/freebsd-src/crypto/openssl/test/ssl-tests/ |
H A D | 19-mac-then-encrypt.cnf | 5 test-0 = 0-disable-encrypt-then-mac-server-sha 6 test-1 = 1-disable-encrypt-then-mac-client-sha 7 test-2 = 2-disable-encrypt-then-mac-both-sha 8 test-3 = 3-disable-encrypt-then-mac-server-sha2 9 test-4 = 4-disable-encrypt-then-mac-client-sha2 10 test-5 = 5-disable-encrypt-then-mac-both-sha2 11 test-6 = 6-disable-encrypt-then-mac-server-sha-tls1 12 test-7 = 7-disable-encrypt-then-mac-client-sha-tls1 13 test-8 = 8-disable-encrypt-then-mac-both-sha-tls1 16 [0-disable-encrypt-then-mac-server-sha] [all …]
|
H A D | 19-mac-then-encrypt.cnf.in | 20 name => "disable-encrypt-then-mac-server-sha", 33 name => "disable-encrypt-then-mac-client-sha", 46 name => "disable-encrypt-then-mac-both-sha", 63 name => "disable-encrypt-then-mac-server-sha2", 76 name => "disable-encrypt-then-mac-client-sha2", 89 name => "disable-encrypt-then-mac-both-sha2", 106 name => "disable-encrypt-then-mac-server-sha-tls1", 121 name => "disable-encrypt-then-mac-client-sha-tls1", 136 name => "disable-encrypt-then-mac-both-sha-tls1",
|
/freebsd-src/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_camellia.txt | 33 # ECB-CAMELLIA128.Encrypt 36 Operation = ENCRYPT 42 Operation = ENCRYPT 48 Operation = ENCRYPT 53 # ECB-CAMELLIA128.Encrypt and ECB-CAMELLIA128.Decrypt 75 # ECB-CAMELLIA192.Encrypt and ECB-CAMELLIA192.Decrypt 97 # ECB-CAMELLIA256.Encrypt and ECB-CAMELLIA256.Decrypt 121 # CBC-CAMELLIA128.Encrypt and CBC-CAMELLIA128.Decrypt 151 # CBC-CAMELLIA192.Encrypt and CBC-CAMELLIA192.Decrypt 181 # CBC-CAMELLIA256.Encrypt and CBC-CAMELLIA256.Decrypt [all …]
|
H A D | evpciph_aes_common.txt | 20 Operation = ENCRYPT 24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt) 28 Operation = ENCRYPT 33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 37 Operation = ENCRYPT 42 # AES 128 ECB tests (from NIST test vectors, encrypt) 58 # AES 128 CBC tests (from NIST test vectors, encrypt) 62 # AES 192 CBC tests (from NIST test vectors, encrypt) 66 # AES 256 CBC tests (from NIST test vectors, encrypt) 77 # ECB-AES128.Encrypt and ECB-AES128.Decrypt [all …]
|
/freebsd-src/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
H A D | hcrypto_des.3 | 94 Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc). 100 \fIin\fP data to encrypt 102 \fIout\fP data to encrypt 110 \fIencp\fP if non zero, encrypt. if zero, decrypt. 116 Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback. 122 \fIin\fP data to encrypt 124 \fIout\fP data to encrypt 134 \fIencp\fP if non zero, encrypt. if zero, decrypt. 155 Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt. 159 \fIinput\fP data to encrypt [all …]
|
/freebsd-src/contrib/libfido2/src/ |
H A D | aes256.c | 12 fido_blob_t *out, int encrypt) in aes256_cbc() argument 38 if (EVP_CipherInit(ctx, cipher, key->ptr, iv, encrypt) == 0 || in aes256_cbc() 56 fido_blob_t *out, int encrypt) in aes256_cbc_proto1() argument 62 return aes256_cbc(key, iv, in, out, encrypt); in aes256_cbc_proto1() 67 fido_blob_t *out, int encrypt) in aes256_cbc_fips() argument 83 if (encrypt) { in aes256_cbc_fips() 96 if (aes256_cbc(&key, iv, &cin, &cout, encrypt) < 0) in aes256_cbc_fips() 98 if (encrypt) { in aes256_cbc_fips() 117 int encrypt) in aes256_gcm() argument 135 /* add tag to (on encrypt) or trim tag from the output (on decrypt) */ in aes256_gcm() [all …]
|
