/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
H A D | Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | pgp | 9 0 beshort 0xa600 PGP encrypted data 10 #!:mime application/pgp-encrypted 31 # https://reposcope.com/mimetype/application/pgp-encrypted 33 !:mime application/pgp-encrypted 101 # - symmetric encrypted packet header 104 # 1024b RSA encrypted data 106 0 string \x84\x8c\x03 PGP RSA encrypted session key - 121 # 2048b RSA encrypted data 123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key - 138 # 3072b RSA encrypted data [all …]
|
H A D | aes | 5 # aes: magic file for AES encrypted files 12 >3 ubyte <3 AES encrypted data, version %u 14 !:mime application/x-aes-encrypted 16 # For Version 2 the encrypted file can have text tags
|
H A D | gnu | 122 0 beshort 0x8502 GPG encrypted data 138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher) 139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher) 140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher) 141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher) 142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher) 143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher) 144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher) 145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher) 146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher) [all …]
|
H A D | mcrypt | 10 # Note: called by TrID "mcrypt encrypted (v2.5)" 11 0 string \0m\3 mcrypt 2.5 encrypted data, 20 # Note: called by TrID "mcrypt encrypted (v2.2)" 21 0 string \0m\2 mcrypt 2.2 encrypted data,
|
H A D | crypto | 35 0 string scrypt\0 scrypt encrypted file 43 0 string age-encryption.org/v1\n age encrypted file 49 0 string -----BEGIN\040AGE\040ENCRYPTED\040FILE----- age encrypted file, ASCII armored
|
/freebsd/crypto/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex() 128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex() 129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex() 130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex() 160 if (p7->d.encrypted == NULL) { in STACK_OF() 165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_SealInit.pod | 23 encrypted using this key. 27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 31 must contain enough room for the corresponding encrypted key: that is 33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
|
H A D | PKCS12_pack_p7encdata.pod | 6 into a PKCS#7 encrypted data object 22 PKCS12_pack_p7encdata() generates a PKCS#7 ContentInfo object of encrypted-data
|
H A D | SSL_CTX_set_default_passwd_cb.pod | 9 get passwd callback for encrypted PEM file handling 67 B<rwflag> to check, whether an item shall be encrypted (rwflag=1). 72 Other items in PEM formatting (certificates) can also be encrypted, it is
|
/freebsd/tools/regression/net80211/wep/ |
H A D | test_wep.c | 145 const u_int8_t *encrypted; member 220 memcpy(mtod(m, void *), t->encrypted, t->encrypted_len); in runtest() 266 t->encrypted, t->encrypted_len); in runtest() 268 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { in runtest() 271 t->encrypted, t->encrypted_len); in runtest()
|
/freebsd/sbin/gbde/ |
H A D | template.txt |
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.key | 6 an encrypted list of matching private keys. 19 string encrypted, padded list of private keys 54 Before the key is encrypted, a random integer is assigned
|
/freebsd/tools/regression/net80211/ccmp/ |
H A D | test_ccmp.c | 540 const u_int8_t *encrypted; member 649 t->encrypted, t->encrypted_len); in runtest() 651 } else if (memcmp(mtod(m, const void *), t->encrypted, t->encrypted_len)) { in runtest() 655 t->encrypted, t->encrypted_len); in runtest()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/ |
H A D | zfs_receive_to_encrypted.ksh | 44 datasetexists $TESTPOOL/encrypted && \ 45 destroy_dataset $TESTPOOL/encrypted -r
|
/freebsd/crypto/heimdal/etc/ |
H A D | services.append | 12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall 22 eklogin 2105/tcp # Kerberos encrypted rlogin
|
/freebsd/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 133 const u_int8_t *encrypted; member 270 t->encrypted, t->encrypted_len); in runtest() 272 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { in runtest() 275 t->encrypted, t->encrypted_len); in runtest()
|
/freebsd/contrib/smbfs/ |
H A D | config.mk.in | 19 # Comment this to disable support for encrypted passwords (requires 20 # src/sys/crypto directory). By default, NT and Win* machines use encrypted
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 74 to be encrypted. The output file is the encrypted mail in MIME format. 82 encrypted mail message in MIME format for the input file. The decrypted mail 106 The input message to be encrypted or signed or the MIME message to 299 The supplied message to be signed or encrypted must include the 304 A "signed and encrypted" message is one where a signed message is 305 then encrypted. This can be produced by encrypting an already signed 315 encrypted data is used for other purposes. 395 Send encrypted mail using triple DES: 409 message being encrypted already has MIME headers. 431 Create an encrypted message using 128 bit Camellia:
|
H A D | openssl-pkcs8.pod.in | 59 not used) then the input file must be in PKCS#8 format. An encrypted 70 file in a format specified by B<-inform>. The output file will be encrypted 82 option is not specified. If the key is encrypted a pass phrase will be 168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 169 counts are more secure that those encrypted using the traditional 173 It is possible to write out DER encoded encrypted private keys in 238 Convert a private key from any PKCS#8 encrypted format to traditional format:
|
/freebsd/sys/contrib/openzfs/cmd/zstream/ |
H A D | zstream_recompress.c | 227 boolean_t encrypted = B_FALSE; in zstream_do_recompress() local 230 encrypted = B_TRUE; in zstream_do_recompress() 234 if (encrypted) { in zstream_do_recompress()
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | pkcs12.asn1 | 48 -- EncryptedData if password-encrypted 49 -- EnvelopedData if public key-encrypted
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 322 payloads->encrypted = pdata; in ikev2_parse_payloads() 431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 443 if (encrypted == NULL) { in ikev2_decrypt_payload() 467 iv = encrypted; in ikev2_decrypt_payload() 469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|
/freebsd/lib/libpam/modules/pam_unix/ |
H A D | pam_unix.c | 290 char *encrypted; in pam_sm_chauthtok() local 358 encrypted = crypt(old_pass, pwd->pw_passwd); in pam_sm_chauthtok() 362 if (strcmp(encrypted, pwd->pw_passwd) != 0) in pam_sm_chauthtok()
|