/netbsd/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | EVP_CIPHER-RC5.pod | 9 Support for RC5 symmetric encryption using the B<EVP_CIPHER> API.
|
H A D | EVP_CIPHER-SM4.pod | 9 Support for SM4 symmetric encryption using the B<EVP_CIPHER> API.
|
H A D | EVP_CIPHER-RC2.pod | 9 Support for RC2 symmetric encryption using the B<EVP_CIPHER> API.
|
H A D | EVP_CIPHER-SEED.pod | 9 Support for SEED symmetric encryption using the B<EVP_CIPHER> API.
|
H A D | migration_guide.pod | 1057 =head4 Deprecated low-level encryption functions 1168 See L</Deprecated low-level encryption functions> 1196 See L</Deprecated low-level encryption functions>. 1239 See L</Deprecated low-level encryption functions>. 1246 See L</Deprecated low-level encryption functions>. 1311 See L</Deprecated low-level encryption functions>. 1871 See L</Deprecated low-level encryption functions>. 1884 See L</Deprecated low-level encryption functions>. 1897 See L</Deprecated low-level encryption functions>. 2089 L</Deprecated low-level encryption functions>. [all …]
|
H A D | EVP_CIPHER-CAST.pod | 9 Support for CAST symmetric encryption using the B<EVP_CIPHER> API.
|
H A D | EVP_CIPHER-CAMELLIA.pod | 9 Support for CAMELLIA symmetric encryption using the B<EVP_CIPHER> API.
|
H A D | EVP_CIPHER-ARIA.pod | 9 Support for ARIA symmetric encryption using the B<EVP_CIPHER> API.
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | DTLS_get_data_mtu.pod | 17 of the DTLS record header, encryption and authentication currently in use.
|
H A D | SSL_CIPHER_get_name.pod | 64 If there is no cipher (e.g. for cipher suites with no encryption) then 68 used by B<c> during record encryption/decryption. If there is no digest (e.g. 141 =item Enc=<symmetric encryption method>
|
H A D | EVP_EncryptInit.pod | 340 Sets up cipher context I<ctx> for encryption with cipher I<type>. I<type> is 382 this function is called the encryption operation is finished and no further 403 These functions can be used for decryption or encryption. The operation 405 for encryption, 0 for decryption and -1 to leave the value unchanged 486 is set up for encryption or decryption with EVP_EncryptInit_ex2(), 588 Reports whether the I<ctx> is being used for encryption or decryption. 665 the underlying encryption/decryption primitive. 846 Gets the invocation field generated for encryption. 912 encryption/ decryption for the associated cipher context. 1376 The SIV must be retrieved from the context after encryption, and set into [all …]
|
H A D | EVP_desx_cbc.pod | 16 The DES-X encryption algorithm for EVP.
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man1/ |
H A D | cms.pod | 305 The encryption algorithm to use. For example triple DES (168 bits) - B<-des3> 434 content encryption key using an AES key in the B<KEKRecipientInfo> type. 460 For signing and encryption this option can be used multiple times to 462 currently be used to set RSA-PSS for signing, RSA-OAEP for encryption 656 Note: the encryption command does not include the B<-text> option because the 708 the signer has a separate encryption certificate this must be manually 710 encryption certificate. 715 The code doesn't currently take note of the permitted symmetric encryption 717 user has to manually include the correct encryption algorithm. It should store
|
H A D | smime.pod | 207 The encryption algorithm to use. For example DES (56 bits) - B<-des>, 454 Note: the encryption command does not include the B<-text> option because the 491 the signer has a separate encryption certificate this must be manually 493 encryption certificate. 498 The code doesn't currently take note of the permitted symmetric encryption 500 user has to manually include the correct encryption algorithm. It should store
|
H A D | pkey.pod | 65 option is not specified. If any encryption options are set then a pass phrase 77 with the appropriate encryption algorithm (if any). If the B<-traditional>
|
/netbsd/external/bsd/wpa/dist/hostapd/ |
H A D | README | 258 hardware. It still uses RC4 for the encryption like WEP, but with 270 Handshake) for generating and exchanging data encryption keys between 285 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 328 # Group cipher suite (encryption algorithm for broadcast and multicast frames) 334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-smime.pod.in | 168 The encryption algorithm to use. For example DES (56 bits) - B<-des>, 416 Note: the encryption command does not include the B<-text> option because the 453 the signer has a separate encryption certificate this must be manually 455 encryption certificate. 460 The code doesn't currently take note of the permitted symmetric encryption 462 user has to manually include the correct encryption algorithm. It should store
|
H A D | openssl-cms.pod.in | 327 content encryption key using an AES key in the B<KEKRecipientInfo> type. 352 For signing and encryption this option can be used multiple times to 354 currently be used to set RSA-PSS for signing, RSA-OAEP for encryption 398 The encryption algorithm to use. For example triple DES (168 bits) - B<-des3> 811 Note: the encryption command does not include the B<-text> option because the 867 the signer has a separate encryption certificate this must be manually 869 encryption certificate. 874 The code doesn't currently take note of the permitted symmetric encryption 876 user has to manually include the correct encryption algorithm. It should store
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | EVP_desx_cbc.pod | 16 The DES-X encryption algorithm for EVP.
|
H A D | SSL_CIPHER_get_name.pod | 64 If there is no cipher (e.g. for cipher suites with no encryption) then 68 used by B<c> during record encryption/decryption. If there is no digest (e.g. 141 =item Enc=<symmetric encryption method>
|
/netbsd/external/gpl2/xcvs/dist/ |
H A D | cvs.spec.in | 57 control system with Kerberos authentication and encryption. 69 %configure --with-gssapi=/usr/kerberos --enable-encryption 175 - build with gssapi auth (--with-gssapi, --with-encryption)
|
/netbsd/crypto/external/bsd/heimdal/dist/admin/ |
H A D | ktutil-commands.in | 57 help = "encryption type" 136 help = "encryption types to use"
|
/netbsd/external/bsd/libevent/dist/m4/ |
H A D | libevent_openssl.m4 | 53 to disable support for openssl encryption])
|
/netbsd/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_write_set_format_zip.c | 84 enum encryption { enum 132 enum encryption entry_encryption; 161 enum encryption encryption_type; 199 static int is_winzip_aes_encryption_supported(int encryption); 1645 is_winzip_aes_encryption_supported(int encryption) in is_winzip_aes_encryption_supported() argument 1654 if (encryption == ENCRYPTION_WINZIP_AES128) { in is_winzip_aes_encryption_supported()
|
/netbsd/crypto/external/bsd/heimdal/dist/doc/ |
H A D | apps.texi | 214 You have to make sure you have a @code{des-cbc-md5} encryption type since that 233 since it still uses fcrypt for data encryption and not Kerberos 234 encryption types. 236 Its only possible (in all cases) to do this for DES encryption types
|