/freebsd-src/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 169 .IP "encrypt" 4 170 .IX Item "encrypt" 171 This state represents the \s-1PKEY\s0 when it is ready to encrypt some plaintext. 226 … EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt | 254 …start newed digest verify verify encrypt decrypt derive … 270 … encrypt encrypt encrypt encrypt encrypt encrypt encrypt … 271 EVP_PKEY_encrypt encrypt 291 …EVP_PKEY_CTX_get_params newed digest verify verify encrypt … 293 …EVP_PKEY_CTX_set_params newed digest verify verify encrypt … 295 …EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt … [all …]
|
/freebsd-src/sys/crypto/openssl/ |
H A D | ossl_aes.c | 88 bool encrypt; in ossl_aes_cbc() local 91 encrypt = CRYPTO_OP_IS_ENCRYPT(crp->crp_op); in ossl_aes_cbc() 99 if (encrypt) in ossl_aes_cbc() 108 if (encrypt) in ossl_aes_cbc() 143 /* Figure out how many blocks we can encrypt/decrypt at once. */ in ossl_aes_cbc() 146 AES_CBC_ENCRYPT(in, out, seglen, &key, iv, encrypt); in ossl_aes_cbc() 183 bool encrypt; in ossl_aes_gcm() local 185 encrypt = CRYPTO_OP_IS_ENCRYPT(crp->crp_op); in ossl_aes_gcm() 188 if (encrypt) in ossl_aes_gcm() 198 } else if (encrypt) { in ossl_aes_gcm() [all …]
|
H A D | ossl_aarch64.h | 24 size_t length, const void *key, unsigned char *iv, int encrypt) in AES_CBC_ENCRYPT() argument 27 aes_v8_cbc_encrypt(in, out, length, key, iv, encrypt); in AES_CBC_ENCRYPT() 29 vpaes_cbc_encrypt(in, out, length, key, iv, encrypt); in AES_CBC_ENCRYPT()
|
/freebsd-src/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 108 msyslog(LOG_ERR, "MAC encrypt: CMAC %s CTX new failed.", CMAC); in make_mac() 112 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Init failed.", CMAC); in make_mac() 116 msyslog(LOG_ERR, "MAC encrypt: CMAC %s buf too small.", CMAC); in make_mac() 120 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Update failed.", CMAC); in make_mac() 124 msyslog(LOG_ERR, "MAC encrypt: CMAC %s Final failed.", CMAC); in make_mac() 142 msyslog(LOG_ERR, "MAC encrypt: MAC %s buf too small.", in make_mac() 147 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update key failed.", in make_mac() 152 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update data failed.", in make_mac() 157 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Final failed.", in make_mac() 172 msyslog(LOG_ERR, "%s", "MAC encrypt: MAC md5 buf too small."); in make_mac() [all …]
|
/freebsd-src/contrib/file/magic/Magdir/ |
H A D | pgp | 109 >11 byte 0x01 RSA (Encrypt or Sign) 1024b 110 >11 byte 0x02 RSA Encrypt-Only 1024b 126 >12 byte 0x01 RSA (Encrypt or Sign) 2048b 127 >12 byte 0x02 RSA Encrypt-Only 2048b 143 >12 byte 0x01 RSA (Encrypt or Sign) 3072b 144 >12 byte 0x02 RSA Encrypt-Only 3072b 160 >12 byte 0x01 RSA (Encrypt or Sign) 4096b 161 >12 byte 0x02 RSA Encrypt-Only 4096b 177 >12 byte 0x01 RSA (Encrypt or Sign) 8192b 178 >12 byte 0x02 RSA Encrypt [all...] |
/freebsd-src/crypto/openssl/test/ |
H A D | bio_enc_test.c | 17 #define ENCRYPT 1 macro 50 /* Encrypt tests */ in do_bio_cipher() 56 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) in do_bio_cipher() 70 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { in do_bio_cipher() 71 TEST_info("Split encrypt failed @ operation %d", i); in do_bio_cipher() 83 TEST_info("Encrypt overstep check failed @ operation %d", i); in do_bio_cipher() 90 TEST_info("Encrypt compare failed @ operation %d", i); in do_bio_cipher() 102 if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { in do_bio_cipher() 103 TEST_info("Small chunk encrypt failed @ operation %d", i); in do_bio_cipher() 117 TEST_info("Small chunk encrypt compare failed @ operation %d", i); in do_bio_cipher()
