Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 234) sorted by relevance

12345678910

/third_party/openssl/doc/man3/
DEVP_SealInit.pod5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption
21 encryption. They generate a random key and IV (if required) then
22 "envelope" it by using public key encryption. Data can then be
25 EVP_SealInit() initializes a cipher context B<ctx> for encryption
65 Envelope encryption is the usual method of using public key encryption
66 on large amounts of data, this is because public key encryption is slow
67 but symmetric encryption is fast. So symmetric encryption is used for
68 bulk encryption and the small random symmetric key used is transferred
69 using public key encryption.
DPKCS12_create.pod24 B<nid_key> and B<nid_cert> are the encryption algorithms that should be used
26 GCM, CCM, XTS, and OCB are unsupported. B<iter> is the encryption algorithm
35 These defaults are: 40 bit RC2 encryption for certificates, triple DES
36 encryption for private keys, a key iteration count of PKCS12_DEFAULT_ITER
46 it can be used for signing and encryption. This option was useful for old
49 encryption.
59 B<nid_key> or B<nid_cert> can be set to -1 indicating that no encryption
DBF_encrypt.pod6 BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption
37 considered good for strong encryption. Blowfish can be used in the same
42 Blowfish consists of a key setup phase and the actual encryption or decryption
48 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function.
50 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
72 putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or
78 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
88 encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
DRC4_set_key.pod5 RC4_set_key, RC4 - RC4 encryption
23 (16 byte) keys are used for strong encryption, but shorter insecure
26 RC4 consists of a key setup phase and the actual encryption or
38 calls as encryption.
DDES_random_key.pod13 DES_fcrypt, DES_crypt - DES encryption
97 This library contains a fast implementation of the DES encryption
100 There are two phases to the use of DES encryption. The first is the
102 actual encryption. A DES key is of type I<DES_cblock>. This type
105 the key; it is used to speed the encryption process.
136 DES_ecb_encrypt() is the basic DES encryption routine that encrypts or
148 three-key Triple-DES encryption in ECB mode. This involves encrypting
152 I<ks2> and I<ks3> are the same, it is equivalent to just encryption
156 encryption by using I<ks1> for the final encryption.
169 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret
[all …]
DEVP_idea_cbc.pod24 The IDEA encryption algorithm for EVP.
34 The IDEA encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
DEVP_bf_cbc.pod24 The Blowfish encryption algorithm for EVP.
36 Blowfish encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
DEVP_cast5_cbc.pod24 The CAST encryption algorithm for EVP.
36 CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively.
DEVP_seed_cbc.pod24 The SEED encryption algorithm for EVP.
36 The SEED encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
DBIO_f_cipher.pod29 BIO_flush() on an encryption BIO that is being written through is
34 and IV B<iv>. B<enc> should be set to 1 for encryption and zero for
37 When reading from an encryption BIO the final block is automatically
DOpenSSL_add_all_algorithms.pod32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including
33 password based encryption algorithms.
DPEM_read_bio_PrivateKey.pod183 PKCS#5 v2.0 password based encryption algorithms. The B<cipher> argument
184 specifies the encryption algorithm to use: unlike some other PEM routines the
185 encryption is applied at the PKCS#8 level and not in the PEM headers. If
186 B<cipher> is NULL then no encryption is used and a PKCS#8 PrivateKeyInfo
191 it uses PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. The algorithm
277 which specifies the encryption algorithm to use, encryption is done
339 These old B<PrivateKey> routines use a non standard technique for encryption.
352 contains two comma separated values: the encryption algorithm name as
357 The encryption key is derived using EVP_BytesToKey(). The cipher's
434 triple DES encryption, the pass phrase is prompted for:
[all …]
DEVP_rc2_cbc.pod28 The RC2 encryption algorithm for EVP.
38 RC2 encryption algorithm in CBC, CFB, ECB and OFB modes respectively. This is a
/third_party/e2fsprogs/tests/f_bad_encryption/
Dexpect.12 Inode 17 has encrypt flag but no encryption extended attribute.
5 Inode 18 has encrypt flag but no encryption extended attribute.
8 Encrypted inode 19 has corrupt encryption extended attribute.
11 Encrypted inode 20 has corrupt encryption extended attribute.
