/third_party/openssl/doc/man3/ |
D | EVP_SealInit.pod | 5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption 21 encryption. They generate a random key and IV (if required) then 22 "envelope" it by using public key encryption. Data can then be 25 EVP_SealInit() initializes a cipher context B<ctx> for encryption 65 Envelope encryption is the usual method of using public key encryption 66 on large amounts of data, this is because public key encryption is slow 67 but symmetric encryption is fast. So symmetric encryption is used for 68 bulk encryption and the small random symmetric key used is transferred 69 using public key encryption.
|
D | PKCS12_create.pod | 24 B<nid_key> and B<nid_cert> are the encryption algorithms that should be used 26 GCM, CCM, XTS, and OCB are unsupported. B<iter> is the encryption algorithm 35 These defaults are: 40 bit RC2 encryption for certificates, triple DES 36 encryption for private keys, a key iteration count of PKCS12_DEFAULT_ITER 46 it can be used for signing and encryption. This option was useful for old 49 encryption. 59 B<nid_key> or B<nid_cert> can be set to -1 indicating that no encryption
|
D | BF_encrypt.pod | 6 BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption 37 considered good for strong encryption. Blowfish can be used in the same 42 Blowfish consists of a key setup phase and the actual encryption or decryption 48 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function. 50 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>) 72 putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or 78 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>) 88 encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
|
D | RC4_set_key.pod | 5 RC4_set_key, RC4 - RC4 encryption 23 (16 byte) keys are used for strong encryption, but shorter insecure 26 RC4 consists of a key setup phase and the actual encryption or 38 calls as encryption.
|
D | DES_random_key.pod | 13 DES_fcrypt, DES_crypt - DES encryption 97 This library contains a fast implementation of the DES encryption 100 There are two phases to the use of DES encryption. The first is the 102 actual encryption. A DES key is of type I<DES_cblock>. This type 105 the key; it is used to speed the encryption process. 136 DES_ecb_encrypt() is the basic DES encryption routine that encrypts or 148 three-key Triple-DES encryption in ECB mode. This involves encrypting 152 I<ks2> and I<ks3> are the same, it is equivalent to just encryption 156 encryption by using I<ks1> for the final encryption. 169 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret [all …]
|
D | EVP_idea_cbc.pod | 24 The IDEA encryption algorithm for EVP. 34 The IDEA encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
|
D | EVP_bf_cbc.pod | 24 The Blowfish encryption algorithm for EVP. 36 Blowfish encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
|
D | EVP_cast5_cbc.pod | 24 The CAST encryption algorithm for EVP. 36 CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively.
|
D | EVP_seed_cbc.pod | 24 The SEED encryption algorithm for EVP. 36 The SEED encryption algorithm in CBC, CFB, ECB and OFB modes respectively.
|
D | BIO_f_cipher.pod | 29 BIO_flush() on an encryption BIO that is being written through is 34 and IV B<iv>. B<enc> should be set to 1 for encryption and zero for 37 When reading from an encryption BIO the final block is automatically
|
D | OpenSSL_add_all_algorithms.pod | 32 OpenSSL_add_all_ciphers() adds all encryption algorithms to the table including 33 password based encryption algorithms.
|
D | PEM_read_bio_PrivateKey.pod | 183 PKCS#5 v2.0 password based encryption algorithms. The B<cipher> argument 184 specifies the encryption algorithm to use: unlike some other PEM routines the 185 encryption is applied at the PKCS#8 level and not in the PEM headers. If 186 B<cipher> is NULL then no encryption is used and a PKCS#8 PrivateKeyInfo 191 it uses PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. The algorithm 277 which specifies the encryption algorithm to use, encryption is done 339 These old B<PrivateKey> routines use a non standard technique for encryption. 352 contains two comma separated values: the encryption algorithm name as 357 The encryption key is derived using EVP_BytesToKey(). The cipher's 434 triple DES encryption, the pass phrase is prompted for: [all …]
|
D | EVP_rc2_cbc.pod | 28 The RC2 encryption algorithm for EVP. 38 RC2 encryption algorithm in CBC, CFB, ECB and OFB modes respectively. This is a
|
/third_party/e2fsprogs/tests/f_bad_encryption/ |
D | expect.1 | 2 Inode 17 has encrypt flag but no encryption extended attribute. 5 Inode 18 has encrypt flag but no encryption extended attribute. 8 Encrypted inode 19 has corrupt encryption extended attribute. 11 Encrypted inode 20 has corrupt encryption extended attribute. 14 Encrypted inode 21 has corrupt encryption extended attribute. 17 Encrypted inode 22 has corrupt encryption extended attribute. 44 …-[A^FR}^ZhkM-^?=M-c^Mo' in /edir (12) references inode 26, which has a different encryption policy. 47 …FM-/!^YM-OZM-^LM-)M-p1' in /edir (12) references inode 27, which has a different encryption policy. 50 …M-^VM-|M-GiM-^JbM-nM-z' in /edir (12) references inode 28, which has a different encryption policy. 53 …^OM-9M-^QQAM-^N=M-c^Mo' in /edir (12) references inode 29, which has a different encryption policy.
