Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 216) sorted by relevance

123456789

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
H A DRecord.pm109 $record->encrypted(1);
189 encrypted => 0,
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
/freebsd/contrib/file/magic/Magdir/
H A Dpgp9 0 beshort 0xa600 PGP encrypted data
10 #!:mime application/pgp-encrypted
31 # https://reposcope.com/mimetype/application/pgp-encrypted
33 !:mime application/pgp-encrypted
101 # - symmetric encrypted packet header
104 # 1024b RSA encrypted data
106 0 string \x84\x8c\x03 PGP RSA encrypted session key -
121 # 2048b RSA encrypted data
123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key -
138 # 3072b RSA encrypted data
[all …]
H A Daes5 # aes: magic file for AES encrypted files
12 >3 ubyte <3 AES encrypted data, version %u
14 !:mime application/x-aes-encrypted
16 # For Version 2 the encrypted file can have text tags
H A Dgnu122 0 beshort 0x8502 GPG encrypted data
138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher)
139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher)
140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher)
141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher)
142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher)
143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher)
144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher)
145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher)
146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher)
[all …]
H A Dmcrypt10 # Note: called by TrID "mcrypt encrypted (v2.5)"
11 0 string \0m\3 mcrypt 2.5 encrypted data,
20 # Note: called by TrID "mcrypt encrypted (v2.2)"
21 0 string \0m\2 mcrypt 2.2 encrypted data,
H A Dcrypto35 0 string scrypt\0 scrypt encrypted file
43 0 string age-encryption.org/v1\n age encrypted file
49 0 string -----BEGIN\040AGE\040ENCRYPTED\040FILE----- age encrypted file, ASCII armored
/freebsd/crypto/openssl/crypto/pkcs12/
H A Dp12_add.c127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex()
128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex()
129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex()
130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex()
160 if (p7->d.encrypted == NULL) { in STACK_OF()
165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod23 encrypted using this key.
27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted
28 using one or more public keys, this allows the same encrypted data to be
30 buffers where the public key encrypted secret key will be written, each buffer
31 must contain enough room for the corresponding encrypted key: that is
33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
H A DPKCS12_pack_p7encdata.pod6 into a PKCS#7 encrypted data object
22 PKCS12_pack_p7encdata() generates a PKCS#7 ContentInfo object of encrypted-data
H A DSSL_CTX_set_default_passwd_cb.pod9 get passwd callback for encrypted PEM file handling
67 B<rwflag> to check, whether an item shall be encrypted (rwflag=1).
72 Other items in PEM formatting (certificates) can also be encrypted, it is
/freebsd/tools/regression/net80211/wep/
H A Dtest_wep.c145 const u_int8_t *encrypted; member
220 memcpy(mtod(m, void *), t->encrypted, t->encrypted_len); in runtest()
266 t->encrypted, t->encrypted_len); in runtest()
268 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { in runtest()
271 t->encrypted, t->encrypted_len); in runtest()
/freebsd/sbin/gbde/
H A Dtemplate.txt
/freebsd/crypto/openssh/
H A DPROTOCOL.key6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
54 Before the key is encrypted, a random integer is assigned
/freebsd/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c540 const u_int8_t *encrypted; member
649 t->encrypted, t->encrypted_len); in runtest()
651 } else if (memcmp(mtod(m, const void *), t->encrypted, t->encrypted_len)) { in runtest()
655 t->encrypted, t->encrypted_len); in runtest()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_to_encrypted.ksh44 datasetexists $TESTPOOL/encrypted && \
45 destroy_dataset $TESTPOOL/encrypted -r
/freebsd/crypto/heimdal/etc/
H A Dservices.append12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall
22 eklogin 2105/tcp # Kerberos encrypted rlogin
/freebsd/tools/regression/net80211/tkip/
H A Dtest_tkip.c133 const u_int8_t *encrypted; member
270 t->encrypted, t->encrypted_len); in runtest()
272 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { in runtest()
275 t->encrypted, t->encrypted_len); in runtest()
/freebsd/contrib/smbfs/
H A Dconfig.mk.in19 # Comment this to disable support for encrypted passwords (requires
20 # src/sys/crypto directory). By default, NT and Win* machines use encrypted
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-smime.pod.in74 to be encrypted. The output file is the encrypted mail in MIME format.
82 encrypted mail message in MIME format for the input file. The decrypted mail
106 The input message to be encrypted or signed or the MIME message to
299 The supplied message to be signed or encrypted must include the
304 A "signed and encrypted" message is one where a signed message is
305 then encrypted. This can be produced by encrypting an already signed
315 encrypted data is used for other purposes.
395 Send encrypted mail using triple DES:
409 message being encrypted already has MIME headers.
431 Create an encrypted message using 128 bit Camellia:
H A Dopenssl-pkcs8.pod.in59 not used) then the input file must be in PKCS#8 format. An encrypted
70 file in a format specified by B<-inform>. The output file will be encrypted
82 option is not specified. If the key is encrypted a pass phrase will be
168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
169 counts are more secure that those encrypted using the traditional
173 It is possible to write out DER encoded encrypted private keys in
238 Convert a private key from any PKCS#8 encrypted format to traditional format:
/freebsd/sys/contrib/openzfs/cmd/zstream/
H A Dzstream_recompress.c227 boolean_t encrypted = B_FALSE; in zstream_do_recompress() local
230 encrypted = B_TRUE; in zstream_do_recompress()
234 if (encrypted) { in zstream_do_recompress()
/freebsd/crypto/heimdal/lib/asn1/
H A Dpkcs12.asn148 -- EncryptedData if password-encrypted
49 -- EnvelopedData if public key-encrypted
/freebsd/contrib/wpa/src/eap_common/
H A Dikev2_common.c322 payloads->encrypted = pdata; in ikev2_parse_payloads()
431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument
443 if (encrypted == NULL) { in ikev2_decrypt_payload()
467 iv = encrypted; in ikev2_decrypt_payload()
469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.c290 char *encrypted; in pam_sm_chauthtok() local
358 encrypted = crypt(old_pass, pwd->pw_passwd); in pam_sm_chauthtok()
362 if (strcmp(encrypted, pwd->pw_passwd) != 0) in pam_sm_chauthtok()

123456789