/illumos-gate/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 85 static char encrypted[128]; /* _PASSWORD_LEN in <pwd.h> on OpenBSD */ variable 298 encrypted[i++] = '$'; 299 encrypted[i++] = BCRYPT_VERSION; 301 encrypted[i++] = minor; 302 encrypted[i++] = '$'; 304 (void) snprintf(encrypted + i, 4, "%2.2u$", logr); 306 encode_base64((uint8_t *)encrypted + i + 3, csalt, BCRYPT_MAXSALT); 307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext, 309 return (encrypted);
|
/illumos-gate/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 198 free_data(&certptr->signature.encrypted); in free_decoded_cert() 1498 certptr->signature.encrypted.Data = in DerDecodeSignedCertificate() 1500 certptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCertificate() 1502 certptr->signature.encrypted.Data = NULL; in DerDecodeSignedCertificate() 1503 certptr->signature.encrypted.Length = 0; in DerDecodeSignedCertificate() 1774 if (signature->encrypted.Length > 0) { in DerEncodeSignedCertificate() 1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data, in DerEncodeSignedCertificate() 1776 signature->encrypted.Length * 8) == -1) { in DerEncodeSignedCertificate() 2069 csrptr->signature.encrypted.Data = (uchar_t *)signature; in DerDecodeSignedCsr() 2070 csrptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCsr() [all …]
|
/illumos-gate/usr/src/lib/libfru/include/ |
H A D | libfru.h | 123 unsigned encrypted : 1; member 133 unsigned encrypted : 1; member
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 448 subj_csr.signature.encrypted = signature; in sign_csr() 450 subj_csr.signature.encrypted = signed_data; in sign_csr() 603 rv = DerDecodeDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr() 618 rv = DerDecodeECDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr() 632 &csrdata->signature.encrypted); in kmf_verify_csr()
|
/illumos-gate/usr/src/cmd/vi/port/ |
H A D | ex_temp.h | 135 short encrypted; /* Encrypted temp file flag */ member
|
H A D | expreserve.c | 84 short encrypted; /* Encrypted temp file flag */ member 325 notify(H.Uid, H.Savedfile, (int) name, H.encrypted); in copyout()
|
H A D | exrecover.c | 173 if(H.encrypted) { in main() 428 fp->sf_encrypted = H.encrypted; in enter()
|
H A D | ex_temp.c | 406 H.encrypted = 1; in synctmp() 408 H.encrypted = 0; in synctmp()
|
H A D | ex.news | 47 2. It is now possible to recover encrypted files. The file header has 48 been changed to include an encrypted flag. Therefore, if the user 49 types "vi -r file" when "file" is encrypted, the program will 53 command line encrypted file actions 57 [editing session not encrypted] 60 [editing session not encrypted] 63 [editing session encrypted, 68 [editing session encrypted] 205 temp file and encrypted text on your screen has been fixed. 261 A bug causing writes to filters when editing encrypted files [all …]
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_tree_connect.c | 84 sr->encrypted == B_FALSE) { in smb2_tree_connect()
|
H A D | smb2_dispatch.c | 286 sr->encrypted = B_TRUE; in smb3_decrypt_msg() 696 if (sr->encrypted && in smb2sr_work() 723 !sr->encrypted) { in smb2sr_work() 798 !sr->encrypted) { in smb2sr_work() 848 !sr->encrypted && sr->uid_user != NULL && in smb2sr_work()
|
/illumos-gate/usr/src/common/zfs/ |
H A D | zfs_prop.c | 750 zfs_prop_valid_keylocation(const char *str, boolean_t encrypted) in zfs_prop_valid_keylocation() argument 753 return (!encrypted); in zfs_prop_valid_keylocation()
|
/illumos-gate/usr/src/lib/libfru/libfruraw/ |
H A D | fruraw.c | 656 if (descriptor->field.encrypted && (encrypt_func == NULL)) { in frt_for_each_packet() 689 if ((descriptor->field.encrypted) && in frt_for_each_packet()
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | dmu_recv.c | 86 boolean_t encrypted = ds->ds_dir->dd_crypto_obj != 0; in recv_begin_check_existing_impl() local 123 if (!encrypted && raw) in recv_begin_check_existing_impl() 127 if (encrypted && embed) in recv_begin_check_existing_impl() 175 if ((!encrypted && raw) || encrypted) in recv_begin_check_existing_impl() 2719 boolean_t encrypted = drc->drc_ds->ds_dir->dd_crypto_obj != 0; in dmu_recv_end_sync() local 2846 if (!drc->drc_raw && encrypted) { in dmu_recv_end_sync()
|
H A D | arc.c | 1860 boolean_t encrypted = (flags & ARC_FILL_ENCRYPTED) != 0; in arc_buf_fill() local 1867 IMPLY(encrypted, HDR_ENCRYPTED(hdr)); in arc_buf_fill() 1868 IMPLY(encrypted, ARC_BUF_ENCRYPTED(buf)); in arc_buf_fill() 1869 IMPLY(encrypted, ARC_BUF_COMPRESSED(buf)); in arc_buf_fill() 1870 IMPLY(encrypted, !ARC_BUF_SHARED(buf)); in arc_buf_fill() 1877 if (encrypted) { in arc_buf_fill() 1919 ASSERT(!encrypted); in arc_buf_fill() 2538 void *tag, boolean_t encrypted, boolean_t compressed, boolean_t noauth, in arc_buf_alloc_impl() argument 2550 IMPLY(encrypted, compressed); in arc_buf_alloc_impl() 2571 if (encrypted) { in arc_buf_alloc_impl() [all …]
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_iod.c | 778 boolean_t encrypted = B_FALSE; in smb2_iod_process() local 813 encrypted = B_TRUE; in smb2_iod_process() 897 if (encrypted) in smb2_iod_process()
|
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 47 Note the comma in the encrypted password field. The characters after
|
/illumos-gate/usr/src/lib/libfru/libfrupicl/ |
H A D | frupicl.c | 1081 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet() 1110 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
|
/illumos-gate/usr/src/uts/common/fs/zfs/sys/ |
H A D | dmu.h | 119 #define DMU_OT(byteswap, metadata, encrypted) \ argument 122 ((encrypted) ? DMU_OT_ENCRYPTED : 0) | \
|
/illumos-gate/usr/src/lib/libfru/libfrupicltree/ |
H A D | frupicltree.c | 1096 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet() 1125 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
|
/illumos-gate/usr/src/lib/libsqlite/test/ |
H A D | version.test | 196 } {1 {file is encrypted or is not a database}}
|
/illumos-gate/usr/src/uts/common/io/ipw/ |
H A D | ipw2100_impl.h | 374 uint8_t encrypted; member
|
/illumos-gate/usr/src/lib/libfru/libfru/ |
H A D | libfru.cc | 444 return (segdef.desc.field.encrypted == 1); in segment_is_encrypted() 856 if ((def->desc.field.encrypted == 1) && in fru_create_segment() 965 if ((segdef.desc.field.encrypted == 1) && in fru_get_segment_def()
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kerberos.ldif | 342 ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with 444 ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
|
/illumos-gate/usr/src/cmd/cmd-inet/etc/ |
H A D | services | 227 eklogin 2105/tcp # Kerberos encrypted rlogin
|