|
/third_party/ffmpeg/libavformat/ |
D | librist.c | 47 int encryption; member 69 …{ "encryption","set encryption type",OFFSET(encryption), AV_OPT_TYPE_INT ,{.i64=0}, … 152 if (((s->encryption == 128 || s->encryption == 256) && !s->secret) || in librist_open() 162 if (s->secret && (s->encryption == 128 || s->encryption == 256)) in librist_open() 163 peer_config->key_size = s->encryption; in librist_open()
|
/third_party/openssl/doc/man7/ |
D | evp.pod | 17 functions provide public key encryption and decryption to implement digital "envelopes". 25 Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)> 50 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)> 52 these functions perform encryption and decryption only. As public key 53 encryption is an expensive operation, normally you would wrap 60 based encryption. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible
|
/third_party/pulseaudio/src/modules/raop/ |
D | raop-sink.c | 87 pa_raop_encryption_t encryption; member 702 const char *server, *protocol, *encryption, *codec; in pa_raop_sink_new() local 783 encryption = pa_modargs_get_value(ma, "encryption", NULL); in pa_raop_sink_new() 786 if (!encryption) { in pa_raop_sink_new() 787 u->encryption = PA_RAOP_ENCRYPTION_NONE; in pa_raop_sink_new() 788 } else if (pa_streq(encryption, "none")) { in pa_raop_sink_new() 789 u->encryption = PA_RAOP_ENCRYPTION_NONE; in pa_raop_sink_new() 790 } else if (pa_streq(encryption, "RSA")) { in pa_raop_sink_new() 791 u->encryption = PA_RAOP_ENCRYPTION_RSA; in pa_raop_sink_new() 793 pa_log("Unsupported encryption type argument: %s", encryption); in pa_raop_sink_new() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/third_party/openssl/doc/man1/ |
D | pkcs8.pod | 83 default. If any encryption options are set then a pass phrase will be 95 the password in deriving the encryption key for the PKCS#8 output. 101 structures using an appropriate password based encryption algorithm. With 124 The B<alg> argument is the encryption algorithm to use, valid values include 152 Uses the B<scrypt> algorithm for private key encryption using default 181 PKCS#8 format using the specified encryption parameters unless B<-nocrypt> 191 encryption algorithms such as 56 bit DES. 210 PKCS#8 format because the encryption details are included at an ASN1 235 These algorithms use the PKCS#12 password based encryption algorithm and 236 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used. [all …]
|
D | enc.pod | 50 either by itself or in addition to the encryption or decryption. 91 Base64 process the data. This means that if encryption is taking place 92 the data is base64 encoded after encryption. If decryption is set then 121 Use a given number of iterations on the password in deriving the encryption key. 166 Print out the key and IV used then immediately exit: don't do any encryption 183 Compress or decompress encrypted data using zlib after encryption or before 189 Use NULL cipher (no encryption or decryption of input). 214 Engines which provide entirely new encryption algorithms (such as the ccgost 233 encryption key. When the salt is being used the first eight bytes of the 262 The B<enc> program does not support authenticated encryption modes [all …]
|
/third_party/boost/libs/convert/ |
D | makefile | 14 target_9 = convert-test-encryption test/encryption.cpp
|
/third_party/boost/libs/convert/doc/ |
D | index.idx | 33 encryption \<\w*(encryption|decryption)\w*\>
|
/third_party/ffmpeg/tests/fate/ |
D | libavutil.mak | 73 FATE_LIBAVUTIL += fate-encryption-info 74 fate-encryption-info: libavutil/tests/encryption_info$(EXESUF) 75 fate-encryption-info: CMD = run libavutil/tests/encryption_info$(EXESUF) 76 fate-encryption-info: CMP = null
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_psa_crypto_driver_wrappers.data | 184 PSA symmetric encryption multipart: AES-CTR, 11+5 bytes 188 PSA symmetric encryption multipart: AES-CTR, 16+16 bytes 192 PSA symmetric encryption multipart: AES-CTR, 12+20 bytes 196 PSA symmetric encryption multipart: AES-CTR, 20+12 bytes 200 PSA symmetric encryption multipart: AES-CTR, 12+10 bytes 204 PSA symmetric encryption multipart: AES-CTR, 0+15 bytes 208 PSA symmetric encryption multipart: AES-CTR, 15+0 bytes 212 PSA symmetric encryption multipart: AES-CTR, 0+16 bytes 216 PSA symmetric encryption multipart: AES-CTR, 16+0 bytes
|