/openssl/util/perl/TLSProxy/ |
H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
H A D | Record.pm | 154 $record->encrypted(1); 295 encrypted => 0, 401 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 504 sub encrypted subroutine 508 $self->{encrypted} = shift; 510 return $self->{encrypted};
|
/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 129 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex() 130 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex() 131 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex() 132 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex() 162 if (p7->d.encrypted == NULL) { in STACK_OF() 167 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 170 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
|
H A D | p12_npas.c | 83 if (p7->d.encrypted == NULL in newpass_p12() 84 || !alg_get(p7->d.encrypted->enc_data->algorithm, in newpass_p12()
|
/openssl/doc/man3/ |
H A D | EVP_SealInit.pod | 23 encrypted using this key. 27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 31 must contain enough room for the corresponding encrypted key: that is 33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
|
H A D | PKCS12_pack_p7encdata.pod | 6 into a PKCS#7 encrypted data object 22 PKCS12_pack_p7encdata() generates a PKCS#7 ContentInfo object of encrypted-data
|
H A D | SSL_CTX_set_default_passwd_cb.pod | 9 get passwd callback for encrypted PEM file handling 67 B<rwflag> to check, whether an item shall be encrypted (rwflag=1). 72 Other items in PEM formatting (certificates) can also be encrypted, it is
|
H A D | EVP_OpenInit.pod | 20 decryption. They decrypt a public key encrypted symmetric key and 24 with cipher B<type>. It decrypts the encrypted symmetric key of length
|
H A D | PKCS8_encrypt.pod | 35 The resulting B<X509_SIG> contains the encoded algorithm parameters and encrypted 51 return an encrypted key in a B<X509_SIG> structure or NULL if an error occurs.
|
H A D | PKCS12_add_cert.pod | 33 (encrypted) containing the supplied B<EVP_PKEY> and adds this to the set of PKCS#12 34 safeBags. If I<key_nid> is not -1 then the key is encrypted with the supplied
|
H A D | CMS_decrypt.pod | 34 The I<dcont> parameter is used in the rare case where the encrypted content 65 error when all recipient encrypted keys failed to decrypt an attacker could 68 recipient encrypted key can be decrypted B<without> generating a random
|
H A D | SSL_CTX_set_split_send_fragment.pod | 38 each one encrypted independently and in parallel. Note: this will only work in 63 Pipelining operates slightly differently for reading encrypted data compared to 64 writing encrypted data. SSL_CTX_set_split_send_fragment() and 66 writing encrypted data. The number of pipelines used will be determined by the
|
H A D | EVP_PKEY_encrypt.pod | 28 using B<ctx>. The data to be encrypted is specified using the B<in> and 32 B<out> buffer, if the call is successful the encrypted data is written to
|
H A D | CMS_encrypt.pod | 21 I<in> is the content to be encrypted. I<cipher> is the symmetric cipher to use. 65 The data being encrypted is included in the CMS_ContentInfo structure, unless
|
H A D | RSA_size.pod | 32 determine how much memory must be allocated for an RSA encrypted
|
H A D | PKCS12_item_decrypt_d2i.pod | 52 PKCS12_item_i2d_encrypt() and PKCS12_item_i2d_encrypt_ex() return the encrypted
|
H A D | PEM_read.pod | 65 PEM_read() or PEM_read_bio() is encrypted and to retrieve the associated cipher 87 If the data is a priori known to not be encrypted, then neither PEM_do_header()
|
/openssl/demos/encrypt/ |
H A D | rsa_encrypt.c | 218 unsigned char *encrypted = NULL, *decrypted = NULL; in main() local 221 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) { in main() 225 if (!do_decrypt(libctx, encrypted, encrypted_len, in main() 238 OPENSSL_free(encrypted); in main()
|
/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 76 to be encrypted. The output file is the encrypted mail in MIME format. 84 encrypted mail message in MIME format for the input file. The decrypted mail 108 The input message to be encrypted or signed or the MIME message to 302 The supplied message to be signed or encrypted must include the 307 A "signed and encrypted" message is one where a signed message is 308 then encrypted. This can be produced by encrypting an already signed 318 encrypted data is used for other purposes. 398 Send encrypted mail using triple DES: 412 message being encrypted already has MIME headers. 434 Create an encrypted message using 128 bit Camellia:
|
H A D | openssl-pkcs8.pod.in | 60 not used) then the input file must be in PKCS#8 format. An encrypted 71 file in a format specified by B<-inform>. The output file will be encrypted 83 option is not specified. If the key is encrypted a pass phrase will be 175 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 176 counts are more secure that those encrypted using the traditional 180 It is possible to write out DER encoded encrypted private keys in 245 Convert a private key from any PKCS#8 encrypted format to traditional format:
|
H A D | openssl-cms.pod.in | 172 to be encrypted. The output file is the encrypted data in MIME format. The 181 encrypted datain MIME format for the input file. The decrypted data 387 A certificate of the originator of the encrypted message. Necessary for 645 The supplied message to be signed or encrypted must include the 650 A "signed and encrypted" message is one where a signed message is 651 then encrypted. This can be produced by encrypting an already signed 661 encrypted data is used for other purposes. 810 Send encrypted mail using triple DES: 824 message being encrypted already has MIME headers. 846 Create an encrypted message using 128 bit Camellia: [all …]
|
/openssl/test/recipes/ |
H A D | 70-test_tls13alerts.t | 42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unencry…
|
/openssl/doc/man7/ |
H A D | provider-asym_cipher.pod | 134 The data to be encrypted is pointed to by the I<in> parameter which is I<inlen> 136 Unless I<out> is NULL, the encrypted data should be written to the location 139 The length of the encrypted data should be written to I<*outlen>. 140 If I<out> is NULL then the maximum length of the encrypted data should be
|
/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 156 if ((p7->d.encrypted = PKCS7_ENCRYPT_new()) in PKCS7_set_type() 159 if (!ASN1_INTEGER_set(p7->d.encrypted->version, 0)) in PKCS7_set_type() 161 p7->d.encrypted->enc_data->content_type = OBJ_nid2obj(NID_pkcs7_data); in PKCS7_set_type()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fault-injector.md | 35 need to be done in handshake messages that would normally be encrypted. 44 EncryptedExtensions message. That message is encrypted and so cannot be 48 that enables modification of handshake data prior to it being encrypted and 92 faults into these packets prior to them being encrypted. 99 which will provide the ability to mutate packets before they are encrypted and 139 An example test might modify an encrypted packet to confirm that the AEAD
|