Home
last modified time | relevance | path

Searched full:decrypt (Results 1 – 25 of 649) sorted by relevance

12345678910>>...26

/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpciph_camellia.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
53 # ECB-CAMELLIA128.Encrypt and ECB-CAMELLIA128.Decrypt
75 # ECB-CAMELLIA192.Encrypt and ECB-CAMELLIA192.Decrypt
97 # ECB-CAMELLIA256.Encrypt and ECB-CAMELLIA256.Decrypt
121 # CBC-CAMELLIA128.Encrypt and CBC-CAMELLIA128.Decrypt
151 # CBC-CAMELLIA192.Encrypt and CBC-CAMELLIA192.Decrypt
181 # CBC-CAMELLIA256.Encrypt and CBC-CAMELLIA256.Decrypt
248 # CFB128-CAMELLIA128.Decrypt
252 Operation = DECRYPT
260 Operation = DECRYPT
[all …]
H A Devppkey_rsa_common.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
250 # RSA decrypt
252 Decrypt = RSA-2048
258 Decrypt = RSA-2048
264 Decrypt = RSA-2048
270 Decrypt = RSA-2048
622 Decrypt=RSA-OAEP-1
628 Decrypt=RSA-OAEP-1
634 Decrypt=RSA-OAEP-1
640 Decrypt=RSA-OAEP-1
[all …]
H A Devpciph_aes_wrap.txt52 Operation = DECRYPT
76 Operation = DECRYPT
82 Operation = DECRYPT
88 Operation = DECRYPT
94 Operation = DECRYPT
101 Operation = DECRYPT
108 Operation = DECRYPT
133 Operation = DECRYPT
139 Operation = DECRYPT
146 Operation = DECRYPT
[all …]
H A Devpciph_aes_common.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
46 # AES 128 ECB tests (from NIST test vectors, decrypt)
50 # AES 192 ECB tests (from NIST test vectors, decrypt)
54 # AES 256 ECB tests (from NIST test vectors, decrypt)
70 # AES 128 CBC tests (from NIST test vectors, decrypt)
77 # ECB-AES128.Encrypt and ECB-AES128.Decrypt
101 # ECB-AES192.Encrypt and ECB-AES192.Decrypt
122 # ECB-AES256.Encrypt and ECB-AES256.Decrypt
145 # CBC-AES128.Encrypt and CBC-AES128.Decrypt
174 # CBC-AES192.Encrypt and CBC-AES192.Decrypt
[all …]
H A Devpciph_aes_ccm_cavs.txt28 Operation = DECRYPT
38 Operation = DECRYPT
48 Operation = DECRYPT
66 Operation = DECRYPT
76 Operation = DECRYPT
86 Operation = DECRYPT
96 Operation = DECRYPT
106 Operation = DECRYPT
116 Operation = DECRYPT
150 Operation = DECRYPT
[all …]
H A Devppkey_sm2.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
45 Decrypt = SM2_key1
51 Decrypt = SM2_key1
58 Decrypt = SM2_key1
64 Decrypt = SM2_key1
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/
H A Dhcrypto_des.394 Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc).
110 \fIencp\fP if non zero, encrypt. if zero, decrypt.
116 Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback.
134 \fIencp\fP if non zero, encrypt. if zero, decrypt.
155 Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt.
169 \fIencp\fP if non zero, encrypt. if zero, decrypt.
175 Encrypt/decrypt a block using DES.
185 \fIencp\fP if non zero, encrypt. if zero, decrypt.
191 Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc).
211 \fIencp\fP if non zero, encrypt. if zero, decrypt.
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-pkey.7155 .IP "decrypt" 4
156 .IX Item "decrypt"
