/openssl/doc/man7/ |
H A D | EVP_MAC-CMAC.pod | 50 =item "encrypt-check" (B<OSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK>) <integer> 86 It may return 0 if the "encrypt-check" option is set to 0.
|
H A D | EVP_CIPHER-DES.pod | 62 L<EVP_EncryptInit(3)/PARAMETERS> including "encrypt-check" and "fips-indicator".
|
H A D | des_modes.pod | 189 Encrypt with key1, decrypt with key2 and encrypt with key3 again. 224 Encrypt with key1, decrypt with key2 and then encrypt with key3.
|
/openssl/providers/fips/ |
H A D | self_test_kats.c | 96 int ret = 0, encrypt = 1, len = 0, ct_len = 0, pt_len = 0; in self_test_cipher() local 113 if (!cipher_init(ctx, cipher, t, encrypt) in self_test_cipher() 137 if (!(cipher_init(ctx, cipher, t, !encrypt) in self_test_cipher() 601 || (t->encrypt && EVP_PKEY_encrypt_init(encctx) <= 0) in self_test_asym_cipher() 602 || (!t->encrypt && EVP_PKEY_decrypt_init(encctx) <= 0)) in self_test_asym_cipher() 619 if (t->encrypt) { in self_test_asym_cipher()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_gcm_hw_ppc.inc | 45 const void *key, unsigned char ivec[16], u64 *Xi, int encrypt) 70 s = encrypt ? ppc_aes_gcm_encrypt(in, out, len, key, ivec, Xi)
|
H A D | cipher_aes_ccm_hw_s390x.inc | 163 /* mac-then-encrypt */ 195 /* encrypt tag */
|
H A D | cipher_aes_hw_rv64i.inc | 77 * All Zvkned-based implementations use the same `encrypt-key` scheduling
|
/openssl/doc/man1/ |
H A D | openssl-pkcs12.pod.in | 198 Use AES to encrypt private keys before outputting. 202 Use ARIA to encrypt private keys before outputting. 206 Use Camellia to encrypt private keys before outputting. 210 Use DES to encrypt private keys before outputting. 214 Use triple DES to encrypt private keys before outputting. 218 Use IDEA to encrypt private keys before outputting. 222 Don't encrypt private keys at all. 330 These options allow the algorithm used to encrypt the private key and 452 Don't encrypt the private key:
|
H A D | openssl-rsautl.pod.in | 22 [B<-encrypt>] 38 This command can be used to sign, verify, encrypt and decrypt 96 =item B<-encrypt> 164 encrypt and decrypt the block would have been of type 2 (the second byte)
|
H A D | openssl-dsa.pod.in | 96 These options encrypt the private key with the specified 158 To encrypt a private key using triple DES:
|
H A D | openssl-rsa.pod.in | 97 These options encrypt the private key with the specified 170 To encrypt a private key using triple DES:
|
H A D | openssl-gendsa.pod.in | 57 These options encrypt the private key with specified
|
H A D | openssl-ec.pod.in | 86 These options encrypt the private key with the DES, triple DES, IDEA or 161 To encrypt a private key using triple DES:
|
/openssl/crypto/bf/ |
H A D | bf_enc.c | 109 const BF_KEY *schedule, unsigned char *ivec, int encrypt) in BF_cbc_encrypt() argument 116 if (encrypt) { in BF_cbc_encrypt()
|
/openssl/doc/man3/ |
H A D | CMS_get0_RecipientInfos.pod | 95 CMS_RecipientInfo_encrypt() attempts to encrypt CMS_RecipientInfo structure 117 an appropriate CMS_RecipientInfo structure to make the content encrypt key 119 CMS_add1_recipient_cert() and finally encrypt the content encryption key
|
H A D | PKCS12_PBE_keyivgen.pod | 43 PKCS12_pbe_crypt() and PKCS12_pbe_crypt_ex() will encrypt or decrypt a buffer 73 The functions are typically used in PKCS#12 to encrypt objects.
|
H A D | DES_random_key.pod | 145 If the I<encrypt> argument is nonzero (DES_ENCRYPT), the I<input> 148 I<DES_set_key>. If I<encrypt> is zero (DES_DECRYPT), the I<input> (now 164 (CBC) mode of DES. If the I<encrypt> argument is nonzero, the 200 useful you ask? Because this routine will allow you to encrypt an 202 routine will encrypt the input bytes to output and then update ivec
|
H A D | CMS_EncryptedData_encrypt.pod | 28 encrypt using I<cipher> and the encryption key I<key> of size I<keylen> bytes.
|
H A D | BF_encrypt.pod | 71 BF_cfb64_encrypt() and BF_ofb64_encrypt() are used to encrypt a variable 96 encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
|
H A D | PKCS8_encrypt.pod | 6 PKCS8_set0_pbe, PKCS8_set0_pbe_ex - PKCS8 encrypt/decrypt functions
|
H A D | b2i_PVK_bio_ex.pod | 33 a password obtained via I<pem_password_cb> is used to encrypt the private key.
|
H A D | EVP_EncryptInit.pod | 386 This function can be called multiple times to encrypt successive blocks 948 Setting "speed" to 1 allows another encrypt or decrypt operation to be 982 Setting a TLS fixed IV changes a cipher to encrypt/decrypt TLS records. 1015 Triggers a multiblock TLS1 encrypt operation for a TLS1 aware cipher that 1019 "tls1multi_enc" supplies the output buffer for the encrypt operation, 1021 values to the encrypt operation. 1025 Supplies the data to encrypt for a TLS1 multiblock cipher operation. 1078 =item "encrypt-check" (B<OSSL_CIPHER_PARAM_FIPS_ENCRYPT_CHECK>) <integer> 1752 int encrypt(const unsigned char *key, const unsigned char *iv, 1761 int ret = 0, encrypt = 1, outlen, len; [all …]
|
/openssl/include/openssl/ |
H A D | modes.h | 194 block128_f encrypt, block128_f decrypt, 197 block128_f encrypt, block128_f decrypt,
|
/openssl/crypto/evp/ |
H A D | evp_local.h | 40 int encrypt; /* encrypt or decrypt */ member 212 OSSL_FUNC_asym_cipher_encrypt_fn *encrypt; member
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_cmac_des.txt | 43 Ctrl = encrypt-check:0
|