| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/ |
| H A D | zfs_create_encrypted.ksh | 30 # encryption properties set. 33 # enc = encryption 39 # no unspec 0 0 yes inherit no encryption (not tested here) 43 # no off 0 0 yes explicit no encryption 49 # no on 1 0 yes new encryption root 50 # no on 1 1 yes new encryption root 51 # yes unspec 0 0 yes inherit encryption 53 # yes unspec 1 0 yes new encryption root, crypt inherited 54 # yes unspec 1 1 yes new encryption root, crypt inherited 59 # yes on 0 0 yes inherited encryption, local crypt [all …]
|
| H A D | zfs_create_crypt_combos.ksh | 29 # 'zfs create' should create an encrypted dataset with a valid encryption 33 # 1. Create a filesystem for each combination of encryption type and key format 48 "encryption=on" \ 49 "encryption=aes-128-ccm" \ 50 "encryption=aes-192-ccm" \ 51 "encryption=aes-256-ccm" \ 52 "encryption=aes-128-gcm" \ 53 "encryption=aes-192-gcm" \ 54 "encryption=aes-256-gcm" 57 "encryption=aes-256-gcm" \ [all …]
|
| /illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_create/ |
| H A D | zfs_create_encrypted.ksh | 29 # encryption properties set. 32 # enc = encryption 38 # no unspec 0 0 yes inherit no encryption (not tested here) 42 # no off 0 0 yes explicit no encryption 48 # no on 1 0 yes new encryption root 49 # no on 1 1 yes new encryption root 50 # yes unspec 0 0 yes inherit encryption 52 # yes unspec 1 0 yes new encryption root, crypt inherited 53 # yes unspec 1 1 yes new encryption root, crypt inherited 58 # yes on 0 0 yes inherited encryption, local crypt [all …]
|
| H A D | zfs_create_crypt_combos.ksh | 28 # 'zfs create' should create an encrypted dataset with a valid encryption 32 # 1. Create a filesystem for each combination of encryption type and key format 47 "encryption=on" \ 48 "encryption=aes-128-ccm" \ 49 "encryption=aes-192-ccm" \ 50 "encryption=aes-256-ccm" \ 51 "encryption=aes-128-gcm" \ 52 "encryption=aes-192-gcm" \ 53 "encryption=aes-256-gcm" 56 "encryption=aes-256-ccm" \ [all …]
|
| /illumos-gate/usr/src/test/zfs-tests/tests/functional/rsend/ |
| H A D | send_encrypted_props.ksh | 26 # Verify that zfs properly handles encryption properties when receiving 33 # 4. Verify that 'zfs recv -x <encryption prop>' fails on a raw send stream 34 # 5. Verify that encryption properties cannot be changed on incrementals 35 # 6. Verify that a simple send can be received as an encryption root 37 # encryption root 39 # encryption root 41 # encryption child 43 # encryption child 58 log_assert "'zfs recv' must properly handle encryption properties" 72 log_must zfs create -o encryption=on -o keyformat=passphrase \ [all …]
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
| H A D | send_encrypted_props.ksh | 26 # Verify that zfs properly handles encryption properties when receiving 33 # 4. Verify that 'zfs recv -x <encryption prop>' fails on a raw send stream 34 # 5. Verify that encryption properties cannot be changed on incrementals 35 # 6. Verify that a simple send can be received as an encryption root 37 # encryption root 39 # encryption root 41 # encryption child 43 # encryption child 58 log_assert "'zfs recv' must properly handle encryption properties" 72 log_must zfs create -o encryption=on -o keyformat=passphrase \ [all …]
|
| /freebsd/sys/contrib/openzfs/man/man8/ |
| H A D | zfs-unload-key.8 | 39 .Nd load, unload, or change encryption key of ZFS dataset 102 encryption roots. 104 Loads the keys for all encryption roots in all imported pools. 146 encryption roots. 148 Unloads the keys for all encryption roots in all imported pools. 174 If the dataset was not previously an encryption root it will become one. 177 flag may be provided to cause an encryption root to inherit the parent's key 207 Allows the user to set encryption key properties 219 Note that this command can only be run on an encryption root 223 .Ss Encryption [all...] |
| H A D | zfs-change-key.8 | 39 .Nd load, unload, or change encryption key of ZFS dataset 102 encryption roots. 104 Loads the keys for all encryption roots in all imported pools. 146 encryption roots. 148 Unloads the keys for all encryption roots in all imported pools. 174 If the dataset was not previously an encryption root it will become one. 177 flag may be provided to cause an encryption root to inherit the parent's key 207 Allows the user to set encryption key properties 219 Note that this command can only be run on an encryption root 223 .Ss Encryption [all...] |
| H A D | zfs-load-key.8 | 39 .Nd load, unload, or change encryption key of ZFS dataset 102 encryption roots. 104 Loads the keys for all encryption roots in all imported pools. 146 encryption roots. 148 Unloads the keys for all encryption roots in all imported pools. 174 If the dataset was not previously an encryption root it will become one. 177 flag may be provided to cause an encryption root to inherit the parent's key 207 Allows the user to set encryption key properties 219 Note that this command can only be run on an encryption root 223 .Ss Encryption [all …]
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/ |