157 This state represents the \s-1PKEY\s0 when it is ready to decrypt some ciphertext.
216 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt |
254 …start newed digest verify verify encrypt decrypt derive …
272decrypt decrypt decrypt decrypt decrypt decrypt decrypt
273 …crypt decrypt
291 … newed digest verify verify encrypt decrypt derive …
293 … newed digest verify verify encrypt decrypt derive …
295 … newed digest verify verify encrypt decrypt derive …
[all …]
/freebsd/crypto/openssl/test/
H A Dbio_enc_test.c18 #define DECRYPT 0 macro
122 /* Decrypt tests */ in do_bio_cipher()
128 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) in do_bio_cipher()
148 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { in do_bio_cipher()
149 TEST_info("Split decrypt failed @ operation %d", i); in do_bio_cipher()
161 TEST_info("Decrypt overstep check failed @ operation %d", i); in do_bio_cipher()
168 TEST_info("Decrypt compare failed @ operation %d", i); in do_bio_cipher()
180 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { in do_bio_cipher()
181 TEST_info("Small chunk decrypt failed @ operation %d", i); in do_bio_cipher()
195 TEST_info("Small chunk decrypt compare failed @ operation %d", i); in do_bio_cipher()
/freebsd/crypto/heimdal/lib/krb5/
H A Daes-test.c292 krb5_data decrypt; in krb_enc() local
295 krb5_data_zero(&decrypt); in krb_enc()
302 &decrypt); in krb_enc()
309 if (decrypt.length != clear->length || in krb_enc()
310 memcmp(decrypt.data, clear->data, decrypt.length) != 0) { in krb_enc()
315 krb5_data_free(&decrypt); in krb_enc()
328 krb5_data decrypt; in krb_enc_iov2() local
366 * Plain decrypt in krb_enc_iov2()
375 ret = krb5_decrypt(context, crypto, usage, p, len, &decrypt); in krb_enc_iov2()
379 krb5_data_free(&decrypt); in krb_enc_iov2()
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-pkey.pod27 =item decrypt
29 This state represents the PKEY when it is ready to decrypt some ciphertext.
103 … EVP_PKEY_decapsulate | | | | | | | EVP_PKEY_decrypt | decrypt |
149 …start newed digest verify verify encrypt decrypt derive …
167decrypt decrypt decrypt decrypt decrypt decrypt decrypt
168 …crypt decrypt
186 … newed digest verify verify encrypt decrypt derive …
188 … newed digest verify verify encrypt decrypt derive …
190 … newed digest verify verify encrypt decrypt derive …
192 … newed digest verify verify encrypt decrypt derive …
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D15-test_mp_rsa.t74 '-decrypt', '-in', "rsamptest-$name.enc",
76 "rsa $name decrypt");
89 '-decrypt', '-in', "rsamptest-$name.enc",
91 "rsa $name decrypt");
98 '-decrypt', '-in', "rsamptest-$name.enc",
100 "rsa $name decrypt");
H A D15-test_rsaoaep.t83 '-decrypt',
96 '-decrypt',
107 '-decrypt',
131 '-decrypt',
152 '-decrypt',
H A D80-test_cms.t209 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1,
220 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", catfile($smdir, "smrsa3.pem"),
231 [ "{cmd2}", @defaultprov, "-decrypt",
244 [ "{cmd2}", @prov, "-decrypt", "-recip", $smrsa1,
305 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1,
315 [ "{cmd2}", @prov, "-decrypt", "-in", "{output}.cms", "-out", "{output}.txt",
327 [ "{cmd2}", "-decrypt", "-in", "{output}.cms", "-out", "{output}.txt",
339 [ "{cmd2}", @prov, "-decrypt", "-in", "{output}.cms", "-out", "{output}.txt",
558 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1,
569 [ "{cmd2}", @defaultprov, "-decrypt", "-recip", $smrsa1,
[all …]
/freebsd/tests/sys/opencrypto/
H A Dcryptotest.py89 self.runGCM(i, 'DECRYPT')
96 elif mode == 'DECRYPT':
98 curfun = Crypto.decrypt
151 c.decrypt, *args)
154 rpt, rtag = c.decrypt(*args)
176 elif mode == 'DECRYPT':
178 curfun = Crypto.decrypt
208 elif mode == 'DECRYPT':
210 curfun = Crypto.decrypt
313 c.decrypt, payload, nonce, aad, tag)
[all …]
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/
H A Dlac_sym_qat_cipher.c241 /* Streaming ciphers are a special case. Decrypt = encrypt */
250 /* AES decrypt key needs to be reversed. Instead of reversing the
263 /* AES decrypt key needs to be reversed. Instead of reversing the
276 /* AES decrypt key needs to be reversed. Instead of reversing the
281 /* Streaming ciphers are a special case. Decrypt = encrypt
292 /* AES decrypt key needs to be reversed. Instead of reversing the
297 /* Streaming ciphers are a special case. Decrypt = encrypt
308 /* AES decrypt key needs to be reversed. Instead of reversing the
313 /* Streaming ciphers are a special case. Decrypt = encrypt
361 /* Streaming ciphers are a special case. Decrypt = encrypt
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DBIO_f_cipher.pod51 decrypt.