|
/freebsd-src/secure/usr.bin/openssl/man/ |
H A D | openssl-cms.1 | 154 [\fB\-encrypt\fR] 297 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages. 301 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt, 324 .IP "\fB\-encrypt\fR" 4 325 .IX Item "-encrypt" 326 Encrypt data for the given recipient certificates. Input file is the message 376 Encrypt content using supplied symmetric key and algorithm using a \s-1CMS\s0 448 \&\fB\-EncryptedData_decrypt\fR, \fB\-encrypt\fR and \fB\-decrypt\fR options. When used 449 with \fB\-encrypt\fR or \fB\-decrypt\fR the supplied key is used to wrap or unwrap the 455 \&\fB\-encrypt\fR. With \fB\-decrypt\fR operations the \fIid\fR is used to locate the [all …]
|
/freebsd-src/crypto/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 45 =item encrypt 47 This state represents the PKEY when it is ready to encrypt some plaintext. 113 … EVP_PKEY_encapsulate | | | | | | EVP_PKEY_encrypt | encrypt | 149 …start newed digest verify verify encrypt decrypt derive … 165 … encrypt encrypt encrypt encrypt encrypt encrypt encrypt … 166 EVP_PKEY_encrypt encrypt 186 …EVP_PKEY_CTX_get_params newed digest verify verify encrypt … 188 …EVP_PKEY_CTX_set_params newed digest verify verify encrypt … 190 …EVP_PKEY_CTX_gettable_params newed digest verify verify encrypt … 192 …EVP_PKEY_CTX_settable_params newed digest verify verify encrypt … [all …]
|
/freebsd-src/crypto/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 21 [B<-encrypt>] 127 It can encrypt, decrypt, sign, verify, compress, uncompress, and print messages. 132 performed: encrypt, decrypt, sign, verify, resign, sign_receipt, verify_receipt, 168 =item B<-encrypt> 170 Encrypt data for the given recipient certificates. Input file is the message 231 Encrypt content using supplied symmetric key and algorithm using a CMS 325 B<-EncryptedData_decrypt>, B<-encrypt> and B<-decrypt> options. When used 326 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the 333 B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the 407 If not specified triple DES is used. Only used with B<-encrypt> and [all …]
|
/freebsd-src/include/rpc/ |
H A D | des.h | 36 #define DES_MAXLEN 65536 /* maximum # of bytes to encrypt */ 37 #define DES_QUICKLEN 16 /* maximum # of bytes to encrypt quickly */ 39 enum desdir { ENCRYPT, DECRYPT }; enumerator 68 * Encrypt an arbitrary sized buffer 73 * Encrypt of small amount of data, quickly
|
/freebsd-src/crypto/openssl/test/recipes/ |
H A D | 15-test_mp_rsa.t | 70 '-encrypt', '-in', $cleartext, 72 "rsa $name encrypt"); 85 '-encrypt', '-in', $cleartext, 87 "rsa $name encrypt"); 94 '-encrypt', '-in', $cleartext, 96 "rsa $name encrypt");
|
/freebsd-src/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 41 to encrypt the 4 byte packet length field. The second instance, 43 (Authenticated Encryption with Associated Data) that is used to encrypt 49 the MAC. By using an independently-keyed cipher instance to encrypt the 80 To send a packet, first encode the 4 byte length and encrypt it using 81 K_1. Encrypt the packet payload (using K_2) and append it to the 88 used to encrypt more than 2^70 bytes under the same {key, nonce}. The
|
