
[all …]
H A Dopenssl-pkcs12.pod.in82 The PKCS#12 export encryption and MAC options such as B<-certpbe> and B<-iter>
84 Conversely, the options regarding encryption of private keys when outputting
87 The default encryption algorithm is AES-256-CBC with PBKDF2 for key derivation.
117 Prompt for separate integrity and encryption passwords: most software
143 In the legacy mode, the default algorithm for certificate encryption
145 in the build. The default algorithm for private key encryption is 3DES_CBC.
147 and the default encryption algorithm for both certificates and private keys is
318 encryption purposes but arbitrary length keys for signing. The B<-keysig>
333 Special value C<NONE> disables encryption of the private key and certificates.
348 This option specifies the iteration count for the encryption key and MAC. The
[all …]
H A Dopenssl-enc.pod.in51 either by itself or in addition to the encryption or decryption.
96 Base64 process the data. This means that if encryption is taking place
97 the data is base64 encoded after encryption. If decryption is set then
132 Use a given number of iterations on the password in deriving the encryption key.
180 Print out the key and IV used then immediately exit: don't do any encryption
201 Compress or decompress encrypted data using zlib after encryption or before
207 Use NULL cipher (no encryption or decryption of input).
225 Engines which provide entirely new encryption algorithms (such as the ccgost
244 encryption key.
288 This command does not support authenticated encryption modes
[all …]
/freebsd/sys/contrib/openzfs/contrib/debian/
H A Dcontrol49 Description: PAM module for managing encryption keys for ZFS
52 compression, encryption, snapshots, and more.
108 compression, encryption, snapshots, and more.
122 compression, encryption, snapshots, and more.
136 compression, encryption, snapshots, and more.
204 compression, encryption, snapshots, and more.
222 compression, encryption, snapshots, and more.
238 compression, encryption, snapshots, and more.
269 compression, encryption, snapshots, and more.
287 compression, encryption, snapshots, and more.
[all …]
/freebsd/crypto/openssh/
H A DPROTOCOL.chacha20poly13052 encryption cipher supported by OpenSSH.
17 authenticated encryption mode. The construction used is based on that
19 data passed to the MAC and in the addition of encryption of the packet
25 The chacha20-poly1305@openssh.com offers both encryption and
60 for encryption of the packet payload.
87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
/freebsd/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_err.et25 error_code ETYPE_NOSUPP, "KDC has no support for encryption type"
101 error_code PUBLIC_KEY_ENCRYPTION_NOT_SUPPORTED, "Public key encryption not supported"
150 error_code KRB5_PROG_ETYPE_NOSUPP, "Program lacks support for encryption type"
152 error_code KRB5_WRONG_ETYPE, "Requested encryption type not used in message"
200 error_code KRB5_BAD_ENCTYPE, "Bad encryption type"
201 error_code KRB5_BAD_KEYSIZE, "Key size is incompatible with encryption type"
202 error_code KRB5_BAD_MSIZE, "Message size is incompatible with encryption type"
214 error_code KRB5_CC_NOT_KTYPE, "No credentials found with supported encryption types"
259 error_code KRB5_SAM_INVALID_ETYPE, "Invalid encryption type in SAM challenge"
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpciph_camellia_cts.txt11 # The encryption test vectors in RFC6803 specify the base_key,
12 # not the derived encryption key.
13 # The encryption key was manually derived using:

12345678910>>...13