54 return value from the read operation. A successful decrypt followed
56 should be called to determine if the decrypt was successful.
67 BIO_get_cipher_status() returns 1 for a successful decrypt and <=0
H A DCMS_decrypt.pod7 - decrypt content from a CMS envelopedData structure
25 It uses CMS_decrypt_set1_pkey() to decrypt the content
56 Although the recipients certificate is not needed to decrypt the data it is
63 not. If no recipient succeeds then a random symmetric key is used to decrypt
66 error when all recipient encrypted keys failed to decrypt an attacker could
/freebsd/sbin/decryptcore/
H A Ddecryptcore.830 .Nd "decrypt a core dump of the operating system"
50 and then uses the resulting key to decrypt
57 Alternatively a user can decrypt a core dump numbered
93 Specify location of a private key file which will be used to decrypt a dump key
/freebsd/crypto/openssl/doc/life-cycles/
H A Dpkey.dot11 decrypt [fontcolor="#425F06", color="#425F06"]
32 newed -> decrypt [label="EVP_PKEY_decrypt_init", fontcolor="#425F06", color="#425F06"];
33 decrypt -> decrypt [label="EVP_PKEY_decrypt", fontcolor="#425F06", color="#425F06"];
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-cms.1155 [\fB\-decrypt\fR]
297 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages.
301 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt,
331 key has been compromised, others may be able to decrypt the text.
332 .IP "\fB\-decrypt\fR" 4
333 .IX Item "-decrypt"
334 Decrypt data using the supplied certificate and private key. Expects
380 Decrypt content using supplied symmetric key and algorithm using a \s-1CMS\s0
448 \&\fB\-EncryptedData_decrypt\fR, \fB\-encrypt\fR and \fB\-decrypt\fR options. When used
449 with \fB\-encrypt\fR or \fB\-decrypt\fR the supplied key is used to wrap or unwrap the
[all …]
/freebsd/crypto/openssl/demos/
H A DREADME.txt11 aesgcm.c Demonstration of symmetric cipher GCM mode encrypt/decrypt
12 aesccm.c Demonstration of symmetric cipher CCM mode encrypt/decrypt
13 ariacbc.c Demonstration of symmetric cipher CBC mode encrypt/decrypt
/freebsd/contrib/bearssl/inc/
H A Dbearssl_block.h50 * For CBC encryption and decryption, the data to encrypt or decrypt is
270 * - `decrypt`
492 * \param data data to decrypt.
548 * The data to encrypt or decrypt is updated "in place". Its
558 * \param data data to encrypt or decrypt.
642 * The data to decrypt is updated "in place". Its length (`len`
648 * \param data data to decrypt.
651 void (*decrypt)(const br_block_ctrcbc_class *const *ctx, member
661 * The data to decrypt is updated "in place". Its length (`len`
666 * \param data data to decrypt.
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-cms.pod.in22 [B<-decrypt>]
127 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages.
132 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt,
175 key has been compromised, others may be able to decrypt the text.
177 =item B<-decrypt>
179 Decrypt data using the supplied certificate and private key. Expects
236 Decrypt content using supplied symmetric key and algorithm using a CMS
325 B<-EncryptedData_decrypt>, B<-encrypt> and B<-decrypt> options. When used
326 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the
333 B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the
[all …]
/freebsd/sys/contrib/openzfs/include/sys/
H A Ddmu_objset.h214 int dmu_objset_hold_flags(const char *name, boolean_t decrypt, const void *tag,
217 boolean_t readonly, boolean_t decrypt, const void *tag, objset_t **osp);
219 dmu_objset_type_t type, boolean_t readonly, boolean_t decrypt,
222 struct dsl_dataset **newds, boolean_t decrypt, const void *tag);
224 void dmu_objset_rele_flags(objset_t *os, boolean_t decrypt, const void *tag);
225 void dmu_objset_disown(objset_t *os, boolean_t decrypt, const void *tag);

12345678910>>...26