/netbsd/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | life_cycle-cipher.pod | 34 =item initialised for encryption using EVP_EncryptInit 128 … decryption decryption encryption encryption 134 … encryption encryption encryption encryption encryption encryption encryption encryption 139 … encryption encryption 146 … decryption decryption encryption encryption 148 … decryption decryption encryption encryption 150 … decryption decryption encryption encryption 152 … decryption decryption encryption encryption 170 <th style="border:1px solid" align="center">updated<br>encryption</th> 246 <td style="border:1px solid" align="center">updated<br>encryption</td> [all …]
|
H A D | evp.pod | 17 functions provide public key encryption and decryption to implement digital "envelopes". 25 Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)> 51 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)> 53 these functions perform encryption and decryption only. As public key 54 encryption is an expensive operation, normally you would wrap 61 based encryption. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | EVP_SealInit.pod | 5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption 21 encryption. They generate a random key and IV (if required) then 22 "envelope" it by using public key encryption. Data can then be 25 EVP_SealInit() initializes a cipher context B<ctx> for encryption 65 Envelope encryption is the usual method of using public key encryption 66 on large amounts of data, this is because public key encryption is slow 67 but symmetric encryption is fast. So symmetric encryption is used for 68 bulk encryption and the small random symmetric key used is transferred 69 using public key encryption.
|
H A D | PKCS12_create.pod | 24 B<nid_key> and B<nid_cert> are the encryption algorithms that should be used 26 GCM, CCM, XTS, and OCB are unsupported. B<iter> is the encryption algorithm 35 These defaults are: 40 bit RC2 encryption for certificates, triple DES 36 encryption for private keys, a key iteration count of PKCS12_DEFAULT_ITER 46 it can be used for signing and encryption. This option was useful for old 49 encryption. 59 B<nid_key> or B<nid_cert> can be set to -1 indicating that no encryption
|
H A D | BF_encrypt.pod | 6 BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption 37 considered good for strong encryption. Blowfish can be used in the same 42 Blowfish consists of a key setup phase and the actual encryption or decryption 48 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function. 50 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>) 72 putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or 78 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>) 88 encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
|
H A D | RC4_set_key.pod | 5 RC4_set_key, RC4 - RC4 encryption 23 (16 byte) keys are used for strong encryption, but shorter insecure 26 RC4 consists of a key setup phase and the actual encryption or 38 calls as encryption.
|
H A D | DES_random_key.pod | 13 DES_fcrypt, DES_crypt - DES encryption 97 This library contains a fast implementation of the DES encryption 100 There are two phases to the use of DES encryption. The first is the 102 actual encryption. A DES key is of type I<DES_cblock>. This type 105 the key; it is used to speed the encryption process. 152 I<ks2> and I<ks3> are the same, it is equivalent to just encryption 156 encryption by using I<ks1> for the final encryption. 169 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret 190 a complete DES ECB encryption per I<numbits>, this function is only 209 a complete DES ECB encryption per I<numbits>, this function is only [all …]
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | EVP_SealInit.pod | 5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption 21 encryption. They generate a random key and IV (if required) then 22 "envelope" it by using public key encryption. Data can then be 25 EVP_SealInit() initializes a cipher context B<ctx> for encryption 65 Envelope encryption is the usual method of using public key encryption 66 on large amounts of data, this is because public key encryption is slow 67 but symmetric encryption is fast. So symmetric encryption is used for 68 bulk encryption and the small random symmetric key used is transferred 69 using public key encryption.