14 Encrypted inode 21 has corrupt encryption extended attribute.
17 Encrypted inode 22 has corrupt encryption extended attribute.
44 …-[A^FR}^ZhkM-^?=M-c^Mo' in /edir (12) references inode 26, which has a different encryption policy.
47 …FM-/!^YM-OZM-^LM-)M-p1' in /edir (12) references inode 27, which has a different encryption policy.
50 …M-^VM-|M-GiM-^JbM-nM-z' in /edir (12) references inode 28, which has a different encryption policy.
53 …^OM-9M-^QQAM-^N=M-c^Mo' in /edir (12) references inode 29, which has a different encryption policy.
/third_party/ffmpeg/libavformat/
Dlibrist.c47 int encryption; member
69 …{ "encryption","set encryption type",OFFSET(encryption), AV_OPT_TYPE_INT ,{.i64=0}, …
152 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open()
162 if (s->secret && (s->encryption == 128 || s->encryption == 256)) in librist_open()
163 peer_config->key_size = s->encryption; in librist_open()
/third_party/openssl/doc/man7/
Devp.pod17 functions provide public key encryption and decryption to implement digital "envelopes".
25 Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)>
50 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)>
52 these functions perform encryption and decryption only. As public key
53 encryption is an expensive operation, normally you would wrap
60 based encryption. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible
/third_party/pulseaudio/src/modules/raop/
Draop-sink.c87 pa_raop_encryption_t encryption; member
702 const char *server, *protocol, *encryption, *codec; in pa_raop_sink_new() local
783 encryption = pa_modargs_get_value(ma, "encryption", NULL); in pa_raop_sink_new()
786 if (!encryption) { in pa_raop_sink_new()
787 u->encryption = PA_RAOP_ENCRYPTION_NONE; in pa_raop_sink_new()
788 } else if (pa_streq(encryption, "none")) { in pa_raop_sink_new()
789 u->encryption = PA_RAOP_ENCRYPTION_NONE; in pa_raop_sink_new()
790 } else if (pa_streq(encryption, "RSA")) { in pa_raop_sink_new()
791 u->encryption = PA_RAOP_ENCRYPTION_RSA; in pa_raop_sink_new()
793 pa_log("Unsupported encryption type argument: %s", encryption); in pa_raop_sink_new()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/third_party/openssl/doc/man1/
Dpkcs8.pod83 default. If any encryption options are set then a pass phrase will be
95 the password in deriving the encryption key for the PKCS#8 output.
101 structures using an appropriate password based encryption algorithm. With
124 The B<alg> argument is the encryption algorithm to use, valid values include
152 Uses the B<scrypt> algorithm for private key encryption using default
181 PKCS#8 format using the specified encryption parameters unless B<-nocrypt>
191 encryption algorithms such as 56 bit DES.
210 PKCS#8 format because the encryption details are included at an ASN1
235 These algorithms use the PKCS#12 password based encryption algorithm and
236 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
[all …]
Denc.pod50 either by itself or in addition to the encryption or decryption.
91 Base64 process the data. This means that if encryption is taking place
92 the data is base64 encoded after encryption. If decryption is set then
121 Use a given number of iterations on the password in deriving the encryption key.
166 Print out the key and IV used then immediately exit: don't do any encryption
183 Compress or decompress encrypted data using zlib after encryption or before
189 Use NULL cipher (no encryption or decryption of input).
214 Engines which provide entirely new encryption algorithms (such as the ccgost
233 encryption key. When the salt is being used the first eight bytes of the
262 The B<enc> program does not support authenticated encryption modes
[all …]
/third_party/boost/libs/convert/
Dmakefile14 target_9 = convert-test-encryption test/encryption.cpp
/third_party/boost/libs/convert/doc/
Dindex.idx33 encryption \<\w*(encryption|decryption)\w*\>
/third_party/ffmpeg/tests/fate/
Dlibavutil.mak73 FATE_LIBAVUTIL += fate-encryption-info
74 fate-encryption-info: libavutil/tests/encryption_info$(EXESUF)
75 fate-encryption-info: CMD = run libavutil/tests/encryption_info$(EXESUF)
76 fate-encryption-info: CMP = null
/third_party/mbedtls/tests/suites/
Dtest_suite_psa_crypto_driver_wrappers.data184 PSA symmetric encryption multipart: AES-CTR, 11+5 bytes
188 PSA symmetric encryption multipart: AES-CTR, 16+16 bytes
192 PSA symmetric encryption multipart: AES-CTR, 12+20 bytes
196 PSA symmetric encryption multipart: AES-CTR, 20+12 bytes
200 PSA symmetric encryption multipart: AES-CTR, 12+10 bytes
204 PSA symmetric encryption multipart: AES-CTR, 0+15 bytes
208 PSA symmetric encryption multipart: AES-CTR, 15+0 bytes
212 PSA symmetric encryption multipart: AES-CTR, 0+16 bytes
216 PSA symmetric encryption multipart: AES-CTR, 16+0 bytes

12345678910