Home
last modified time | relevance | path

Searched full:encryption (Results 1 – 25 of 1896) sorted by relevance

12345678910>>...76

/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/
H A Dzfs_create_encrypted.ksh30 # encryption properties set.
33 # enc = encryption
39 # no unspec 0 0 yes inherit no encryption (not tested here)
43 # no off 0 0 yes explicit no encryption
49 # no on 1 0 yes new encryption root
50 # no on 1 1 yes new encryption root
51 # yes unspec 0 0 yes inherit encryption
53 # yes unspec 1 0 yes new encryption root, crypt inherited
54 # yes unspec 1 1 yes new encryption root, crypt inherited
59 # yes on 0 0 yes inherited encryption, local crypt
[all …]
H A Dzfs_create_crypt_combos.ksh29 # 'zfs create' should create an encrypted dataset with a valid encryption
33 # 1. Create a filesystem for each combination of encryption type and key format
48 "encryption=on" \
49 "encryption=aes-128-ccm" \
50 "encryption=aes-192-ccm" \
51 "encryption=aes-256-ccm" \
52 "encryption=aes-128-gcm" \
53 "encryption=aes-192-gcm" \
54 "encryption=aes-256-gcm"
57 "encryption=aes-256-gcm" \
[all …]
/illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_create/
H A Dzfs_create_encrypted.ksh29 # encryption properties set.
32 # enc = encryption
38 # no unspec 0 0 yes inherit no encryption (not tested here)
42 # no off 0 0 yes explicit no encryption
48 # no on 1 0 yes new encryption root
49 # no on 1 1 yes new encryption root
50 # yes unspec 0 0 yes inherit encryption
52 # yes unspec 1 0 yes new encryption root, crypt inherited
53 # yes unspec 1 1 yes new encryption root, crypt inherited
58 # yes on 0 0 yes inherited encryption, local crypt
[all …]
H A Dzfs_create_crypt_combos.ksh28 # 'zfs create' should create an encrypted dataset with a valid encryption
32 # 1. Create a filesystem for each combination of encryption type and key format
47 "encryption=on" \
48 "encryption=aes-128-ccm" \
49 "encryption=aes-192-ccm" \
50 "encryption=aes-256-ccm" \
51 "encryption=aes-128-gcm" \
52 "encryption=aes-192-gcm" \
53 "encryption=aes-256-gcm"
56 "encryption=aes-256-ccm" \
[all …]
/illumos-gate/usr/src/test/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_props.ksh26 # Verify that zfs properly handles encryption properties when receiving
33 # 4. Verify that 'zfs recv -x <encryption prop>' fails on a raw send stream
34 # 5. Verify that encryption properties cannot be changed on incrementals
35 # 6. Verify that a simple send can be received as an encryption root
37 # encryption root
39 # encryption root
41 # encryption child
43 # encryption child
58 log_assert "'zfs recv' must properly handle encryption properties"
72 log_must zfs create -o encryption=on -o keyformat=passphrase \
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_props.ksh26 # Verify that zfs properly handles encryption properties when receiving
33 # 4. Verify that 'zfs recv -x <encryption prop>' fails on a raw send stream
34 # 5. Verify that encryption properties cannot be changed on incrementals
35 # 6. Verify that a simple send can be received as an encryption root
37 # encryption root
39 # encryption root
41 # encryption child
43 # encryption child
58 log_assert "'zfs recv' must properly handle encryption properties"
72 log_must zfs create -o encryption=on -o keyformat=passphrase \
[all …]
/freebsd/sys/contrib/openzfs/man/man8/
H A Dzfs-unload-key.839 .Nd load, unload, or change encryption key of ZFS dataset
102 encryption roots.
104 Loads the keys for all encryption roots in all imported pools.
146 encryption roots.
148 Unloads the keys for all encryption roots in all imported pools.
174 If the dataset was not previously an encryption root it will become one.
177 flag may be provided to cause an encryption root to inherit the parent's key
207 Allows the user to set encryption key properties
219 Note that this command can only be run on an encryption root
223 .Ss Encryption
[all...]
H A Dzfs-change-key.839 .Nd load, unload, or change encryption key of ZFS dataset
102 encryption roots.
104 Loads the keys for all encryption roots in all imported pools.
146 encryption roots.
148 Unloads the keys for all encryption roots in all imported pools.
174 If the dataset was not previously an encryption root it will become one.
177 flag may be provided to cause an encryption root to inherit the parent's key
207 Allows the user to set encryption key properties
219 Note that this command can only be run on an encryption root
223 .Ss Encryption
[all...]
H A Dzfs-load-key.839 .Nd load, unload, or change encryption key of ZFS dataset
102 encryption roots.