|
H A D | PKCS12_create.pod | 28 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used 30 GCM, CCM, XTS, and OCB are unsupported. I<iter> is the encryption algorithm 42 These defaults are: AES password based encryption (PBES2 with PBKDF2 and 54 it can be used for signing and encryption. This option was useful for old 57 encryption. 67 I<nid_key> or I<nid_cert> can be set to -1 indicating that no encryption 93 The defaults for encryption algorithms, MAC algorithm, and the MAC key
|
H A D | BF_encrypt.pod | 6 BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption 45 considered good for strong encryption. Blowfish can be used in the same 50 Blowfish consists of a key setup phase and the actual encryption or decryption 56 BF_ecb_encrypt() is the basic Blowfish encryption and decryption function. 58 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>) 80 putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or 86 putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>) 96 encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
|
H A D | DES_random_key.pod | 13 DES_fcrypt, DES_crypt - DES encryption 105 This library contains a fast implementation of the DES encryption 108 There are two phases to the use of DES encryption. The first is the 110 actual encryption. A DES key is of type I<DES_cblock>. This type 113 the key; it is used to speed the encryption process. 157 I<ks2> and I<ks3> are the same, it is equivalent to just encryption 161 encryption by using I<ks1> for the final encryption. 174 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret 195 a complete DES ECB encryption per I<numbits>, this function is only 214 a complete DES ECB encryption per I<numbits>, this function is only [all …]
|
H A D | RC4_set_key.pod | 5 RC4_set_key, RC4 - RC4 encryption 31 (16 byte) keys are used for strong encryption, but shorter insecure 34 RC4 consists of a key setup phase and the actual encryption or 46 calls as encryption.
|
/netbsd/crypto/dist/ipsec-tools/src/racoon/rfc/ |
H A D | rfc4109.txt | 77 o DES for encryption MUST be supported. 82 o TripleDES for encryption SHOULD be supported. 86 o RSA for authentication with encryption SHOULD be supported. 102 o TripleDES for encryption MUST be supported. 103 o AES-128 in CBC mode [RFC3602] for encryption SHOULD be supported. 123 very likely that implementation of AES-128 in CBC mode for encryption 130 signatures, and RSA for authentication with encryption. 132 DES for encryption, MD5 for hashing, and Diffie-Hellman MODP group 1 144 DES for encryption MUST MAY (crypto weakness) 145 TripleDES for encryption SHOULD MUST [all …]
|
/netbsd/external/bsd/ppp/dist/ |
H A D | README.MPPE | 12 MPPE is Microsoft's encryption scheme for PPP links. It is pretty much 14 point to point link you have little need for encryption. It is generally 23 reasonable since, if you want encryption, you want encryption. That is, 24 I am not convinced that optional encryption is useful. 44 - Use 128-bit encryption.
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man7/ |
H A D | evp.pod | 17 functions provide public key encryption and decryption to implement digital "envelopes". 25 Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)> 50 =item For encryption and decryption see L<EVP_PKEY_encrypt(3)> 52 these functions perform encryption and decryption only. As public key 53 encryption is an expensive operation, normally you would wrap 60 based encryption. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible
|
/netbsd/crypto/external/bsd/openssl/dist/doc/life-cycles/ |
H A D | cipher.dot | 14 e_initialised [label="initialised\n(encryption)", fontcolor="#c94c4c"]; 15 e_updated [label="updated\n(encryption)", fontcolor="#c94c4c"]; 24 finaled -> finaled [label="EVP_CIPHER_CTX_get_params\n(AEAD encryption)", 63 finaled -> finaled [label="EVP_CIPHER_CTX_get_params\n(AEAD encryption)",
|
/netbsd/crypto/external/bsd/openssl.old/lib/libdes/ |
H A D | des.pod | 14 des_fcrypt, des_crypt, des_enc_read, des_enc_write - DES encryption 115 This library contains a fast implementation of the DES encryption 118 There are two phases to the use of DES encryption. The first is the 120 actual encryption. A DES key is of type I<des_cblock>. This type is 123 the key; it is used to speed the encryption process. 173 I<ks2> and I<ks3> are the same, it is equivalent to just encryption 177 encryption by using I<ks1> for the final encryption. 190 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret 211 a complete DES ECB encryption per I<numbits>, this function is only 230 a complete DES ECB encryption per numbits, this function is only [all …]
|
/netbsd/crypto/external/bsd/openssl/lib/libdes/ |