/freebsd-src/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.c | 72 #include "encrypt.h" 229 printf("Usage: encrypt enable <type> [input|output]\n"); in EncryptEnable() 245 printf("Usage: encrypt disable <type> [input|output]\n"); in EncryptDisable() 278 printf("Usage: encrypt type <type> [input|output]\n"); in EncryptType() 312 printf("Usage: encrypt start [input|output]\n"); in EncryptStart() 315 printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode); in EncryptStart() 355 printf("Usage: encrypt stop [input|output]\n"); in EncryptStop() 358 printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode); in EncryptStop() 494 /* Called when we receive a WONT or a DONT ENCRYPT after we sent a DO 495 encrypt */ [all …]
|
/freebsd-src/tests/sys/opencrypto/ |
H A D | cryptotest.py | 86 self.runGCM(i, 'ENCRYPT') 93 if mode == 'ENCRYPT': 95 curfun = Crypto.encrypt 132 if mode == 'ENCRYPT': 134 rct, rtag = c.encrypt(pt, iv, aad) 173 if mode == 'ENCRYPT': 175 curfun = Crypto.encrypt 205 if mode == 'ENCRYPT': 207 curfun = Crypto.encrypt 265 r, tag = Crypto.encrypt(c, payload, [all …]
|
/freebsd-src/contrib/telnet/libtelnet/ |
H A D | encrypt.c | 32 static const char sccsid[] = "@(#)encrypt.c 8.2 (Berkeley) 5/30/95"; 65 #include "encrypt.h" 228 printf("Usage: encrypt enable <type> [input|output]\n"); in EncryptEnable() 244 printf("Usage: encrypt disable <type> [input|output]\n"); in EncryptDisable() 277 printf("Usage: encrypt type <type> [input|output]\n"); in EncryptType() 311 printf("Usage: encrypt start [input|output]\n"); in EncryptStart() 314 printf("%s: invalid encryption mode 'encrypt start ?' for help\n", mode); in EncryptStart() 354 printf("Usage: encrypt stop [input|output]\n"); in EncryptStop() 357 printf("%s: invalid encryption mode 'encrypt stop ?' for help\n", mode); in EncryptStop() 472 * Called when ENCRYPT SUPPORT is received. [all …]
|
/freebsd-src/crypto/heimdal/appl/telnet/telnet/ |
H A D | telnet.1 | 329 .It Ic encrypt Ar argument ... 330 The encrypt command manipulates the information sent through the 331 .Dv TELNET ENCRYPT 335 .Dv TELNET ENCRYPT 338 Valid arguments for the encrypt command are as follows: 347 .Ic encrypt disable ?\& 355 .Ic encrypt enable ?\& 359 .Ic encrypt start input 363 .Ic encrypt stop input 367 .Ic encrypt start output [all …]
|
/freebsd-src/crypto/openssl/demos/cipher/ |
H A D | ariacbc.c | 34 /* Example plaintext to encrypt */ 65 printf("ARIA CBC Encrypt:\n"); in aria_cbc_encrypt() 69 /* Create a context for the encrypt operation */ in aria_cbc_encrypt() 78 * Initialise an encrypt operation with the cipher/mode, key and IV. in aria_cbc_encrypt() 84 /* Encrypt plaintext */ in aria_cbc_encrypt() 134 * Initialise an encrypt operation with the cipher/mode, key and IV. in aria_cbc_decrypt()
|
H A D | aeskeywrap.c | 34 /* Example plaintext to encrypt */ 64 printf("aes wrap Encrypt:\n"); in aes_wrap_encrypt() 68 /* Create a context for the encrypt operation */ in aes_wrap_encrypt() 79 * Initialise an encrypt operation with the cipher/mode, key and IV. in aes_wrap_encrypt() 85 /* Encrypt plaintext */ in aes_wrap_encrypt() 136 * Initialise an encrypt operation with the cipher/mode, key and IV. in aes_wrap_decrypt()
|
/freebsd-src/crypto/openssl/doc/life-cycles/ |
H A D | pkey.dot | 10 encrypt [fontcolor="#63AAC0", color="#63AAC0"] 29 newed -> encrypt [label="EVP_PKEY_encrypt_init", fontcolor="#63AAC0", color="#63AAC0"]; 30 encrypt -> encrypt [label="EVP_PKEY_encrypt", fontcolor="#63AAC0", color="#63AAC0"];
|