104 Loads the keys for all encryption roots in all imported pools.
146 encryption roots.
148 Unloads the keys for all encryption roots in all imported pools.
174 If the dataset was not previously an encryption root it will become one.
177 flag may be provided to cause an encryption root to inherit the parent's key
207 Allows the user to set encryption key properties
219 Note that this command can only be run on an encryption root
223 .Ss Encryption
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/
H A Dzpool_create_crypt_combos.ksh28 # 'zpool create' should create encrypted pools when using a valid encryption
32 # 1. Create a pool for each combination of encryption type and key format
44 set -A ENCRYPTION_ALGS "encryption=on" \
45 "encryption=aes-128-ccm" \
46 "encryption=aes-192-ccm" \
47 "encryption=aes-256-ccm" \
48 "encryption=aes-128-gcm" \
49 "encryption=aes-192-gcm" \
50 "encryption=aes-256-gcm"
52 set -A ENCRYPTION_PROPS "encryption=aes-256-gcm" \
[all …]
H A Dzpool_create_encrypted.ksh28 # combination of encryption properties set.
30 # enc = encryption
43 # N 0 0 yes explicit no encryption
49 # Y 1 1 no unsupported combination of non-encryption props
50 # Y 1 0 yes new encryption root
51 # Y 1 1 yes new encryption root
54 # 1. Attempt to create a dataset using all combinations of encryption
67 "has a valid combination of encryption properties set."
74 log_must zpool create -O encryption=off $TESTPOOL $DISKS
77 log_mustnot zpool create -O encryption=off -O keylocation=prompt \
[all …]
/illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zpool_create/
H A Dzpool_create_crypt_combos.ksh27 # 'zpool create' should create encrypted pools when using a valid encryption
31 # 1. Create a pool for each combination of encryption type and key format
43 set -A ENCRYPTION_ALGS "encryption=on" \
44 "encryption=aes-128-ccm" \
45 "encryption=aes-192-ccm" \
46 "encryption=aes-256-ccm" \
47 "encryption=aes-128-gcm" \
48 "encryption=aes-192-gcm" \
49 "encryption=aes-256-gcm"
51 set -A ENCRYPTION_PROPS "encryption=aes-256-ccm" \
[all …]
H A Dzpool_create_encrypted.ksh27 # combination of encryption properties set.
29 # enc = encryption
42 # N 0 0 yes explicit no encryption
48 # Y 1 0 yes new encryption root
49 # Y 1 1 yes new encryption root
52 # 1. Attempt to create a dataset using all combinations of encryption
65 "has a valid combination of encryption properties set."
72 log_must zpool create -O encryption=off $TESTPOOL $DISKS
75 log_mustnot zpool create -O encryption=off -O keylocation=prompt \
77 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
[all …]
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/
H A DEncryption_Types.htm8 <h1>Encryption Types</h1>
10 Kerberos supports several types of encryption for securing session keys
15 Kerberos installation checks for an encryption type that is shared by
17 <li> When encrypting session keys, the KDC checks for an encryption
28 <li><a href="#view"> View encryption types</a></li>
33 <li><a href="#weak"> Weak encryption types</a></li>
34 <li><a href="#supported"> Supported encryption types</a></li>
42 <h2><a name="weak"> Weak Encryption Types </a></h2>
44 In the table of Encryption Types below, some encryption types are noted as <b>weak</b>.
45 Most of them are encryption types that used to be strong but now, with
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-cipher.786 .IP "initialised for encryption using EVP_EncryptInit" 4
87 .IX Item "initialised for encryption using EVP_EncryptInit"
128 | for decryption | | | | for encryption |
141 …| for decryption | <-------------------+ | | for encryption | …
152 | (AEAD encryption)
166 … decryption decryption encryption encryption
172encryption encryption encryption encryption encryption encryption encryption encryption
177encryption encryption
184 … decryption decryption encryption encryption
186 … decryption decryption encryption encryption
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_block.h46 * functions are provided, for CBC encryption, CBC decryption, and CTR
47 * encryption/decryption. Each set has its own context structure,
48 * initialised with the encryption key.
50 * For CBC encryption and decryption, the data to encrypt or decrypt is
55 * Function for CTR encryption are defined only for block ciphers with
72 * expansion. These subkeys are appropriate for CBC encryption. The
78 * Perform key expansion: subkeys for CBC encryption are computed and
85 * Perform CBC encryption of `len` bytes, in place. The encrypted data
116 * expansion. These subkeys are appropriate for CTR encryption and
122 * Perform key expansion: subkeys for CTR encryption and decryption
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-cipher.pod34 =item initialised for encryption using EVP_EncryptInit
82 | for decryption | | | | for encryption |
95 …| for decryption | <-------------------+ | | for encryption | …
106 | (AEAD encryption)
128 … decryption decryption encryption encryption
134encryption encryption encryption encryption encryption encryption encryption encryption
139encryption encryption
146 … decryption decryption encryption encryption
148 … decryption decryption encryption encryption
150 … decryption decryption encryption encryption
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_change-key/
H A Dzfs_change-key_clones.ksh27 # 'zfs change-key' should correctly update encryption roots with clones.
