Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 244) sorted by relevance

12345678910

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
H A DRecord.pm154 $record->encrypted(1);
295 encrypted => 0,
401 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
504 sub encrypted subroutine
508 $self->{encrypted} = shift;
510 return $self->{encrypted};
/freebsd/contrib/file/magic/Magdir/
H A Dpgp9 0 beshort 0xa600 PGP encrypted data
10 #!:mime application/pgp-encrypted
31 # https://reposcope.com/mimetype/application/pgp-encrypted
33 !:mime application/pgp-encrypted
101 # - symmetric encrypted packet header
104 # 1024b RSA encrypted data
106 0 string \x84\x8c\x03 PGP RSA encrypted session key -
121 # 2048b RSA encrypted data
123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key -
138 # 3072b RSA encrypted data
[all …]
H A Daes5 # aes: magic file for AES encrypted files
12 >3 ubyte <3 AES encrypted data, version %u
14 !:mime application/x-aes-encrypted
16 # For Version 2 the encrypted file can have text tags
H A Dgnu122 0 beshort 0x8502 GPG encrypted data
138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher)
139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher)
140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher)
141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher)
142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher)
143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher)
144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher)
145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher)
146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher)
[all …]
H A Dmcrypt10 # Note: called by TrID "mcrypt encrypted (v2.5)"
11 0 string \0m\3 mcrypt 2.5 encrypted data,
20 # Note: called by TrID "mcrypt encrypted (v2.2)"
21 0 string \0m\2 mcrypt 2.2 encrypted data,
H A Dcrypto35 0 string scrypt\0 scrypt encrypted file
43 0 string age-encryption.org/v1\n age encrypted file
49 0 string -----BEGIN\040AGE\040ENCRYPTED\040FILE----- age encrypted file, ASCII armored
/freebsd/crypto/openssl/crypto/pkcs12/
H A Dp12_add.c92 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
129 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex()
130 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex()
131 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex()
132 if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, in PKCS12_pack_p7encdata_ex()
161 if (p7->d.encrypted == NULL) { in STACK_OF()
166 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
169 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod23 encrypted using this key.
27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted
28 using one or more public keys, this allows the same encrypted data to be
30 buffers where the public key encrypted secret key will be written, each buffer
31 must contain enough room for the corresponding encrypted key: that is
33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
H A DPKCS12_pack_p7encdata.pod6 into a PKCS#7 encrypted data object
22 PKCS12_pack_p7encdata() generates a PKCS#7 ContentInfo object of encrypted-data
H A DSSL_CTX_set_default_passwd_cb.pod9 get passwd callback for encrypted PEM file handling
67 B<rwflag> to check, whether an item shall be encrypted (rwflag=1).
72 Other items in PEM formatting (certificates) can also be encrypted, it is
/freebsd/tools/regression/net80211/wep/
H A Dtest_wep.c145 const u_int8_t *encrypted; member
220 memcpy(mtod(m, void *), t->encrypted, t->encrypted_len); in runtest()
266 t->encrypted, t->encrypted_len); in runtest()
268 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { in runtest()
271 t->encrypted, t->encrypted_len); in runtest()
/freebsd/sbin/gbde/
H A Dtemplate.txt
/freebsd/crypto/openssl/demos/encrypt/
H A Drsa_encrypt.c13 * RSA encryption produces different encrypted output each time it is run,
91 * The length of the input data that can be encrypted is limited by the
124 /* Calculate the size required to hold the encrypted data */ in do_encrypt()
217 unsigned char *encrypted = NULL, *decrypted = NULL; in main()
220 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) { in main()
224 if (!do_decrypt(libctx, encrypted, encrypted_len, in main()
237 OPENSSL_free(encrypted); in main()
218 unsigned char *encrypted = NULL, *decrypted = NULL; main() local
/freebsd/crypto/openssh/
H A DPROTOCOL.key6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
54 Before the key is encrypted, a random integer is assigned
/freebsd/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c540 const u_int8_t *encrypted; member
649 t->encrypted, t->encrypted_len); in runtest()
651 } else if (memcmp(mtod(m, const void *), t->encrypted, t->encrypted_len)) { in runtest()
655 t->encrypted, t->encrypted_len); in runtest()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_to_encrypted.ksh45 datasetexists $TESTPOOL/encrypted && \
46 destroy_dataset $TESTPOOL/encrypted -r
/freebsd/crypto/heimdal/etc/
H A Dservices.append12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall
22 eklogin 2105/tcp # Kerberos encrypted rlogin
/freebsd/tools/regression/net80211/tkip/
H A Dtest_tkip.c133 const u_int8_t *encrypted; member
270 t->encrypted, t->encrypted_len); in runtest()
272 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { in runtest()
275 t->encrypted, t->encrypted_len); in runtest()
/freebsd/contrib/smbfs/
H A Dconfig.mk.in19 # Comment this to disable support for encrypted passwords (requires
20 # src/sys/crypto directory). By default, NT and Win* machines use encrypted
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-smime.pod.in76 to be encrypted. The output file is the encrypted mail in MIME format.
84 encrypted mail message in MIME format for the input file. The decrypted mail
108 The input message to be encrypted or signed or the MIME message to
302 The supplied message to be signed or encrypted must include the
307 A "signed and encrypted" message is one where a signed message is
308 then encrypted. This can be produced by encrypting an already signed
318 encrypted data is used for other purposes.
398 Send encrypted mail using triple DES:
412 message being encrypted already has MIME headers.
434 Create an encrypted message using 128 bit Camellia:
H A Dopenssl-pkcs8.pod.in60 not used) then the input file must be in PKCS#8 format. An encrypted
71 file in a format specified by B<-inform>. The output file will be encrypted
83 option is not specified. If the key is encrypted a pass phrase will be
179 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
180 counts are more secure that those encrypted using the traditional
184 It is possible to write out DER encoded encrypted private keys in
249 Convert a private key from any PKCS#8 encrypted format to traditional format:
/freebsd/sys/contrib/openzfs/cmd/zstream/
H A Dzstream_recompress.c228 boolean_t encrypted = B_FALSE; in zstream_do_recompress() local
231 encrypted = B_TRUE; in zstream_do_recompress()
235 if (encrypted) { in zstream_do_recompress()
/freebsd/crypto/heimdal/lib/asn1/
H A Dpkcs12.asn148 -- EncryptedData if password-encrypted
49 -- EnvelopedData if public key-encrypted
/freebsd/contrib/wpa/src/eap_common/
H A Dikev2_common.c322 payloads->encrypted = pdata; in ikev2_parse_payloads()
431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument
443 if (encrypted == NULL) { in ikev2_decrypt_payload()
467 iv = encrypted; in ikev2_decrypt_payload()
469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()

12345678910