| H A D | zpool_create_crypt_combos.ksh | 28 # 'zpool create' should create encrypted pools when using a valid encryption 32 # 1. Create a pool for each combination of encryption type and key format 44 set -A ENCRYPTION_ALGS "encryption=on" \ 45 "encryption=aes-128-ccm" \ 46 "encryption=aes-192-ccm" \ 47 "encryption=aes-256-ccm" \ 48 "encryption=aes-128-gcm" \ 49 "encryption=aes-192-gcm" \ 50 "encryption=aes-256-gcm" 52 set -A ENCRYPTION_PROPS "encryption=aes-256-gcm" \ [all …]
|
| H A D | zpool_create_encrypted.ksh | 28 # combination of encryption properties set. 30 # enc = encryption 43 # N 0 0 yes explicit no encryption 49 # Y 1 1 no unsupported combination of non-encryption props 50 # Y 1 0 yes new encryption root 51 # Y 1 1 yes new encryption root 54 # 1. Attempt to create a dataset using all combinations of encryption 67 "has a valid combination of encryption properties set." 74 log_must zpool create -O encryption=off $TESTPOOL $DISKS 77 log_mustnot zpool create -O encryption=off -O keylocation=prompt \ [all …]
|
| /illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zpool_create/ |
| H A D | zpool_create_crypt_combos.ksh | 27 # 'zpool create' should create encrypted pools when using a valid encryption 31 # 1. Create a pool for each combination of encryption type and key format 43 set -A ENCRYPTION_ALGS "encryption=on" \ 44 "encryption=aes-128-ccm" \ 45 "encryption=aes-192-ccm" \ 46 "encryption=aes-256-ccm" \ 47 "encryption=aes-128-gcm" \ 48 "encryption=aes-192-gcm" \ 49 "encryption=aes-256-gcm" 51 set -A ENCRYPTION_PROPS "encryption=aes-256-ccm" \ [all …]
|
| H A D | zpool_create_encrypted.ksh | 27 # combination of encryption properties set. 29 # enc = encryption 42 # N 0 0 yes explicit no encryption 48 # Y 1 0 yes new encryption root 49 # Y 1 1 yes new encryption root 52 # 1. Attempt to create a dataset using all combinations of encryption 65 "has a valid combination of encryption properties set." 72 log_must zpool create -O encryption=off $TESTPOOL $DISKS 75 log_mustnot zpool create -O encryption=off -O keylocation=prompt \ 77 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \ [all …]
|
| /freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/ |
| H A D | Encryption_Types.htm | 8 <h1>Encryption Types</h1> 10 Kerberos supports several types of encryption for securing session keys 15 Kerberos installation checks for an encryption type that is shared by 17 <li> When encrypting session keys, the KDC checks for an encryption 28 <li><a href="#view"> View encryption types</a></li> 33 <li><a href="#weak"> Weak encryption types</a></li> 34 <li><a href="#supported"> Supported encryption types</a></li> 42 <h2><a name="weak"> Weak Encryption Types </a></h2> 44 In the table of Encryption Types below, some encryption types are noted as <b>weak</b>. 45 Most of them are encryption types that used to be strong but now, with [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | life_cycle-cipher.7 | 86 .IP "initialised for encryption using EVP_EncryptInit" 4 87 .IX Item "initialised for encryption using EVP_EncryptInit" 128 | for decryption | | | | for encryption | 141 …| for decryption | <-------------------+ | | for encryption | … 152 | (AEAD encryption) 166 … decryption decryption encryption encryption 172 … encryption encryption encryption encryption encryption encryption encryption encryption 177 … encryption encryption 184 … decryption decryption encryption encryption 186 … decryption decryption encryption encryption [all …]
|
| /freebsd/contrib/bearssl/inc/ |
| H A D | bearssl_block.h | 46 * functions are provided, for CBC encryption, CBC decryption, and CTR 47 * encryption/decryption. Each set has its own context structure, 48 * initialised with the encryption key. 50 * For CBC encryption and decryption, the data to encrypt or decrypt is 55 * Function for CTR encryption are defined only for block ciphers with 72 * expansion. These subkeys are appropriate for CBC encryption. The 78 * Perform key expansion: subkeys for CBC encryption are computed and 85 * Perform CBC encryption of `len` bytes, in place. The encrypted data 116 * expansion. These subkeys are appropriate for CTR encryption and 122 * Perform key expansion: subkeys for CTR encryption and decryption [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | life_cycle-cipher.pod | 34 =item initialised for encryption using EVP_EncryptInit 82 | for decryption | | | | for encryption | 95 …| for decryption | <-------------------+ | | for encryption | … 106 | (AEAD encryption) 128 … decryption decryption encryption encryption 134 … encryption encryption encryption encryption encryption encryption encryption encryption 139 … encryption encryption 146 … decryption decryption encryption encryption 148 … decryption decryption encryption encryption 150 … decryption decryption encryption encryption [all …]
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_change-key/ |