H A D | des.pod | 14 des_fcrypt, des_crypt, des_enc_read, des_enc_write - DES encryption 115 This library contains a fast implementation of the DES encryption 118 There are two phases to the use of DES encryption. The first is the 120 actual encryption. A DES key is of type I<des_cblock>. This type is 123 the key; it is used to speed the encryption process. 173 I<ks2> and I<ks3> are the same, it is equivalent to just encryption 177 encryption by using I<ks1> for the final encryption. 190 I<outw> to 'whiten' the encryption. I<inw> and I<outw> are secret 211 a complete DES ECB encryption per I<numbits>, this function is only 230 a complete DES ECB encryption per numbits, this function is only [all …]
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-pkcs8.pod.in | 71 PKCS#8 format using the specified encryption parameters unless B<-nocrypt> 94 default. If any encryption options are set then a pass phrase will be 101 the password in deriving the encryption key for the PKCS#8 output. 111 structures using an appropriate password based encryption algorithm. With 121 The I<alg> argument is the encryption algorithm to use, valid values include 142 Uses the B<scrypt> algorithm for private key encryption using default 166 encryption algorithms such as 56 bit DES. 174 PKCS#8 format because the encryption details are included at an ASN1 199 These algorithms use the PKCS#12 password based encryption algorithm and 200 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used. [all …]
|
H A D | openssl-pkcs12.pod.in | 82 The PKCS#12 export encryption and MAC options such as B<-certpbe> and B<-iter> 84 Conversely, the options regarding encryption of private keys when outputting 87 The default encryption algorithm is AES-256-CBC with PBKDF2 for key derivation. 117 Prompt for separate integrity and encryption passwords: most software 143 In the legacy mode, the default algorithm for certificate encryption 145 in the build. The default algorithm for private key encryption is 3DES_CBC. 147 and the default encryption algorithm for both certificates and private keys is 318 encryption purposes but arbitrary length keys for signing. The B<-keysig> 359 By default both encryption and MAC iteration counts are set to 2048, using 397 The B<-keypbe> and B<-certpbe> algorithms allow the precise encryption [all …]
|
/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | PROTOCOL.chacha20poly1305 | 2 encryption cipher supported by OpenSSH. 17 authenticated encryption mode. The construction used is based on that 19 data passed to the MAC and in the addition of encryption of the packet 25 The chacha20-poly1305@openssh.com offers both encryption and 60 for encryption of the packet payload. 87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
|
/netbsd/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" 386 - uses label "client EAP encryption" [all …]
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man1/ |
H A D | pkcs8.pod | 83 default. If any encryption options are set then a pass phrase will be 95 the password in deriving the encryption key for the PKCS#8 output. 101 structures using an appropriate password based encryption algorithm. With 124 The B<alg> argument is the encryption algorithm to use, valid values include 152 Uses the B<scrypt> algorithm for private key encryption using default 181 PKCS#8 format using the specified encryption parameters unless B<-nocrypt> 191 encryption algorithms such as 56 bit DES. 210 PKCS#8 format because the encryption details are included at an ASN1 235 These algorithms use the PKCS#12 password based encryption algorithm and 236 allow strong encryption algorithms like triple DES or 128 bit RC2 to be used. [all …]
|
/netbsd/sys/external/bsd/drm2/dist/drm/amd/display/modules/hdcp/ |
H A D | amdgpu_hdcp1_transition.c | 87 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 137 input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 235 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition() 310 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | krb5_err.et | 25 error_code ETYPE_NOSUPP, "KDC has no support for encryption type" 101 error_code PUBLIC_KEY_ENCRYPTION_NOT_SUPPORTED, "Public key encryption not supported" 155 error_code KRB5_PROG_ETYPE_NOSUPP, "Program lacks support for encryption type" 157 error_code KRB5_WRONG_ETYPE, "Requested encryption type not used in message" 205 error_code KRB5_BAD_ENCTYPE, "Bad encryption type" 206 error_code KRB5_BAD_KEYSIZE, "Key size is incompatible with encryption type" 207 error_code KRB5_BAD_MSIZE, "Message size is incompatible with encryption type" 219 error_code KRB5_CC_NOT_KTYPE, "No credentials found with supported encryption types" 264 error_code KRB5_SAM_INVALID_ETYPE, "Invalid encryption type in SAM challenge"
|