31 # 2. Create an encryption root child of the first dataset
32 # 3. Clone the child encryption root twice
33 # 4. Add inheriting children to the encryption root and each of the clones
34 # 5. Verify the encryption roots
35 # 6. Have the child encryption root inherit from its parent
36 # 7. Verify the encryption root for all datasets is now the parent dataset
49 log_assert "'zfs change-key' should correctly update encryption " \
52 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \
54 log_must eval "echo $PASSPHRASE2 | zfs create -o encryption=on" \
[all …]
/illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_change-key/
H A Dzfs_change-key_clones.ksh26 # 'zfs change-key' should correctly update encryption roots with clones.
30 # 2. Create an encryption root child of the first dataset
31 # 3. Clone the child encryption root twice
32 # 4. Add inheriting children to the encryption root and each of the clones
33 # 5. Verify the encryption roots
34 # 6. Have the child encryption root inherit from its parent
35 # 7. Verify the encryption root for all datasets is now the parent dataset
48 log_assert "'zfs change-key' should correctly update encryption " \
51 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \
53 log_must eval "echo $PASSPHRASE2 | zfs create -o encryption=on" \
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption
21 encryption. They generate a random key and IV (if required) then
22 "envelope" it by using public key encryption. Data can then be
25 EVP_SealInit() initializes a cipher context B<ctx> for encryption
65 Envelope encryption is the usual method of using public key encryption
66 on large amounts of data, this is because public key encryption is slow
67 but symmetric encryption is fast. So symmetric encryption is used for
68 bulk encryption and the small random symmetric key used is transferred
69 using public key encryption.
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_to_encrypted.ksh36 # 8. Attempt to receive with -o encryption=off to an unencrypted child
67 log_must eval "echo $passphrase | zfs create -o encryption=on" \
72 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c1)" != "off"
85 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c2)" == "off"
93 zfs receive -o encryption=off $TESTPOOL/$TESTFS1/c2o"
94 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c2o)" == "off"
98 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c3)" == "off"
104 # Verify that replication can override encryption properties
105 log_note "Verifying replication can override encryption properties for plain dataset"
108 log_must eval "zfs send -R $snap2 | zfs recv -s -F -o encryption=on" \
[all …]
H A Dzfs_receive_-wR-encrypted-mix.ksh41 # 4. Check the encryption property of the received datasets
63 create_dataset "$src" -o encryption=on -o keyformat=passphrase
64 create_dataset "$src/u" "-o encryption=off"
66 create_dataset "$src/u/e" -o encryption=on -o keyformat=passphrase
67 create_dataset "$src/u/e/u" -o encryption=off
71 log_must test "$(get_prop 'encryption' $dst)" != "off"
72 log_must test "$(get_prop 'encryption' $dst/u)" == "off"
73 log_must test "$(get_prop 'encryption' $dst/u/e)" != "off"
74 log_must test "$(get_prop 'encryption' $dst/u/e/u)" == "off"
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_rename/
H A Dzfs_rename_encrypted_child.ksh28 # encryption root.
31 # 1. Create two encryption roots, and a child and grandchild of the first
32 # encryption root
36 # 5. Verify the encryption root of the dataset
38 # 7. Verify the encryption root of the dataset
53 "encryption root"
55 log_must eval "echo $PASSPHRASE | zfs create -o encryption=on" \
59 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \
79 "encryption root"
/illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_rename/
H A Dzfs_rename_encrypted_child.ksh27 # encryption root.
30 # 1. Create two encryption roots, and a child and grandchild of the first
31 # encryption root
35 # 5. Verify the encryption root of the dataset
37 # 7. Verify the encryption root of the dataset
52 "encryption root"
54 log_must eval "echo $PASSPHRASE | zfs create -o encryption=on" \
58 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \
78 "encryption root"
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_SealInit.364 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal \- EVP envelope encryption
80 encryption. They generate a random key and IV (if required) then
81 "envelope" it by using public key encryption. Data can then be
84 \&\fBEVP_SealInit()\fR initializes a cipher context \fBctx\fR for encryption
122 Envelope encryption is the usual method of using public key encryption
123 on large amounts of data, this is because public key encryption is slow
124 but symmetric encryption is fast. So symmetric encryption is used for
125 bulk encryption and the small random symmetric key used is transferred
126 using public key encryption.

12345678910>>...76