| H A D | zfs_change-key_clones.ksh | 27 # 'zfs change-key' should correctly update encryption roots with clones. 31 # 2. Create an encryption root child of the first dataset 32 # 3. Clone the child encryption root twice 33 # 4. Add inheriting children to the encryption root and each of the clones 34 # 5. Verify the encryption roots 35 # 6. Have the child encryption root inherit from its parent 36 # 7. Verify the encryption root for all datasets is now the parent dataset 49 log_assert "'zfs change-key' should correctly update encryption " \ 52 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \ 54 log_must eval "echo $PASSPHRASE2 | zfs create -o encryption=on" \ [all …]
|
| /illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_change-key/ |
| H A D | zfs_change-key_clones.ksh | 26 # 'zfs change-key' should correctly update encryption roots with clones. 30 # 2. Create an encryption root child of the first dataset 31 # 3. Clone the child encryption root twice 32 # 4. Add inheriting children to the encryption root and each of the clones 33 # 5. Verify the encryption roots 34 # 6. Have the child encryption root inherit from its parent 35 # 7. Verify the encryption root for all datasets is now the parent dataset 48 log_assert "'zfs change-key' should correctly update encryption " \ 51 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \ 53 log_must eval "echo $PASSPHRASE2 | zfs create -o encryption=on" \ [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_SealInit.pod | 5 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption 21 encryption. They generate a random key and IV (if required) then 22 "envelope" it by using public key encryption. Data can then be 25 EVP_SealInit() initializes a cipher context B<ctx> for encryption 65 Envelope encryption is the usual method of using public key encryption 66 on large amounts of data, this is because public key encryption is slow 67 but symmetric encryption is fast. So symmetric encryption is used for 68 bulk encryption and the small random symmetric key used is transferred 69 using public key encryption.
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/ |
| H A D | zfs_receive_to_encrypted.ksh | 36 # 8. Attempt to receive with -o encryption=off to an unencrypted child 67 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 72 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c1)" != "off" 85 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c2)" == "off" 93 zfs receive -o encryption=off $TESTPOOL/$TESTFS1/c2o" 94 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c2o)" == "off" 98 log_must test "$(get_prop 'encryption' $TESTPOOL/$TESTFS1/c3)" == "off" 104 # Verify that replication can override encryption properties 105 log_note "Verifying replication can override encryption properties for plain dataset" 108 log_must eval "zfs send -R $snap2 | zfs recv -s -F -o encryption=on" \ [all …]
|
| H A D | zfs_receive_-wR-encrypted-mix.ksh | 41 # 4. Check the encryption property of the received datasets 63 create_dataset "$src" -o encryption=on -o keyformat=passphrase 64 create_dataset "$src/u" "-o encryption=off" 66 create_dataset "$src/u/e" -o encryption=on -o keyformat=passphrase 67 create_dataset "$src/u/e/u" -o encryption=off 71 log_must test "$(get_prop 'encryption' $dst)" != "off" 72 log_must test "$(get_prop 'encryption' $dst/u)" == "off" 73 log_must test "$(get_prop 'encryption' $dst/u/e)" != "off" 74 log_must test "$(get_prop 'encryption' $dst/u/e/u)" == "off"
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_rename/ |
| H A D | zfs_rename_encrypted_child.ksh | 28 # encryption root. 31 # 1. Create two encryption roots, and a child and grandchild of the first 32 # encryption root 36 # 5. Verify the encryption root of the dataset 38 # 7. Verify the encryption root of the dataset 53 "encryption root" 55 log_must eval "echo $PASSPHRASE | zfs create -o encryption=on" \ 59 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \ 79 "encryption root"
|
| /illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_root/zfs_rename/ |
| H A D | zfs_rename_encrypted_child.ksh | 27 # encryption root. 30 # 1. Create two encryption roots, and a child and grandchild of the first 31 # encryption root 35 # 5. Verify the encryption root of the dataset 37 # 7. Verify the encryption root of the dataset 52 "encryption root" 54 log_must eval "echo $PASSPHRASE | zfs create -o encryption=on" \ 58 log_must eval "echo $PASSPHRASE1 | zfs create -o encryption=on" \ 78 "encryption root"
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_SealInit.3 | 64 EVP_SealInit, EVP_SealUpdate, EVP_SealFinal \- EVP envelope encryption 80 encryption. They generate a random key and IV (if required) then 81 "envelope" it by using public key encryption. Data can then be 84 \&\fBEVP_SealInit()\fR initializes a cipher context \fBctx\fR for encryption 122 Envelope encryption is the usual method of using public key encryption 123 on large amounts of data, this is because public key encryption is slow 124 but symmetric encryption is fast. So symmetric encryption is used for 125 bulk encryption and the small random symmetric key used is transferred 126 using public key encryption.
|